935 resultados para Promotional messages


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this work, we present an investigation on Pt/graphene/GaN devices for hydrogen gas sensing applications. The graphene layer was deposited on GaN substrate using a chemical vapour deposition (CVD) technique and was characterised via Raman and X-ray photoelectron spectroscopy. The current-voltage (I-V) and dynamic response of the developed devices were investigated in forward and reverse bias operation at an optimum temperature of 160°C. Voltage shifts of 661.1 and 484.9 mV were recorded towards 1% hydrogen at forward and reverse constant bias current of 1 mA, respectively.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Titanium oxide nanotubes Schottky diodes were fabricated for hydrogen gas sensing applications. The TiO2 nanotubes were synthesized via anodization of RF sputtered titanium films on SiC substrates. Two anodization potentials of 5 V and 20 V were used. Scanning electron microscopy of the synthesized films revealed nanotubes with avarage diameters of 20 nm and 75 nm. X-ray diffraction analysis revealed that the composition of the oxide varied with the anodization potential. TiO2 (anatase) being formed preferentially at 5 V and TiO (no anatase) at 20 V. Current-voltage characteristics of the diodes were studied towards hydrogen at temperatures from 25°C to 250°C. At constant current bias of −500 μA and 250°C, the lateral voltage shifts of 800 mV and 520 mV were recorded towards 1% hydrogen for the 5 V and 20 V anodized nanotubes, respectively.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we present gas sensing properties of Pt/graphene-like nano-sheets towards hydrogen gas. The graphene-like nano-sheets were produced via the reduction of spray-coated graphite oxide deposited on SiC substrates by hydrazine vapor. Structural and morphological characterizations of the graphene sheets were analyzed by scanning electron and atomic force microscopy. Current-voltage and dynamic responses of the sensors were investigated towards different concentrations of hydrogen gas in a synthetic air mixture at 100°C. A voltage shift of 100 mV was recorded at 1 mA reverse bias current.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Presented is the material and gas sensing properties of graphene-like nano-sheets deposited on 36° YX lithium tantalate (LiTaO3) surface acoustic wave (SAW) transducers. The graphene-like nano-sheets were characterized via scanning electron microscopy (SEM), atomic force microscopy(AFM)and X-ray photoelectron spectroscopy (XPS). The graphenelike nano-sheet/SAW sensors were exposed to different concentrations of hydrogen (H2) gas in a synthetic air at room temperature. The developed sensors exhibit good sensitivity towards low concentrations of H2 in ambient conditions, as well as excellent dynamic performance towards H2 at room temperature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pt/SnO2 nanowires/SiC based metal-oxidesemiconductor (MOS) devices were fabricated and tested for their gas sensitivity towards hydrogen. Tin oxide (SnO2) nanowires were grown on SiC substrates by the vapour liquid solid growth process. The material properties of the SnO2 nanowires such as its formation and dimensions were analyzed using scanning electron microscopy (SEM). The currentvoltage (I-V) characteristics at different hydrogen concentrations are presented. The effective change in the barrier height for 0.06 and 1% hydrogen were found to be 20.78 and 131.59 meV, respectively. A voltage shift of 310 mV at 530°C for 1% hydrogen was measured.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an Image Based Visual Servo control design for Fixed Wing Unmanned Aerial Vehicles tracking locally linear infrastructure in the presence of wind using a body fixed imaging sensor. Visual servoing offers improved data collection by posing the tracking task as one of controlling a feature as viewed by the inspection sensor, although is complicated by the introduction of wind as aircraft heading and course angle no longer align. In this work it is shown that the effects of wind alter the desired line angle required for continuous tracking to equal the wind correction angle as would be calculated to set a desired course. A control solution is then sort by linearizing the interaction matrix about the new feature pose such that kinematics of the feature can be augmented with the lateral dynamics of the aircraft, from which a state feedback control design is developed. Simulation results are presented comparing no compensation, integral control and the proposed controller using the wind correction angle, followed by an assessment of response to atmospheric disturbances in the form of turbulence and wind gusts

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reports the results of a mixed method approach to answer: what are the cultural values that impact on e-service use in Saudi Arabia? Cultural theories, dimensions, and models previously identified in the literature, in addition to individual interviews and focus groups, test the current identified uncovered elements of Saudi culture. This paper will firstly, introduce the importance of culture and define the aspects of Saudi culture. It will then describe the method used and present the questionnaire findings. All of the tested hypotheses were found consistent with their predicted outcomes except hypotheses 4 and 8 were partially consistent. It is evidenced that consideration of the impact of the cultural values will mainly contribute to the enhancement of social and organisational aspects of e-society research and practices, by deeply understanding them as of the influntials to e-service implementation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper addresses the problem of automatically estimating the relative pose between a push-broom LIDAR and a camera without the need for artificial calibration targets or other human intervention. Further we do not require the sensors to have an overlapping field of view, it is enough that they observe the same scene but at different times from a moving platform. Matching between sensor modalities is achieved without feature extraction. We present results from field trials which suggest that this new approach achieves an extrinsic calibration accuracy of millimeters in translation and deci-degrees in rotation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This text explores the area of advertising and promotion practice. It shows how real organisations coordinate the various elements of the promotional mix with other marketing activities."--Provided by publisher

