965 resultados para 2-adic complexity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Pyrido[1,2-a]benzimidazoles1, 2a are interesting compounds both from the viewpoint of medicinal chemistry2–7 (solubility,7 DNA intercalation3) and materials chemistry8 (fluorescence). Of note among the former is the antibiotic drug Rifaximin,5 which contains this heteroaromatic core. The classical synthetic approach for the assembly of pyrido[1,2-a]benzimidazoles is by [3+3] cyclocondensation of benzimidazoles containing a methylene group at C2 with appropriate bielectrophiles.2a However, these procedures are often low-yielding, involve indirect/lengthy sequences, and/or provide access to a limited range of products, primarily providing derivatives with substituents located on the pyridine ring (A ring, Scheme 1).2–4 Theoretically, a good alternative synthetic method for the synthesis of pyrido[1,2-a]benzimidazoles with substituents in the benzene ring (C ring) should be accessible by intramolecular transition-metal-catalyzed CN bond formation in N-(2-chloroaryl)pyridin-2-amines, based on chemistry recently developed in our research group.9 These substrates themselves are easily available through SNAr or selective Pd-catalyzed amination10 of 2-chloropyridine with 2-chloroanilines.11 If a synthetic procedure that eliminated the need for preactivation of the 2-position of the 2-chloroarylamino entity could be developed, this would be even more powerful, as anilines are more readily commercially available than 2-chloroanilines. Therefore the synthesis of pyrido[1,2-a]benzimidazoles (4) by a transition-metal-catalyzed intramolecular CH amination approach from N-arylpyridin-2-amines (3) was explored (Scheme 1).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aromatic radicals form in a variety of reacting gas-phase systems, where their molecular weight growth reactions with unsaturated hydrocarbons are of considerable importance. We have investigated the ion-molecule reaction of the aromatic distonic N-methyl-pyridinium-4-yl (NMP) radical cation with 2-butyne (CH3C CCH3) using ion trap mass spectrometry. Comparison is made to high-level ab initio energy surfaces for the reaction of NMP and for the neutral phenyl radical system. The NMP radical cation reacts rapidly with 2-butyne at ambient temperature, due to the apparent absence of any barrier. The activated vinyl radical adduct predominantly dissociates via loss of a H atom, with lesser amounts of CH3 loss. High-resolution Fourier transform ion cyclotron resonance (FT-ICR) mass spectrometry allows us to identify small quantities of the collisionally deactivated reaction adduct. Statistical reaction rate theory calculations (master equation/RRKM theory) on the NMP + 2-butyne system support our experimental findings, and indicate a mechanism that predominantly involves an allylic resonance-stabilized radical formed via H atom shuttling between the aromatic ring and the C-4 side-chain, followed by cyclization and/or low-energy H atom beta-scission reactions. A similar mechanism is demonstrated for the neutral phenyl radical (Ph center dot)+2-butyne reaction, forming products that include 3-methylindene. The collisionally deactivated reaction adduct is predicted to be quenched in the form of a resonance-stabilized methylphenylallyl radical. Experiments using a 2,5-dichloro substituted methyl-pyridiniumyl radical cation revealed that in this case CH3 loss from the 2-butyne adduct is favoured over H atom loss, verifying the key role of ortho H atoms, and the shuttling mechanism, in the reactions of aromatic radicals with alkynes. As well as being useful phenyl radical analogues, pyridiniumyl radical cations may form in the ionosphere of Titan, where they could undergo rapid molecular weight growth reactions to yield polycyclic aromatic nitrogen hydrocarbons (PANHs).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A natural single-crystal specimen of the kröhnkite from Chuquicamata, Chile, with the general formula Na2Cu(SO4)2 · 2H2O, was investigated by Raman and infrared spectroscopy. The mineral kröhnkite is found in many parts of the world's arid areas. Kröhnkite crystallizes in the monoclinic crystal system with point group 2/m and space group P21/c. It is an uncommon secondary mineral formed in the oxidized zone of copper deposits, typically in very arid climates. The Raman spectrum of kröhnkite dominated by a very sharp intense band at 992 cm−1 is assigned to the ν1 symmetric stretching mode and Raman bands at 1046, 1049, 1138, 1164, and 1177 cm−1 are assigned to the ν3 antisymmetric stretching vibrations. The infrared spectrum shows an intense band at 992 cm−1. The Raman bands at 569, 582, 612, 634, 642, 655, and 660 cm−1 are assigned to the ν4 bending modes. Three Raman bands observed at 429, 445, and 463 cm−1 are attributed to the ν2 bending modes. The observation that three or four bands are seen in the ν4 region of kröhnkite is attributed to the reduction of symmetry to C2v or less.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this article, we study the security of the IDEA block cipher when it is used in various simple-length or double-length hashing modes. Even though this cipher is still considered as secure, we show that one should avoid its use as internal primitive for block cipher based hashing. In particular, we are able to generate instantaneously free-start collisions for most modes, and even semi-free-start collisions, pseudo-preimages or hash collisions in practical complexity. This work shows a practical example of the gap that exists between secret-key and known or chosen-key security for block ciphers. Moreover, we also settle the 20-year-old standing open question concerning the security of the Abreast-DM and Tandem-DM double-length compression functions, originally invented to be instantiated with IDEA. Our attacks have been verified experimentally and work even for strengthened versions of IDEA with any number of rounds.