944 resultados para Convolutional codes over finite rings
Resumo:
We have used a tandem pair of supersonic nozzles to produce clean samples of CH3OO radicals in cryogenic matrices. One hyperthermal nozzle decomposes azomethane (CH3NNCH3) to generate intense pulses of CH3 radicals, While the second nozzle alternately fires a burst Of O-2/Ar at the 20 K matrix. The CH3/O-2/20 K argon radical sandwich acts to produce target methylperoxyl radicals: CH3 + O-2 --> CH3OO. The absorption spectra of the radicals are monitored with a Fourier transform infrared spectrometer. We report 10 of the 12 fundamental infrared bands of the methylperoxyl radical CH3OO, (X) over tilde (2)A", in an argon matrix at 20 K. The experimental frequencies (cm(-1)) and polarizations follow: the a' modes are 3032, 2957, 1448, 1410, 1180, 1109, 90, 492, while the a" modes are 3024 and 1434. We cannot detect the asymmetric CH3 rocking mode, nu(11), nor the torsion, nu(12). The infrared spectra of (CH3OO)-O-18-O-18, (CH3OO)-C-13, and CD3OO have been measured as well in order to determine the isotopic shifts. The experimental frequencies, {nu}, for the methylperoxyl radicals are compared to harmonic frequencies, {omega}, resulting from a UB3LYP/6-311G(d,p) electronic structure calculation. Linear dichroism spectra were measured with photooriented radical samples in order to establish the experimental polarizations of most vibrational bands. The methylperoxyl radical matrix frequencies listed above are within +/-2% of the gas-phase vibrational frequencies. A final set of vibrational frequencies for the H radical, are recommended. See also http://ellison.colorado.edu/methylperoxyl.
Resumo:
Finite element models of bones can be created by deriving geometry from anx-ray CT scan. Material properties such as the elastic modulus can then be applied using either a single or set of homogeneous values, or individual elements can have local values mapped onto them. Values for the elastic modulus can be derived from the CT density values using an elasticityversus density relationship. Many elasticity–density relationships have been reported in the literature for human bone. However, while ovine in vivo models are common in orthopaedic research, no work has been done to date on creating FE models of ovine bones. To create these models and apply relevant material properties, an ovine elasticity-density relationship needs to be determined. Using fresh frozen ovine tibias the apparent density of regions of interest was determined from a clinical CT scan. The bones were the sectioned into cuboid samples of cortical bone from the regions of interest. Ultrasound was used to determine the elastic modulus in each of three directions – longitudinally, radially and tangentially. Samples then underwent traditional compression testing in each direction. The relationships between apparent density and both ultrasound, and compression modulus in each directionwere determined. Ultrasound testing was found to be a highly repeatable non-destructive method of calculating the elastic modulus, particularly suited to samples of this size. The elasticity-density relationships determined in the longitudinal direction were very similar between the compression and ultrasound data over the density range examined.A clear difference was seen in the elastic modulus between the longitudinal and transverse directions of the bone samples, and a transverse elasticity-density relationship is also reported.
