959 resultados para Generic Conventions


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The means of reducing nanoparticle contamination in the synthesis of carbon nanostructures in reactive Ar + H2 + CH4 plasmas are studied. It is shown that by combining the electrostatic filtering and thermophoretic manipulation of nanoparticles, one can significantly improve the quality of carbon nanopatterns. By increasing the substrate heating power, one can increase the size of deposited nanoparticles and eventually achieve nanoparticle-free nanoassemblies. This approach is generic and is applicable to other reactive plasma-aided nanofabrication processes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A generic approach towards tailoring of ion species composition in reactive plasmas used for nanofabrication of various functional nanofilms and nanoassemblies, based on a simplified model of a parallel-plate rf discharge, is proposed. The model includes an idealized reactive plasma containing two neutral and two ionic species interacting via charge exchange collisions in the presence of a microdispersed solid component. It is shown that the number densities of the desired ionic species can be efficiently managed by adjusting the dilution of the working gas in a buffer gas, rates of electron impact ionization, losses of plasma species on the discharge walls, and surfaces of fine particles, charge exchange rates, and efficiency of three-body recombination processes in the plasma bulk. The results are relevant to the plasma-aided nanomanufacturing of ordered patterns of carbon nanotip and nanopyramid microemitters.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents the design of a dual Z-source inverter that can be used with either a single dc source or two isolated dc sources. Unlike traditional inverters, the integration of a properly designed Z-source network and semiconductor switches to the proposed dual inverter allows buck-boost power conversion to be performed over a wide modulation range with three-level output waveforms generated. The connection of an additional transformer to the inverter ac output also allows all generic wye- or delta-connected loads with three-wire or four-wire configuration to be supplied by the inverter. Modulation-wise, the dual inverter can be controlled using a carefully designed carrier-based pulse-width modulation (PWM) scheme that always will ensure balanced voltage boosting of the Z-source network, while simultaneously achieving reduced common-mode switching. Because of the omission of dead-time delays in the dual inverter PWM scheme, its switched common-mode voltage can be completely eliminated, unlike in traditional inverters where narrow common-mode spikes are still generated. Under semiconductor failure conditions, the presented PWM schemes can easily be modified to allow the inverter to operate without interruption and for cases where two isolated sources are used, zero common-mode voltage can still be ensured. These theoretical findings together with the inverter practicality have been confirmed both in simulations using PSIM with Matlab/Simulink coupler and experimentally using a laboratory implemented inverter prototype.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents the design of a dual Z-source inverter that can be used with either a single dc source or two isolated dc sources. Unlike traditional inverters, the integration of a properly designed Z-source network and semiconductor switches to the proposed dual inverter allows buck-boost power conversion to be performed over a wide modulation range, with three-level output waveforms generated. The connection of an additional transformer to the inverter ac output also allows all generic wye-or delta-connected loads with three-wire or four-wire configuration to be supplied by the inverter. Modulationwise, the dual inverter can be controlled using a carefully designed carrier-based pulsewidth-modulation (PWM) scheme that will always ensure balanced voltage boosting of the Z-source network while simultaneously achieving reduced common-mode switching. Because of the omission of dead-time delays in the dual-inverter PWM scheme, its switched common-mode voltage can be completely eliminated, unlike in traditional inverters, where narrow common-mode spikes are still generated. Under semiconductor failure conditions, the presented PWM schemes can easily be modified to allow the inverter to operate without interruption, and for cases where two isolated sources are used, zero common-mode voltage can still be ensured. These theoretical findings, together with the inverter practicality, have been confirmed in simulations both using PSIM with Matlab/Simulink coupler and experimentally using a laboratory-implemented inverter prototype.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Internet and its widespread usage for multimedia document distribution put the copyright issue in a complete new setting. Multimedia documents, specifically those installed on a web page, are no longer passive as they typically include active applets. Copyright protection safeguards the intellectual property (IP) of multimedia documents, which are either sold or distributed free of charge. In this Chapter, the basic tools for copyright protection are discussed. First, general concepts and the vocabulary used in copyright protection of multimedia documents are discussed. Later, taxonomy of watermarking and fingerprinting techniques are studied. This part is concluded by a review of the literature dealing with IP security. The main part of the chapter discusses the generic watermarking scheme and illustrates it on three specific examples: collusion-free watermarking, spread spectrum watermarking, and software fingerprinting. Future trends and conclusions close the chapter.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we propose law reform with respect to the unilateral withholding or withdrawal of potentially life-sustaining treatment in Australia and New Zealand. That is, where a doctor withholds or withdraws potentially life-sustaining treatment without consent from a patient or a patient’s substitute decision-maker (where the patient lacks capacity), or authorisation from a court or tribunal, or by operation of a statute or justifiable government or institutional policy. Our proposal is grounded in the core values that do (or should) underpin a regulatory framework on an issue such as this; these values are drawn from existing commitments made by Australia and New Zealand through legislation, the common law, and conventions and treaties. It is also grounded in a critical review of the law on unilateral withholding and withdrawal as well as the legal context within which this issue sits in Australasia. We argue that the current law is inconsistent with the core values and develop a proposal for a legal response to this issue that more closely aligns with the core values it is supposed to serve.