930 resultados para Architectural Design and Urban Planning.


Relevância:

100.00% 100.00%

Publicador:

Resumo:

We have proposed a novel type of photonic crystal fiber (PCF) with low dispersion and high nonlinearity for four-wave mixing. This type of fiber is composed of a solid silica core and a cladding with a squeezed hexagonal lattice elliptical airhole along the fiber length. Its dispersion and nonlinearity coefficient are investigated simultaneously by using the full vectorial finite element method. Numerical results show that the proposed highly nonlinear low-dispersion fiber has a total dispersion as low as +/- 2.5 ps nm(-1) km(-1) over an ultrabroad wavelength range from 1.43 to 1.8 mu m, and the corresponding nonlinearity coefficient and birefringence are about 150 W-1 km(-1) and 2.5 x 10(-3) at 1.55 mu m, respectively. The proposed PCF with low ultraflattened dispersion, high nonlinearity, and high birefringence can have important application in four-wave mixing. (C) 2010 Optical Society of America

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An RF system for the CSRe (cooling storage experimental ring) is designed and manufactured domestically. The present paper mainly describes the RF system design in five main sections: ferrite ring, RF cavity, RF generator, low level system and cavity cooling. The cavity is based on a type of coaxial resonator which is shorted at the end with one gap and loaded with domestic ferrite rings. The RF generator is designed in the push-pull mode and the low level control system is based on a DSP+FGPA+DDS+USB inter...

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, to design a new preamplifier for optimum performances with charged-particle or heavy-ion detectors, the CMOS FET is implemented as a feedback capacitor C-fp, so that the entire system should be built only with MOSFET. This work is a revolution design because to realize an ASIC for a preamplifier circuit, the capacitor will also be included. We succeed after a simulation to maintain a rise time less than 3 ns, the output resistance less than 94 Omega and the linearity almost good.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

介绍了一个峰保持电路。该电路适用于silicon strip,Si(Li),CdZn Te and CsI等探测器,实现采样-保持功能。已成功进行了基于CMOSFET的采样-保持电路的设计和仿真,通过使用Proteus的PSPICE仿真器和BSIMV3.3模型参数完成了电路性能的仿真。同时,实现了采样时间可在60ns到4.44s范围内进行选择,该电路具有较好的线性。

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Charge stripping is employed to produce multi-charged ions for injecting the cooling storage ring After penetrating through the carbon foil, the widened distribution of ion charge states poses a limit to the ion injection Therefore, the carbon foil plays a key role in the charge snipping injection In this paper, foul strippers for Heavy Ion Research Facility at Lanzhou (HIRFL) and Cooling Sun age Ring (CSR) are introduced The charge state distribution of the stripped ions is measured and the stripping efficiency of the foils is investigated The experimental results are consistent with the theoretical values