Resumo:
PURPOSE To investigate changes in the characteristics of the corneal optics, total optics, anterior biometrics and axial length of the eye during a near task, in downward gaze, over 10 min. METHODS Ten emmetropes (mean - 0.14 ± 0.24 DS) and 10 myopes (mean - 2.26 ± 1.42 DS) aged from 18 to 30 years were recruited. To measure ocular biometrics and corneal topography in downward gaze, an optical biometer (Lenstar LS900) and a rotating Scheimpflug camera (Pentacam HR) were inclined on a custom built, height and tilt adjustable table. The total optics of the eye were measured in downward gaze with binocular fixation using a modified Shack-Hartmann wavefront sensor. Initially, subjects performed a distance viewing task at primary gaze for 10 min to provide a "wash-out" period for prior visual tasks. A distance task (watching video at 6 m) in downward gaze (25°) and a near task (watching video on a portable LCD screen with 2.5 D accommodation demand) in primary gaze and 25°downward gaze were then carried out, each for 10 min in a randomized order. During measurements, in dichoptic view, a Maltese cross was fixated with the right (untested) eye and the instrument’s fixation target was fixated with the subject’s tested left eye. Immediately after (0 min), 5 and 10 min from the commencement of each trial, measurements of ocular parameters were acquired in downward gaze. RESULTS Axial length exhibited a significant increase with downward gaze and accommodation over time (p<0.05). The greatest axial elongation was observed in downward gaze with 2.5 D accommodation after 10 min (mean change from baseline 23±3 µm). Downward gaze also caused greater changes in anterior chamber depth (ACD) and lens thickness (LT) with accommodation (ACD mean change -163±12µm at 10 min; LT mean change 173±17 µm at 10 min) compared to primary gaze with accommodation (ACD mean change -138±12µm at 10 min; LT mean change 131±15 µm at 10 min). Both corneal power and total ocular power changed by a small but significant amount with downward gaze (p<0.05), resulting in a myopic shift (~0.10 D) in the spherical power of the eye compared with primary gaze. CONCLUSION The axial length, anterior biometrics and ocular refraction change significantly with accommodation in downward gaze as a function of time. These findings provide new insights into the optical and bio-mechanical changes of the eye during typical near tasks.
Resumo:
In Baker Johnson Lawyers v Jorgensen [2002] QDC 205 McGill DCJ considered the meaning of a 'no win, no fee' retainer and concluded that, in the absence of qualification by agreement, solicitors retained on that basis were not entitled to recover costs exceeding the amount of any judgment or settlement.
Resumo:
This paper presents an investigation on the cause of severe vibration problem of a coach with four-cylinder engine running at an idle state using vibration and impact hammer modal experiments to obtain the main vibration frequency components and the natural characteristics of the coach. The vibration results indicate that the main vibration component comes from the vibration transmitted from the engine to the chassis frame, which is closely related with the engine idle speed. Based on structural simulation analysis of the coach’s chassis frame and comparison with modal testing, the coach severe vibration problem was due to coupling resonance between the engine idle frequency and the fourth natural frequency of the chassis frame. The solution to eliminate the vibration problem is provided by changing the local structure stiffness of the chassis frame. The contribution of this paper lies in providing a solution to solve similar problems.
Resumo:
Fractional differential equations have been increasingly used as a powerful tool to model the non-locality and spatial heterogeneity inherent in many real-world problems. However, a constant challenge faced by researchers in this area is the high computational expense of obtaining numerical solutions of these fractional models, owing to the non-local nature of fractional derivatives. In this paper, we introduce a finite volume scheme with preconditioned Lanczos method as an attractive and high-efficiency approach for solving two-dimensional space-fractional reaction–diffusion equations. The computational heart of this approach is the efficient computation of a matrix-function-vector product f(A)bf(A)b, where A A is the matrix representation of the Laplacian obtained from the finite volume method and is non-symmetric. A key aspect of our proposed approach is that the popular Lanczos method for symmetric matrices is applied to this non-symmetric problem, after a suitable transformation. Furthermore, the convergence of the Lanczos method is greatly improved by incorporating a preconditioner. Our approach is show-cased by solving the fractional Fisher equation including a validation of the solution and an analysis of the behaviour of the model.
Resumo:
A combined experimental and numerical program was conducted to study the in-plane shear behaviour of hollow concrete masonry panels containing reinforced grout cores. This paper is focused on the numerical program. A two dimensional macromodelling strategy was used to simulate the behaviour of the confined masonry (CM) shear panels. Both the unreinforced masonry and the confining element were modelled using macromasonry properties and the steel reinforcement was modelled as an embedded truss element located within the grout using perfectly bonded constraint. The FE model reproduced key behaviours observed in the experiments, including the shear strength, the deformation and the crack patterns of the unconfined and confined masonry panels. The predictions of the validated model were used to evaluate the existing in-plane shear expressions available in the national masonry standards and research publications.
Resumo:
The work investigates cheating prevention in secret sharing. It is argued that cheating is immune against cheating if the cheaters gain no advantage over honest participants by submitting invalid shares to the combiner. This work addresses the case when shares and the secret are taken from GF(pt). Two models are considered. The first one examines the case when cheaters consistently submit always invalid shares. The second modeldeal s with cheaters who submit a mixture of valid and invalid shares. For these two models, cheating immunity is defined, properties of cheating immune secret sharing are investigated and their constructions are given.
