903 resultados para Blue shift


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Effects of ocean acidification on Emiliania huxleyi strain RCC 1216 (calcifying, diploid life-cycle stage) and RCC 1217 (non-calcifying, haploid life-cycle stage) were investigated by measuring growth, elemental composition, and production rates under different pCO2 levels (380 and 950 µatm). In these differently acclimated cells, the photosynthetic carbon source was assessed by a (14)C disequilibrium assay, conducted over a range of ecologically relevant pH values (7.9-8.7). In agreement with previous studies, we observed decreased calcification and stimulated biomass production in diploid cells under high pCO2, but no CO2-dependent changes in biomass production for haploid cells. In both life-cycle stages, the relative contributions of CO2 and HCO3 (-) uptake depended strongly on the assay pH. At pH values =< 8.1, cells preferentially used CO2 (>= 90 % CO2), whereas at pH values >= 8.3, cells progressively increased the fraction of HCO3 (-) uptake (~45 % CO2 at pH 8.7 in diploid cells; ~55 % CO2 at pH 8.5 in haploid cells). In contrast to the short-term effect of the assay pH, the pCO2 acclimation history had no significant effect on the carbon uptake behavior. A numerical sensitivity study confirmed that the pH-modification in the (14)C disequilibrium method yields reliable results, provided that model parameters (e.g., pH, temperature) are kept within typical measurement uncertainties. Our results demonstrate a high plasticity of E. huxleyi to rapidly adjust carbon acquisition to the external carbon supply and/or pH, and provide an explanation for the paradoxical observation of high CO2 sensitivity despite the apparently high HCO3 (-) usage seen in previous studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A large percentage of CO2 emitted into the atmosphere is absorbed by the oceans, causing chemical changes in surface waters known as ocean acidification (OA). Despite the high interest and increased pace of OA research to understand the effects of OA on marine organisms, many ecologically important organisms remain unstudied. Calcidiscus is a heavily calcified coccolithophore genus that is widespread and genetically and morphologically diverse. It contributes substantially to global calcium carbonate production, organic carbon production, oceanic carbon burial, and ocean-atmosphere CO2 exchange. Despite the importance of this genus, relatively little work has examined its responses to OA. We examined changes in growth, morphology, and carbon allocation in multiple strains of Calcidiscus leptoporus in response to ocean acidification. We also, for the first time, examined the OA response of Calcidiscus quadriperforatus, a larger and more heavily calcified Calcidiscus congener. All Calcidiscus coccolithophores responded negatively to OA with impaired coccolith morphology and a decreased ratio of particulate inorganic to organic carbon (PIC:POC). However, strains responded variably; C. quadriperforatus showed the most sensitivity, while the most lightly calcified strain of C. leptoporus showed little response to OA. Our findings suggest that calcium carbonate production relative to organic carbon production by Calcidiscus coccolithophores may decrease in future oceans and that Calcidiscus distributions may shift if more resilient strains and species become dominant in assemblages. This study demonstrates that variable responses to OA may be strain or species specific in a way that is closely linked to physiological traits, such as cellular calcite quota.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Acoustic estimates of herring and blue whiting abundance were obtained during the surveys using the Simrad ER60 scientific echosounder. The allocation of NASC-values to herring, blue whiting and other acoustic targets were based on the composition of the trawl catches and the appearance of echo recordings. To estimate the abundance, the allocated NASC -values were averaged for ICES-squares (0.5° latitude by 1° longitude). For each statistical square, the unit area density of fish (rA) in number per square nautical mile (N*nm-2) was calculated using standard equations (Foote et al., 1987; Toresen et al., 1998). To estimate the total abundance of fish, the unit area abundance for each statistical square was multiplied by the number of square nautical miles in each statistical square and then summed for all the statistical squares within defined subareas and over the total area. Biomass estimation was calculated by multiplying abundance in numbers by the average weight of the fish in each statistical square then summing all squares within defined subareas and over the total area. The Norwegian BEAM soft-ware (Totland and Godø 2001) was used to make estimates of total biomass.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report on plasma-assisted molecular beam epitaxy growth and characterization of InGaN/GaN quantum dots (QDs) for violet/blue applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An electrooptic effect in the blue phase of the cholesteric mixture S811-and the nematic mixture N5 is reported. To demonstrate this effect ac voltages (ƒ = 1000 Hz) between 0 and 150 νwere applied. Wavelength shifts of 70 nm were obtained.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The optical behaviour of cholesteric mixtures of negative dielectric anisotrony under electric fields is reported. A mixture of S 311~ (31.35 %) + N 5 was employed. AC voltages (f = 1000 Hz) betweeen 0 and 150 volts were applied. Cells 23 micron thick, with internal SnO2 electrodes, were used.