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A 7 Tesla superconducting magnet with a clear warm bore of 156 mm in diameter has been developed for Lanzhou Penning Trap at the Institute of Modern Physics for high precision mass measurement. The magnet is comprised of 9 solenoid coils and operates in persistent mode with a total energy of 2.3 MJ. Due to the considerable amount of energy stored during persistent mode operation, the quench protection system is very important when designing and operating the magnet. A passive protection system based on a subdivided scheme is adopted to protect the superconducting magnet from damage caused by quenching. Cold diodes and resistors are put across the subdivision to reduce both the voltage and temperature hot spots. Computational simulations have been carried in Opera-quench. The designed quench protection circuit and the finite element method model for quench simulations are described; the time changing of temperature, voltage and current decay during the quench process is also analysed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An optimization method based on uniform design in conjunction with genetic algorithm is described. According to the proposed method, the uniform design technique was applied to the design of starting experiments, which can reduce the number of experiments compared with traditional simultaneous methods, such as simplex. And genetic algorithm was used in optimization procedure, which can improve the rapidity of optimal procedure. The hierarchical chromatographic response function was modified to evaluate the separation equality of a chromatogram. An iterative procedure was adopted to search for the optimal condition to improve the accuracy of predicted retention and the quality of the chromatogram. The optimization procedure was tested in optimization of the chromatographic separation of 11 alkaloids in reversed-phase ion pair chromatography and satisfactory optimal result was obtained. (C) 2003 Elsevier B.V. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Venezuela is located in central northern South America, with some 4 000 km of coastline and near 700 000 km2 of marine and submarine areas. The Venezuelan coastal zone is characterized by serious problems of land use and utilisation of its natural resources, caused by a generally anarchical spatial occupation and lack of sufficient legal and administrative means for control. In this paper, a synthesis of the Venezuelan approach to attaining a sustainable development of its marine and coastal zones is presented. This means the accomplishment of the social and economic development of the Venezuelan population in general, and specifically the coastal inhabitants, taking into account the legal and administrative patterns that govern land use planning and the utilisation of natural resources, particularly in marine and coastal areas. The paper is organised in three parts: (1) the diagnosis of the current situation; (2) the presentation of a hypothesis based on present trends (trend scenario); and (3) the statement and application of a sound and adequate solution (desirable and possible scenario).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The deliberate tailoring of hierarchical flowerlike gold microstructure (HFGMs) at the ultrathin level is an ongoing challenge and could introduce opportunities for new fabrication and application in many fields. In this paper. a templateless, surfactantless, electrochemical strategy for fabrication of ultrathin platinum-group metal coated HFGMs is proposed. HFGMs were prepared by simple electrodeposition on an indium tin oxide (ITO) substrate.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

By using the bifunctional ligand, 8-hydroxyquinoline-functionalized organosilane (Q-Si), the new mesoporous material Q-MCM-41 covalently bonded with 8-hydroxyquinoline was synthesized. Through the ligand exchange reaction, the new near-infrared (NIR) luminescent mesoporous LnQ(3)-MCM-41 (Ln = Er, Nd, Yb) materials were prepared by linking the lanthanide quinolinate complexes to the ordered mesoporous Q-MCM-41 material. The LnQ(3)-MCM-41 materials were characterized by powder X-ray diffraction and N-2 adsorption/desorption, and they all show the characteristic mesoporous structure of MCM-41 with highly uniform pore size distributions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Parallel shared-memory machines with hundreds or thousands of processor-memory nodes have been built; in the future we will see machines with millions or even billions of nodes. Associated with such large systems is a new set of design challenges. Many problems must be addressed by an architecture in order for it to be successful; of these, we focus on three in particular. First, a scalable memory system is required. Second, the network messaging protocol must be fault-tolerant. Third, the overheads of thread creation, thread management and synchronization must be extremely low. This thesis presents the complete system design for Hamal, a shared-memory architecture which addresses these concerns and is directly scalable to one million nodes. Virtual memory and distributed objects are implemented in a manner that requires neither inter-node synchronization nor the storage of globally coherent translations at each node. We develop a lightweight fault-tolerant messaging protocol that guarantees message delivery and idempotence across a discarding network. A number of hardware mechanisms provide efficient support for massive multithreading and fine-grained synchronization. Experiments are conducted in simulation, using a trace-driven network simulator to investigate the messaging protocol and a cycle-accurate simulator to evaluate the Hamal architecture. We determine implementation parameters for the messaging protocol which optimize performance. A discarding network is easier to design and can be clocked at a higher rate, and we find that with this protocol its performance can approach that of a non-discarding network. Our simulations of Hamal demonstrate the effectiveness of its thread management and synchronization primitives. In particular, we find register-based synchronization to be an extremely efficient mechanism which can be used to implement a software barrier with a latency of only 523 cycles on a 512 node machine.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Act2 is a highly concurrent programming language designed to exploit the processing power available from parallel computer architectures. The language supports advanced concepts in software engineering, providing high-level constructs suitable for implementing artificially-intelligent applications. Act2 is based on the Actor model of computation, consisting of virtual computational agents which communicate by message-passing. Act2 serves as a framework in which to integrate an actor language, a description and reasoning system, and a problem-solving and resource management system. This document describes issues in Act2's design and the implementation of an interpreter for the language.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.