Resumo:
We consider the following problem: users in a dynamic group store their encrypted documents on an untrusted server, and wish to retrieve documents containing some keywords without any loss of data confidentiality. In this paper, we investigate common secure indices which can make multi-users in a dynamic group to obtain securely the encrypted documents shared among the group members without re-encrypting them. We give a formal definition of common secure index for conjunctive keyword-based retrieval over encrypted data (CSI-CKR), define the security requirement for CSI-CKR, and construct a CSI-CKR based on dynamic accumulators, Paillier’s cryptosystem and blind signatures. The security of proposed scheme is proved under strong RSA and co-DDH assumptions.
Resumo:
The deformation of a rectangular block into an annular wedge is studied with respect to the state of swelling interior to the block. Nonuniform swelling fields are shown to generate these flexure deformations in the absence of resultant forces and bending moments. Analytical expressions for the deformation fields demonstrate these effects for both incompressible and compressible generalizations of conventional hyperelastic materials. Existing results in the absence of a swelling agent are recovered as special cases.
Resumo:
We observe that MDS codes have interesting properties that can be used to construct ideal threshold schemes. These schemes permit the combiner to detect cheating, identify cheaters and recover the correct secret. The construction is later generalised so the resulting secret sharing is resistant against the Tompa-Woll cheating.
Resumo:
We study the multicast stream authentication problem when an opponent can drop, reorder and inject data packets into the communication channel. In this context, bandwidth limitation and fast authentication are the core concerns. Therefore any authentication scheme is to reduce as much as possible the packet overhead and the time spent at the receiver to check the authenticity of collected elements. Recently, Tartary and Wang developed a provably secure protocol with small packet overhead and a reduced number of signature verifications to be performed at the receiver. In this paper, we propose an hybrid scheme based on Tartary and Wang’s approach and Merkle hash trees. Our construction will exhibit a smaller overhead and a much faster processing at the receiver making it even more suitable for multicast than the earlier approach. As Tartary and Wang’s protocol, our construction is provably secure and allows the total recovery of the data stream despite erasures and injections occurred during transmission.
Resumo:
The effect of an ordered array of nanocones on a conducting substrate immersed in the plasma on the transport of the plasma ions is investigated. The real conical shape of the cones is rigorously incorporated into the model. The movement of 10^5 CH3+ ions in the plasma sheath modified by the nanocone array is simulated. The ions are driven by the electric fields produced by the sheath and the nanostructures. The surface charge density and the total charge on the nanotips with different aspect ratios are computed. The ion transport simulation provides important characteristics of the displacement and velocity of the ions. The relative ion distribution along the lateral surfaces of the carbon nanotips is computed as well. It is shown that a rigorous account of the realistic nanostructure shape leads to very different distribution of the ion fluxes on the nanostructured surfaces compared to the previously reported works. The ion flux distribution is a critical factor in the nucleation process on the substrate and determines the nanostructure growth patterns.
Resumo:
Passively protected railway crossings are a major rail safety issue in Australia. Such crossings cannot be upgraded as such crossings are too numerous and the cost involved is prohibitive. Advanced Driver Assistance Systems (ADAS) have been shown to improve road safety and are widely used. These systems could be a solution to improve safety of passively protected crossings at a lower cost. Such complementary ADAS could result in driver’s over-trust due to the absence of Humane Machine Interface reflecting the quality of the information or the state of the ADAS (failure status). This paper demonstrates that driver’s exposure to crossing exhibiting fail-safe and non-fail safe properties could result in improperly allocating trust between technologies. We conducted a driving simulator study where participants (N=58) were exposed to three types of level crossing warning system on passive and active crossings. The results show that a significant proportion of participants over-trust the ADAS. Such drivers exhibit the same driving performance with the ADAS as when exposed to infrastructure based active crossing protection. They do not take the necessary safety precautions as they have a faster speed approach, reduced number of gaze toward the rail tracks and fail to stop at the crossing.