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In order to achieve to minimize car-based trips, transport planners have been particularly interested in understanding the factors that explain modal choices. In the transport modelling literature there has been an increasing awareness that socioeconomic attributes and quantitative variables are not sufficient to characterize travelers and forecast their travel behavior. Recent studies have also recognized that users? social interactions and land use patterns influence travel behavior, especially when changes to transport systems are introduced, but links between international and Spanish perspectives are rarely deal. In this paper, factorial and path analyses through a Multiple-Indicator Multiple-Cause (MIMIC) model are used to understand and describe the relationship between the different psychological and environmental constructs with social influence and socioeconomic variables. The MIMIC model generates Latent Variables (LVs) to be incorporated sequentially into Discrete Choice Models (DCM) where the levels of service and cost attributes of travel modes are also included directly to measure the effect of the transport policies that have been introduced in Madrid during the last three years in the context of the economic crisis. The data used for this paper are collected from a two panel smartphone-based survey (n=255 and 190 respondents, respectively) of Madrid.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A novel time-stepping shift-invert algorithm for linear stability analysis of laminar flows in complex geometries is presented. This method, based on a Krylov subspace iteration, enables the solution of complex non-symmetric eigenvalue problems in a matrix-free framework. Validations and comparisons to the classical exponential method have been performed in three different cases: (i) stenotic flow, (ii) backward-facing step and (iii) lid-driven swirling flow. Results show that this new approach speeds up the required Krylov subspace iterations and has the capability of converging to specific parts of the global spectrum. It is shown that, although the exponential method remains the method of choice if leading eigenvalues are sought, the performance of the present method could be dramatically improved with the use of a preconditioner. In addition, as opposed to other methods, this strategy can be directly applied to any time-stepper, regardless of the temporal or spatial discretization of the latter.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Photonic crystal fibers (PCF) have been selectively filled with a cholesteric liquid crystal (ChLC) with special interest in the blue phase (BP) of the liquid crystal. It has been observed thermal tuning of the guided light in the visible region. A dramatically enhance appears when the phase of the liquid crystal changes from cholesteric to blue phase I (BPI). When a thermal range of the blue phase I is achieved, no changes are observed while increasing temperature from BPI through BPII and to the isotropic phase.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Los algoritmos basados en registros de desplazamiento con realimentación (en inglés FSR) se han utilizado como generadores de flujos pseudoaleatorios en aplicaciones con recursos limitados como los sistemas de apertura sin llave. Se considera canal primario a aquel que se utiliza para realizar una transmisión de información. La aparición de los ataques de canal auxiliar (en inglés SCA), que explotan información filtrada inintencionadamente a través de canales laterales como el consumo, las emisiones electromagnéticas o el tiempo empleado, supone una grave amenaza para estas aplicaciones, dado que los dispositivos son accesibles por un atacante. El objetivo de esta tesis es proporcionar un conjunto de protecciones que se puedan aplicar de forma automática y que utilicen recursos ya disponibles, evitando un incremento sustancial en los costes y alargando la vida útil de aplicaciones que puedan estar desplegadas. Explotamos el paralelismo existente en algoritmos FSR, ya que sólo hay 1 bit de diferencia entre estados de rondas consecutivas. Realizamos aportaciones en tres niveles: a nivel de sistema, utilizando un coprocesador reconfigurable, a través del compilador y a nivel de bit, aprovechando los recursos disponibles en el procesador. Proponemos un marco de trabajo que nos permite evaluar implementaciones de un algoritmo incluyendo los efectos introducidos por el compilador considerando que el atacante es experto. En el campo de los ataques, hemos propuesto un nuevo ataque diferencial que se adapta mejor a las condiciones de las implementaciones software de FSR, en las que el consumo entre rondas es muy similar. SORU2 es un co-procesador vectorial reconfigurable propuesto para reducir el consumo energético en aplicaciones con paralelismo y basadas en el uso de bucles. Proponemos el uso de SORU2, además, para ejecutar algoritmos basados en FSR de forma segura. Al ser reconfigurable, no supone un sobrecoste en recursos, ya que no está dedicado en exclusiva al algoritmo de cifrado. Proponemos una configuración que ejecuta múltiples algoritmos de cifrado similares de forma simultánea, con distintas implementaciones y claves. A partir de una implementación sin protecciones, que demostramos que es completamente vulnerable