965 resultados para cyclic code
Resumo:
The structures of the compounds from the reaction of cis-cyclohexane-1,2-dicarboxylic anhydride with 4-chloroaniline [rac-N-(4-chlorophenyl)-2-carboxycycloclohexane-1-carboxamide] (1), 4-bromoaniline [2-(4-bromophenyl)-perhydroisoindolyl-1,3-dione] (2) and 3-hydroxy-4-carboxyaniline (5-aminosalicylic acid) [2-(3-hydroxy-4-carboxyphenyl)-perhydroisoindolyl-1,3-dione] (3) have been determined at 200 K. Crystals of the open-chain amide carboxylic acid 1 are orthorhombic, space group Pbcn, with unit cell dimensions a = 20.1753(10), b = 8.6267(4), c = 15.9940(9) Å, and Z = 8. Compounds 2 and 3 are cyclic imides, with 1 monoclinic having space group P21 and cell dimensions a = 11.5321(3), b = 6.7095(2), c = 17.2040(5) Å, β = 102.527(3)o. Compound 3 is orthorhombic with cell dimensions a = 6.4642(3), b = 12.8196(5), c = 16.4197(7) Å. Molecules of 1 form hydrogen-bonded cyclic dimers which are extended into a two-dimensional layered structure through amide-group associations: 3 forms into one-dimensional zigzag chains through carboxylic acid…imide O-atom hydrogen bonds, while compound 2 is essentially unassociated. With both cyclic imides 2 and 3, disorder is found which involves the presence of partial enantiomeric replacement of the cis-cyclohexane-1,2-substituted ring systems.
Resumo:
The present paper presents and discusses the use of dierent codes regarding the numerical simulation of a radial-in ow turbine. A radial-in ow turbine test case was selected from published literature [1] and commercial codes (Fluent and CFX) were used to perform the steady-state numerical simulations. An in-house compressible- ow simulation code, Eilmer3 [2] was also adapted in order to make it suitable to perform turbomachinery simulations and preliminary results are presented and discussed. The code itself as well as its adaptation, comprising the addition of terms for the rotating frame of reference, programmable boundary conditions for periodic boundaries and a mixing plane interface between the rotating and non-rotating blocks are also discussed. Several cases with dierent orders of complexity in terms of geometry were considered and the results were compared across the dierent codes. The agreement between these results and published data is also discussed.
Resumo:
Refactoring is a common approach to producing better quality software. Its impact on many software quality properties, including reusability, maintainability and performance, has been studied and measured extensively. However, its impact on the information security of programs has received relatively little attention. In this work, we assess the impact of a number of the most common code-level refactoring rules on data security, using security metrics that are capable of measuring security from the viewpoint of potential information flow. The metrics are calculated for a given Java program using a static analysis tool we have developed to automatically analyse compiled Java bytecode. We ran our Java code analyser on various programs which were refactored according to each rule. New values of the metrics for the refactored programs then confirmed that the code changes had a measurable effect on information security.
Resumo:
This article suggests that the issue of proportionality in anti-doping sanctions has been inconsistently dealt with by the Court of Arbitration for Sport (CAS). Given CAS’s pre-eminent role in interpreting and applying the World Anti-Doping Code under the anti-doping policies of its signatories, an inconsistent approach to the application of the proportionality principle will cause difficulties for domestic anti-doping tribunals seeking guidance as to the appropriateness of their doping sanctions.
Resumo:
User interfaces for source code editing are a crucial component in any software development environment, and in many editors visual annotations (overlaid on the textual source code) are used to provide important contextual information to the programmer. This paper focuses on the real-time programming activity of ‘cyberphysical’ programming, and considers the type of visual annotations which may be helpful in this programming context.
Resumo:
The first version of the Standard PREanalytical Code (SPREC) was developed in 2009 by the International Society for Biological and Environmental Repositories (ISBER) Biospecimen Science Working Group to facilitate documentation and communication of the most important preanalytical quality parameters of different types of biospecimens used for research. This same Working Group has now updated the SPREC to version 2.0, presented here, so that it contains more options to allow for recent technological developments. Existing elements have been fine tuned. An interface to the Biospecimen Reporting for Improved Study Quality (BRISQ) has been defined, and informatics solutions for SPREC implementation have been developed. A glossary with SPRECrelated definitions has also been added.