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Salons became popular in Europe in 17th Century as sites of philosophic and literary conversation. A group of female academics interested in Deleuzian theories experimented with the salon to challenge presentation and dissemination norms that hierarchize and centralize the human. For Deleuze and Guattari (1987), assemblages are shifting and decentering, so how might assemblages of chairs, tables, bodies, lights, space, help to trouble thinking about the methodological conventions around academic disseminations? The authors discuss the salon as a critical-cultural site: Cumming presents Deleuze and play-dough, an exploration of how the playful dissemination format of the salon prompted a re-reading of a methodological vignette from earlier research. Knight, an arts-based researcher, uses video art as a creative methodology to examine conceptualizations of rhizomes and assemblages at the salon as a dissemination site. The authors conclude that the salon, as a critical, cultural site disrupts hierarchized ways of approaching and presenting research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image retention and fraud, distrust and invasion of privacy. This project was a significant step forward in developing a complete framework for systematically designing, analyzing, and applying digital watermarking, with a particular focus on medical image security. A formal generic watermarking model, three new attack models, and an efficient watermarking technique for medical images were developed. These outcomes contribute to standardizing future research in formal modeling and complete security and computational analysis of watermarking schemes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite policies of deinstitutionalisation, many people with intellectual disabilities in developed western countries continue to live in mainstream institutional settings, such as correctional facilities, rather than in the community with support from disability services. This paper reports on the life stories of 10 people with intellectual disabilities, who had been imprisoned in adult correctional facilities in Queensland. The pathways taken by these 10 people into and out of prison are marked by significant abuse, neglect, and poverty. Significant disparity and disconnection is also displayed between the policies and service approaches, particularly between the disability, mental health, and correctional systems in Queensland. Based on these findings, a framework for practice, which spans both generic and specialist services, is suggested.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Les Murray and Judith Wright are two Australian poets who are widely read as landscape poets. While this framing offers valuable insights into their work it often fails to bring the importance into a contemporary context or to recognise the long tradition Australia has had with , to use Leo Marx’ term, “the complex pastoral”. As Ruth Blair reminds us in her chapter “Hugging the Shore: The Green Mountains of South-East Queensland” in The Littoral Zone: Australian Contexts and their Writers it is accepted that North America has a tradition of the complex pastoral mode but it should be remembered that Australia also has a long history of this form. Both Judith Wright’s and Les Murray’s poetry encourages active campaigning for the environment .These Australian poets are eco-pastoral poets whose poetry encourages active reading rather than passive reflections. Their poetry speaks to the strong connection between the lived everyday landscape and the imagination of past, present and future. Their work is imbued with a strong sense of ecocritical awareness while at the same time drawing on pastoral conventions. These two Australian poets do not offer idealistic pastoral notions but rather reveal the complexities of lived human/nonhuman relationships. This paper will discuss these complexities and how poetry can be experienced as literature in action—ways for readers to connect with and negotiate with the land they inhabit. The research for this paper was, in part, drawn from the responses that local community library groups offered after reading the works of these poets. What became evident from this research was the way the poetry made the readers think not only of landscape as a place of refuge from the urban technological world but also as a contemporary place with connection to agency that motivates readers into active change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The business model concept is gaining traction in different disciplines but is still criticized for being fuzzy and vague and lacking consensus on its definition and compositional elements. In this paper we set out to advance our understanding of the business model concept by addressing three areas of foundational research: business model definitions, business model elements, and business model archetypes. We define a business model as a representation of the value logic of an organization in terms of how it creates and captures customer value. This abstract and generic definition is made more specific and operational by the compositional elements that need to address the customer, value proposition, organizational architecture (firm and network level) and economics dimensions. Business model archetypes complement the definition and elements by providing a more concrete and empirical understanding of the business model concept. The main contributions of this paper are (1) explicitly including the customer value concept in the business model definition and focussing on value creation, (2) presenting four core dimensions that business model elements need to cover, (3) arguing for flexibility by adapting and extending business model elements to cater for different purposes and contexts (e.g. technology, innovation, strategy),(4) stressing a more systematic approach to business model archetypes by using business model elements for their description, and (5) suggesting to use business model archetype research for the empirical exploration and testing of business model elements and their relationships.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Poor mine water management can lead to corporate, environmental and social risks. These risks become more pronounced as mining operations move into areas of water scarcity and/or increase climatic variability while also managing increased demand, lower ore grades and increased strip ratios. Therefore, it is vital that mine sites better understand these risks in order to implement management practices to address them. Systems models provide an effective approach to understand complex networks, particularly across multiple scales. Previous work has represented mine water interactions using systems model on a mine site scale. Here, we expand on that work by present an integrated tool that uses a systems modeling approach to represent mine water interactions on a site and regional scale and then analyses the risks associated with events stemming from those interactions. A case study is presented to represent three indicative corporate, environmental and social risks associated with a mine site that exists in a water scarce region. The tool is generic and flexible, and can be used in many scenarios to provide significant potential utility to the mining industry.