900 resultados para Plasmonic devices
Resumo:
Since 1994, Canada, the United Kingdom and Australia have adopted new choice of law rules for cross-border torts that, in different ways, centre on the application of the law of the place where the tort occurred (the lex loci delicti). All three countries abandoned some species of the rule in Phillips v Eyre, which required some reference to the law of the forum (the lex fori) as well as the lex loci delicti. However, predictions were made that, where possible, courts in these countries would continue to show a strong inclination to apply the lex fori in cross-border tort cases - and would use a range of homing devices to do so. A comprehensive survey and analysis of the cases that have been decided under the Australian, British and Canadian lex loci delicti regimes suggests that courts in these countries do betray a homing instinct, but one that has actually been tightly restrained by appeal courts. Where application of the lex fori was formally allowed by use of a 'flexible exception' in Canada and the United Kingdom, this has been contained by courts of first appeal. Indeed, only the continuing characterization of the assessment of damages as a procedural question in Canada and the United Kingdom, seems to remain as a significant homing device for courts in these countries. © 2006 Oxford University Press.
Resumo:
Online multimedia data needs to be encrypted for access control. To be capable of working on mobile devices such as pocket PC and mobile phones, lightweight video encryption algorithms should be proposed. The two major problems in these algorithms are that they are either not fast enough or unable to work on highly compressed data stream. In this paper, we proposed a new lightweight encryption algorithm based on Huffman error diffusion. It is a selective algorithm working on compressed data. By carefully choosing the most significant parts (MSP), high performance is achieved with proper security. Experimental results has proved the algorithm to be fast. secure: and compression-compatible.
Resumo:
We describe a tool for analysing information flow in security hardware. It identifies both sub-circuits critical to the preservation of security as well as the potential for information flow due to hardware failure. The tool allows for the composition of both logical and physical views of circuit designs. An example based on a cryptographic device is provided.
Resumo:
Bifurcation analysis is a very useful tool for power system stability assessment. In this paper, detailed investigation of power system bifurcation behaviour is presented. One and two parameter bifurcation analysis are conducted on a 3-bus power system. We also examined the impact of FACTS devices on power system stability through Hopf bifurcation analysis by taking static Var compensator (SVC) as an example. A simplified first-order model of the SVC device is included in the 3-bus sample system. Real and reactive powers are used as bifurcation parameter in the analysis to compare the system oscillatory properties with and without SVC. The simulation results indicate that the linearized system model with SVC enlarge the voltage stability boundary by moving Hopf bifurcation point to higher level of loading conditions. The installation of SVC increases the dynamic stability range of the system, however complicates the Hopf bifurcation behavior of the system