Resumo:
When crest-fixed thin steel roof cladding systems are subjected to wind uplift, local pull-through or pull-out failures occur prematurely at their screwed connections. During high wind events such as storms and cyclones these localised failures then lead to severe damage to buildings and their contents. In recent times, the use of thin steel battens/purlins has increased considerably. This has made the pull-out failures more critical in the design of steel cladding systems. Recent research has developed a design formula for the static pull-out strength of steel cladding systems. However, the effects of fluctuating wind uplift loading that occurs during high wind events are not known. Therefore a series of constant amplitude cyclic tests has been undertaken on connections between steel battens made of different thicknesses and steel grades, and screw fasteners with varying diameter and pitch. This paper presents the details of these cyclic tests and the results.
Resumo:
Introduction Stretching of tissue stimulates angiogenesis but increased motion at a fracture site hinders revascularisation. In vitro studies have indicated that mechanical stimuli promote angiogenic responses in endothelial cells, but can either inhibit or enhance responses when applied directly to angiogenesis assays. We anticipated that cyclic tension applied during endothelial network assembly would increase vascular structure formation up to a certain threshold. Methods Fibroblast/HUVEC co-cultures were subjected to cyclic equibiaxial strain (1 Hz; 6 h/day; 7 days) using the FlexerCell FX-4000T system and limiting rings for simultaneous application of multiple strain magnitudes (0–13%). Cells were labelled using anti-PECAM-1, and image analysis provided measures of endothelial network length and numbers of junctions. Results Cyclic stretching had no significant effect on the total length of endothelial networks (P > 0.2) but resulted in a strain-dependent decrease in branching and localised alignments of endothelial structures, which were in turn aligned with the supporting fibroblastic construct. Conclusion The organisation of endothelial networks under cyclic strain is dominated by structural adaptation to the supporting construct. It may be that, in fracture healing, the formation and integrity of the granulation tissue and callus is ultimately critical in revascularisation and its failure under severe strain conditions.
Resumo:
The three-volume Final Report of the Wood inquiry into NSW Police (Royal Commission Into the New South Wales Police Service, 'Final Report, Vol I: Corruption; Vol II: Reform; Vol III: Appendices', May 1997) was publicly released on 15 May 1997, to much media fanfare. The Sydney Morning Herald (SMH) devoted an 8-page special report on I May to the pending release of the Inquiry Report, headed The Police Purge. On the day of the public release of the Report, the SMH five-page 'Special Report' under the banner The Police Verdict was headlined Wood, Carr Split on Drugs. The Australian led with Call for Drug Law Revamp, Force Overhaul to Fight Corruption, Wood Attacks Culture of Greed, and the Daily Telegraph front page 'Final Verdict' was True Blue Strategy for an Honest Police Force...
Resumo:
In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.
Resumo:
Modern genetic research holds out the promise of a bold new future in which humanity has identified and conquered the genetic roots of many diseases. Genetic science also promises to shed light on who we are, what it is that makes us tick, what it is that makes us the way we are — in short, what it is that makes us human. Yet while genetics are a potential saviour (saving us from disease), it also appears as a threat that at the extremes appears to be the stuff of our worst nightmares, such as the prospect, probably more imagined than real, of rows of cloned individuals. The new genetics hold out the promise that through genetics we will be able to determine what we are, a promise that is simultaneously appealing and terrifying. This chapter discusses the cloning of people and parts, the law’s response to cloning, genetics and diversity, a framework for law reform.
Resumo:
Theory suggests that CCBCC (1) will rearrange to planar cyclo-C4B (19) if the excess energy of 1 is greater than or equal to16.1 kcal mol(-1) [calculations at the CCSD(T)/aug-cc-pVTZ//B3LYP/6-31G(d) level of theory]. Cyclo-C4B lies only 1.1 kcal mol(-1) above CCBCC. The planar nature of symmetrical cyclo-C4B is attributed to multicentered bonding involving boron. If cyclo-C4B (19) has an excess energy of greater than or equal to24.4 kcal mol-1, it may ring open to form CCCCB (3).