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an alternative approach to image segmentation by using the spatial distribution of edge pixels as opposed to pixel intensities. The segmentation is achieved by a multi-layered approach and is intended to find suitable landing areas for an aircraft emergency landing. We combine standard techniques (edge detectors) with novel developed algorithms (line expansion and geometry test) to design an original segmentation algorithm. Our approach removes the dependency on environmental factors that traditionally influence lighting conditions, which in turn have negative impact on pixel-based segmentation techniques. We present test outcomes on realistic visual data collected from an aircraft, reporting on preliminary feedback about the performance of the detection. We demonstrate consistent performances over 97% detection rate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a recursive strategy for online detection of actuator faults on a unmanned aerial system (UAS) subjected to accidental actuator faults. The proposed detection algorithm aims to provide a UAS with the capability of identifying and determining characteristics of actuator faults, offering necessary flight information for the design of fault-tolerant mechanism to compensate for the resultant side-effect when faults occur. The proposed fault detection strategy consists of a bank of unscented Kalman filters (UKFs) with each one detecting a specific type of actuator faults and estimating correspond- ing velocity and attitude information. Performance of the proposed method is evaluated using a typical nonlinear UAS model and it is demonstrated in simulations that our method is able to detect representative faults with a sufficient accuracy and acceptable time delay, and can be applied to the design of fault-tolerant flight control systems of UASs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric ciphers can be provided by either stream ciphers with built in authentication mechanisms or block ciphers using appropriate modes of operation. However, stream ciphers have the potential for higher performance and smaller footprint in hardware and/or software than block ciphers. This property makes stream ciphers suitable for resource constrained environments, where storage and computational power are limited. There have been several recent stream cipher proposals that claim to provide AE. These ciphers can be analysed using existing techniques that consider confidentiality or integrity separately; however currently there is no existing framework for the analysis of AE stream ciphers that analyses these two properties simultaneously. This thesis introduces a novel framework for the analysis of AE using stream cipher algorithms. This thesis analyzes the mechanisms for providing confidentiality and for providing integrity in AE algorithms using stream ciphers. There is a greater emphasis on the analysis of the integrity mechanisms, as there is little in the public literature on this, in the context of authenticated encryption. The thesis has four main contributions as follows. The first contribution is the design of a framework that can be used to classify AE stream ciphers based on three characteristics. The first classification applies Bellare and Namprempre's work on the the order in which encryption and authentication processes take place. The second classification is based on the method used for accumulating the input message (either directly or indirectly) into the into the internal states of the cipher to generate a MAC. The third classification is based on whether the sequence that is used to provide encryption and authentication is generated using a single key and initial vector, or two keys and two initial vectors. The second contribution is the application of an existing algebraic method to analyse the confidentiality algorithms of two AE stream ciphers; namely SSS and ZUC. The algebraic method is based on considering the nonlinear filter (NLF) of these ciphers as a combiner with memory. This method enables us to construct equations for the NLF that relate the (inputs, outputs and memory of the combiner) to the output keystream. We show that both of these ciphers are secure from this type of algebraic attack. We conclude that using a keydependent SBox in the NLF twice, and using two different SBoxes in the NLF of ZUC, prevents this type of algebraic attack. The third contribution is a new general matrix based model for MAC generation where the input message is injected directly into the internal state. This model describes the accumulation process when the input message is injected directly into the internal state of a nonlinear filter generator. We show that three recently proposed AE stream ciphers can be considered as instances of this model; namely SSS, NLSv2 and SOBER-128. Our model is more general than a previous investigations into direct injection. Possible forgery attacks against this model are investigated. It is shown that using a nonlinear filter in the accumulation process of the input message when either the input message or the initial states of the register is unknown prevents forgery attacks based on collisions. The last contribution is a new general matrix based model for MAC generation where the input message is injected indirectly into the internal state. This model uses the input message as a controller to accumulate a keystream sequence into an accumulation register. We show that three current AE stream ciphers can be considered as instances of this model; namely ZUC, Grain-128a and Sfinks. We establish the conditions under which the model is susceptible to forgery and side-channel attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The research reported here addresses the problem of athlete off-field behaviours as they influence sports’ sponsors, particularly the achievement of sponsorship objectives. The question arises because of incidents of sponsorship contract cancellation following news-media reporting of athletes’ off-field behaviours. Two studies are used to investigate the research question; the first establishes the content of news-media reports, and the second tests the effects of news’ reports on athlete, team and sponsor evaluations using an experimental design. Key assumptions of the research are that sponsorship objectives are principally consumer-based and mediated. Models of sponsorship argue that sponsors aim to reach and influence consumers through sponsees. Assuming this pathway exists is central to sponsorship activities. A corollary is that other mediators, in this case the news-media, may also communicate (uncontrollable) messages such that a consumer audience may be told of negative news that may then be associated with the sponsor. When sponsors cancel contracts it is assumed that their goal is to control the links between their brand and a negative referent. Balance theory is used to discuss the potential effects of negative off-field behaviours of athletes on sponsor’s objectives. Heider’s balance theory (1958) explains that individuals prefer to evaluate linked individuals or entities consistently. In the sponsorship context this presents the possibility that a negative evaluation of the athlete’s behaviour will contribute to correspondingly negative evaluations of the athlete’s team and sponsors. A content analysis (Study 1) was used to survey the types of athlete off-field behaviours commonly reported in a newspaper. In order to provide a local context for the research, articles from the Courier Mail were sampled and teams in the National Rugby League (NRL) competition were the focus of the research. The study identified nearly 2000 articles referring to the NRL competition; 258 of those refer to off-field incidents involving athletes. The various types of behaviours reported include assault, sexual assault allegations, driving under the influence of alcohol, illicit drug use, breaches of club rules, and positive off-field activities (i.e., charitable activities). An experiment (Study 2) tested three news’ article stimuli developed from the behaviours identified in Study 1 in a between-subjects design. A measure of Identification with the Team was used as a covariate variable in the Multivariate Analysis of Covariance analysis. Social identity theory suggests that when an individual identifies with a group, their attitudes and behaviours towards both in- and out-group members are modified. Use of Identification with the Team as a covariate acknowledges that respondents will evaluate behaviours differently according to the attribution of those behaviours to an in- or out-group member. Findings of the research suggest that the news’ article stimuli have significant, large effects on evaluations of athlete off-field behaviour and athlete Likability. Consistent with pretest results, charitable fundraising is regarded as extremely positive; the athlete, correspondingly, is likable. Assault is evaluated as extremely negative, and the athlete as unlikable. DUI scores reveal that the athlete’s behaviour is very negative; however, the athlete’s likability was evaluated as neutral. Treatment group does not produce any significant effects on team or sponsor variables. This research also finds that Identification with the Team has significant, large effects on team variables (Attitude toward the Brand and Corporate Image). Identification also has a significant large effect on athlete Likability, but not on Attitude toward the Act. Identification with the Team does not produce any significant effects on sponsor variables. The results of this research suggest that sponsor’s consumer-based objectives are not threatened by newspaper reports linking athlete off-field behaviour with their brand. Evaluations of sponsor variables (Attitude toward the Sponsor’s Brand and Corporate Image) were consistently positive. Variance in that data, however, cannot be attributed to experimental stimuli or Identification with the Team. These results argue that respondents may regard sponsorships, in principle, as good. Although it is good news for sponsors that negative evaluations of athletes will not produce correspondingly negative evaluations of consumer-based sponsorship objectives, the results indicate problems for sponsorship managers. The failure of Identification with the Team to explain sponsor variable variance indicates that the sponsor has not been evaluated as a linked entity in a relationship with the sporting team and athlete in this research. This result argues that the sponsee-mediated affective communication path that sponsors aim use to communicate with desirable publics is not necessarily a path available to them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nonthermal plasma (NTP) treatment of exhaust gas is a promising technology for both nitrogen oxides (NOX) and particulate matter (PM) reduction by introducing plasma into the exhaust gases. This paper considers the effect of NTP on PM mass reduction, PM size distribution, and PM removal efficiency. The experiments are performed on real exhaust gases from a diesel engine. The NTP is generated by applying high-voltage pulses using a pulsed power supply across a dielectric barrier discharge (DBD) reactor. The effects of the applied high-voltage pulses up to 19.44 kVpp with repetition rate of 10 kHz are investigated. In this paper, it is shown that the PM removal and PM size distribution need to be considered both together, as it is possible to achieve high PM removal efficiency with undesirable increase in the number of small particles. Regarding these two important factors, in this paper, 17 kVpp voltage level is determined to be an optimum point for the given configuration. Moreover, particles deposition on the surface of the DBD reactor is found to be a significant phenomenon, which should be considered in all plasma PM removal tests.