968 resultados para PSYCHOTIC-LIKE EXPERIENCES
Resumo:
The infrared (IR) spectroscopic data and Raman spectroscopic properties for a series of 13 “pinwheel-like” homoleptic bis(phthalocyaninato) rare earth complexes M[Pc(α-OC5H11)4]2 [M = Y and Pr–Lu except Pm; H2Pc(α-OC5H11)4 = 1,8,15,22-tetrakis(3-pentyloxy)phthalocyanine] have been collected and comparatively studied. Both the IR and Raman spectra for M[Pc(α-OC5H11)4]2 are more complicated than those of homoleptic bis(phthalocyaninato) rare earth analogues, namely M(Pc)2 and M[Pc(OC8H17)8]2, but resemble (for IR) or are a bit more complicated (for Raman) than those of heteroleptic counterparts M(Pc)[Pc(α-OC5H11)4], revealing the decreased molecular symmetry of these double-decker compounds, namely S8. Except for the obvious splitting of the isoindole breathing band at 1110–1123 cm−1, the IR spectra of M[Pc(α-OC5H11)4]2 are quite similar to those of corresponding M(Pc)[Pc(α-OC5H11)4] and therefore are similarly assigned. With laser excitation at 633 nm, Raman bands derived from isoindole ring and aza stretchings in the range of 1300–1600 cm−1 are selectively intensified. The IR spectra reveal that the frequencies of pyrrole stretching and pyrrole stretching coupled with the symmetrical CH bending of –CH3 groups are sensitive to the rare earth ionic size, while the Raman technique shows that the bands due to the isoindole stretchings and the coupled pyrrole and aza stretchings are similarly affected. Nevertheless, the phthalocyanine monoanion radical Pc′− IR marker band of bis(phthalocyaninato) complexes involving the same rare earth ion is found to shift to lower energy in the order M(Pc)2 > M(Pc)[Pc(α-OC5H11)4] > M[Pc(α-OC5H11)4]2, revealing the weakened π–π interaction between the two phthalocyanine rings in the same order.
Resumo:
Metaphor is a multi-stage programming language extension to an imperative, object-oriented language in the style of C# or Java. This paper discusses some issues we faced when applying multi-stage language design concepts to an imperative base language and run-time environment. The issues range from dealing with pervasive references and open code to garbage collection and implementing cross-stage persistence.
Resumo:
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.