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently, botnet, a network of compromised computers, has been recognized as the biggest threat to the Internet. The bots in a botnet communicate with the botnet owner via a communication channel called Command and Control (C & C) channel. There are three main C & C channels: Internet Relay Chat (IRC), Peer-to-Peer (P2P) and web-based protocols. By exploiting the flexibility of the Web 2.0 technology, the web-based botnet has reached a new level of sophistication. In August 2009, such botnet was found on Twitter, one of the most popular Web 2.0 services. In this paper, we will describe a new type of botnet that uses Web 2.0 service as a C & C channel and a temporary storage for their stolen information. We will then propose a novel approach to thwart this type of attack. Our method applies a unique identifier of the computer, an encryption algorithm with session keys and a CAPTCHA verification.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Living City 2013 Workshop, as part of a school term’s design-based curriculum connected to the KGSC/QUT Design Excellence Program and run from 11 February – 1 May, 2013, was essentially a three-day place-based urban design immersion workshop program for 25 Year 11 Visual Art and Design Students and 2 Teachers from Kelvin Grove State College (KGSC) held at both Queensland University of Technology (QUT) Gardens Point Campus and The Edge, State Library of Queensland. Mentored by 4 design professionals, 2 tertiary design academics, 2 public artists, and 12 QUT tertiary design students, the workshop explored youth-inspired public space design solutions for the active Brisbane City Council redevelopment site of Queens Wharf Road precinct. As well as the face-to-face workshops, for Living City 2013, an interactive web environment was introduced to enable students to connect with each other and program mentors throughout the course of the program. The workshop, framed within notions of ecological, economic, social and cultural sustainability, aimed to raise awareness of the layered complexity and perspectives involved in the design of shared city spaces and to encourage young people to voice their own concerns as future citizens about the shape and direction of their city. The program commenced with an introductory student briefing by stakeholders and mentors at KGSC on 11 February, an introduction to site appraisal and site visit held at QUT and Queens Wharf Road on 20 February, and a follow up site analysis session on 6 March. Day 1 Workshop on April 17 at the Edge, State Library of Queensland, as part of the Design Minds partnership (http://designminds.org.au/kelvin-grove-state-college-excellence-in-art-design/), focused on mentoring team development of a concept design for a range of selected sites. Two workshops on April 22 and 23 at QUT, to develop these designs and presentation schemes, followed this. The workshop program culminated in a visual presentation of concept design ideas and discussion with a public audience in the Ideas Gallery on The Deck, King George Square during the Brisbane City Council City Centre Master Plan Ideas Fiesta on 1 May, 2013, as referenced in the Ideas Fiesta Wrap-up Report (http://www.brisbane.qld.gov.au/planning-building/planning-guidelines-tools/city-centre-master-plan/city-centre-master-plan-ideas-fiesta). Students were introduced to design methodology, team thinking strategies, the scope of design practices and professions, presentation skills and post-secondary pathways, while participating teachers acquired content and design learning strategies transferable in many other contexts. The program was fully documented on the Living City website (http://www.livingcity.net.au/LC2013x/index.html) and has been recognised by the Brisbane City Council Youth Strategy 2014-2019 as a best practice model for making Brisbane a well-designed, subtropical city.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. In a stream cipher setting where the filter function is known, we can extend it to the cube attack with annihilators: By applying the cube attack to Boolean functions for which we can find low-degree multiples (equivalently annihilators), the attack complexity can be improved. When the size of the filter function is smaller than the LFSR, we can improve the attack complexity further by considering a sliding window version of the cube attack with annihilators. Finally, we extend the cube attack to vectorial Boolean functions by finding implicit relations with low-degree polynomials.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show three different collision and near-collision attacks on the compression function. The first attack uses differences in the chaining values and the block counter and finds collisions with complexity 233. The second attack utilizes differences in the chaining values and salt and yields collisions with complexity 242. The final attack uses differences only in the chaining values to yield near-collisions with complexity 299. All our attacks are independent of the number of rounds in the compression function. We illustrate the first two attacks by showing examples of collisions and near-collisions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We have used electronic structure calculations to investigate the 1,2-dehydration of alcohols as a model for water loss during the pyrolysis of carbohydrates found in biomass. Reaction enthalpies and energy barriers have been calculated for neat alcohols, protonated alcohols and alcohols complexed to alkali metal ions (Li + and Na +). We have estimated pre-exponential A factors in order to obtain gas phase rate constants. For neat alcohols, the barrier to 1,2-dehydration is about 67 kcal mol -1, which is consistent with the limited experimental data. Protonation and metal complexation significantly reduce this activation barrier and thus, facilitate more rapid reaction. With the addition of alkali metals, the rate of dehydration can increase by a factor of 10 8 while addition of a proton can lead to an increase of a factor of 10 23.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Deprotonated o, m-, and p-methoxyacetanilide show pronounced peaks in their collision-induced tandem mass spectra (MS/MS) produced by losses of the elements of C2H6. It is proposed that this reaction is a 'cross-ring' internal S(N)2 reaction involving an incipient methyl anion. For example, p-CH3O-C6H4-N--CO-CH3--> [(p.CH3O-C6H4-N=C=O)CH3-]--> O---C6H4-N=C=O+C2H6.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