ante SCA, obtenemos una implementación segura a los ataques que hemos realizado. A nivel de compilador, proponemos un mecanismo para evaluar los efectos de las secuencias de optimización del compilador sobre una implementación. El número de posibles secuencias de optimizaciones de compilador es extremadamente alto. El marco de trabajo propuesto incluye un algoritmo para la selección de las secuencias de optimización a considerar. Debido a que las optimizaciones del compilador transforman las implementaciones, se pueden generar automáticamente implementaciones diferentes combinamos para incrementar la seguridad ante SCA. Proponemos 2 mecanismos de aplicación de estas contramedidas, que aumentan la seguridad de la implementación original sin poder considerarse seguras. Finalmente hemos propuesto la ejecución paralela a nivel de bit del algoritmo en un procesador. Utilizamos la forma algebraica normal del algoritmo, que automáticamente se paraleliza. La implementación sobre el algoritmo evaluado mejora en rendimiento y evita que se filtre información por una ejecución dependiente de datos. Sin embargo, es más vulnerable ante ataques diferenciales que la implementación original. Proponemos una modificación del algoritmo para obtener una implementación segura, descartando parcialmente ejecuciones del algoritmo, de forma aleatoria. Esta implementación no introduce una sobrecarga en rendimiento comparada con las implementaciones originales. En definitiva, hemos propuesto varios mecanismos originales a distintos niveles para introducir aleatoridad en implementaciones de algoritmos FSR sin incrementar sustancialmente los recursos necesarios. ABSTRACT Feedback Shift Registers (FSR) have been traditionally used to implement pseudorandom sequence generators. These generators are used in Stream ciphers in systems with tight resource constraints, such as Remote Keyless Entry. When communicating electronic devices, the primary channel is the one used to transmit the information. Side-Channel Attack (SCA) use additional information leaking from the actual implementation, including power consumption, electromagnetic emissions or timing information. Side-Channel Attacks (SCA) are a serious threat to FSR-based applications, as an attacker usually has physical access to the devices. The main objective of this Ph.D. thesis is to provide a set of countermeasures that can be applied automatically using the available resources, avoiding a significant cost overhead and extending the useful life of deployed systems. If possible, we propose to take advantage of the inherent parallelism of FSR-based algorithms, as the state of a FSR differs from previous values only in 1-bit. We have contributed in three different levels: architecture (using a reconfigurable co-processor), using compiler optimizations, and at bit level, making the most of the resources available at the processor. We have developed a framework to evaluate implementations of an algorithm including the effects introduced by the compiler. We consider the presence of an expert attacker with great knowledge on the application and the device. Regarding SCA, we have presented a new differential SCA that performs better than traditional SCA on software FSR-based algorithms, where the leaked values are similar between rounds. SORU2 is a reconfigurable vector co-processor. It has been developed to reduce energy consumption in loop-based applications with parallelism. In addition, we propose its use for secure implementations of FSR-based algorithms. The cost overhead is discarded as the co-processor is not exclusively dedicated to the encryption algorithm. We present a co-processor configuration that executes multiple simultaneous encryptions, using different implementations and keys. From a basic implementation, which is proved to be vulnerable to SCA, we obtain an implementation where the SCA applied were unsuccessful. At compiler level, we use the framework to evaluate the effect of sequences of compiler optimization passes on a software implementation. There are many optimization passes available. The optimization sequences are combinations of the available passes. The amount of sequences is extremely high. The framework includes an algorithm for the selection of interesting sequences that require detailed evaluation. As existing compiler optimizations transform the software implementation, using different optimization sequences we can automatically generate different implementations. We propose to randomly switch between the generated implementations to increase the resistance against SCA.We propose two countermeasures. The results show that, although they increase the resistance against SCA, the resulting implementations are not secure. At bit level, we propose to exploit bit level parallelism of FSR-based implementations using pseudo bitslice implementation in a wireless node processor. The bitslice implementation is automatically obtained from the Algebraic Normal Form of the algorithm. The results show a performance improvement, avoiding timing information leakage, but increasing the vulnerability against differential SCA.We provide a secure version of the algorithm by randomly discarding part of the data obtained. The overhead in performance is negligible when compared to the original implementations. To summarize, we have proposed a set of original countermeasures at different levels that introduce randomness in FSR-based algorithms avoiding a heavy overhead on the resources required.