2,3-Dimethyl-2,3-dinitrobutane (DMNB) is an explosive taggant added to plastic explosives during manufacture making them more susceptible to vapour-phase detection systems. In this study, the formation and detection of gas-phase \[M+H](+), \[M+Li](+), \[M+NH(4)](+) and \[M+Na](+) adducts of DMNB was achieved using electrospray ionisation on a triple quadrupole mass spectrometer. The \[M+H](+) ion abundance was found to have a strong dependence on ion source temperature, decreasing markedly at source temperatures above 50 degrees C. In contrast, the \[M+Na](+) ion demonstrated increasing ion abundance at source temperatures up to 105 degrees C. The relative susceptibility of DMNB adduct ions toward dissociation was investigated by collision-induced dissociation. Probable structures of product ions and mechanisms for unimolecular dissociation have been inferred based on fragmentation patterns from tandem mass (MS/MS) spectra of source-formed ions of normal and isotopically labelled DMNB, and quantum chemical calculations. Both thermal and collisional activation studies suggest that the \[M+Na](+) adduct ions are significantly more stable toward dissociation than their protonated analogues and, as a consequence, the former provide attractive targets for detection by contemporary rapid screening methods such as desorption electrospray ionisation mass spectrometry. Copyright (C) 2009 Commonwealth of Australia. Published by John Wiley & Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on an investigation of the flow/chemistry coupling inside a nominally two-dimensional inlet-fuelled scramjet configuration. The experiments were conducted at a freestream Mach number of 7.3 and a total flow enthalpy of 4.3MJ/kg corresponding to a Mach 9.7 flight condition. The phenomenon of radical-farming has been studied in detail using two-dimensional OH* chemiluminescence imaging and emission spectroscopy. High signal levels of excited OH (OH*) were detected behind the first shock reflections inside the combustion chamber upstream of any measurable pressure rise from combustion, which occurred towards the rear of the combustor. The production of OH in the first hot pocket initiates the ignition process and then accelerates the combustion process in the next downstream hot pocket. This was confirmed by numerical simulations of premixed hydrogen/air flow through the scramjet. Chemical kinetics analyses reveal that the ignition process is governed by the interaction between various reaction groups leading to a chainbranching explosion for low mean temperature and pressure combustion flowfields.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Suppose two parties, holding vectors A = (a 1,a 2,...,a n ) and B = (b 1,b 2,...,b n ) respectively, wish to know whether a i  > b i for all i, without disclosing any private input. This problem is called the vector dominance problem, and is closely related to the well-studied problem for securely comparing two numbers (Yao’s millionaires problem). In this paper, we propose several protocols for this problem, which improve upon existing protocols on round complexity or communication/computation complexity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A mechanochemical synthesis process has been used to synthesise aluminium nanoparticles. The aluminium is synthesised via a solid state chemical reaction which is initiated inside a ball mill at room temperature between either lithium (Li) or sodium (Na) metal which act as reducing agents with unreduced aluminium chloride (AlCl3). The reaction product formed consists of aluminium nanoparticles embedded within a by-product salt phase (LiCl or NaCl, respectively). The LiCl is washed with a suitable solvent resulting in aluminium (Al) nanoparticles which are not oxidised and are separated from the byproduct phase. Synthesis and washing was confirmed using X-ray diffraction (XRD). Nanoparticles were found to be ∼25–100nm from transmission electron microscopy (TEM) and an average size of 55nm was determined fromsmall angle X-ray scattering (SAXS) measurements. As synthesised Al/NaCl composites, washed Al nanoparticles, and purchased Al nanoparticles were deuterium (D2) absorption tested up to 2 kbar at a variety of temperatures, with no absorption detected within system resolution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A multi-secret sharing scheme allows several secrets to be shared amongst a group of participants. In 2005, Shao and Cao developed a verifiable multi-secret sharing scheme where each participant’s share can be used several times which reduces the number of interactions between the dealer and the group members. In addition some secrets may require a higher security level than others involving the need for different threshold values. Recently Chan and Chang designed such a scheme but their construction only allows a single secret to be shared per threshold value. In this article we combine the previous two approaches to design a multiple time verifiable multi-secret sharing scheme where several secrets can be shared for each threshold value. Since the running time is an important factor for practical applications, we will provide a complexity comparison of our combined approach with respect to the previous schemes.