663 research outputs found

    Testing of an adsorption chiller prototype for data center cooling.

    Get PDF
    The main objective of this study is to present a novel adsorption chiller prototype (designed and realized by the company Sorption Technologies GmbH) that is suitable for cooling of data center servers. This prototype has been designed to fit into commercially-available data center racks. This adsorption prototype has been designed to cool down the rack servers by means of liquid cooling. Furthermore, an air-cooler heat exchanger is also integrated into the adsorption machine to cool down the rest of the rack components (i.e., patch panels, HDD). This way, the adsorption system is able to cool down all rack components. Phase-change chambers are integrated into the adsorption modules for direct evaporation/condensation, removing the need of large vacuum valves and allowing to have a more simpler and compact vacuum system. This also means that the refrigerant distribution is completely done in liquid phase. The prototype is installed at the Department of Energy at the Politecnico di Milano and testing will be carried out using cooling water temperatures in the range 25 – 30 °C and hot water temperatures in the range 55 – 65 °C

    Stocking Threadfin Shad: Consequences for Young-of-Year Fishes

    Get PDF
    Threadfin shad Dorosoma petenense are commonly introduced into reservoirs to supplement prey available to piscivorous fishes. To determine how early life stages of threadfin shad and their potential competitors and predators interact, we introduced this species into two Ohio lakes—Clark and Stonelick—and evaluated how its young of year influenced young-of-year bluegills Lepomis macrochirus and largemouth bass Micropterus salmoides. After adults were stocked in April, peak abundance of young-of-year threadfin shad occurred in August in both lakes. Bluegills generally spawned earlier than threadfin shad, which apparently reduced competition between young of these species. In Clark Lake, young-of-year threadfin shad did not reduce zooplankton populations, but in Stonelick Lake, peak abundance of young-of-year threadfin shad was followed by a precipitous decline in zooplankton. Data on cladoceran birth rates indicated this decline was due to increased predation by threadfin shad. Survival of bluegills to a size at which they move into the littoral zone also declined in Stonelick Lake, perhaps because of the virtual elimination of zooplankton. Limited survival of bluegills in turn contributed to reduced growth of young-of-year largemouth bass dependent on them as prey. Given that zooplankton declined in one but not the other lake, interactions among young-of-year fishes due to annually introduced threadfin shad will likely vary among systems and years. Nonetheless, introduced threadfin shad could, in some systems in some years, negatively affect growth and recruitment of the very species they were meant to enhance.This work was funded in part by National Science Foundation grants NSF BSR-8705518 to R. A. Stein and NSF BSR-8715730 to G. G. Mittelbach, and by Federal Aid in Fish Restoration Project F-57-R awarded to R. A. Stein and administered through the Ohio Division of Wildlife

    Synthesis of some new pyrimidine and pyridopyrimidine derivatives

    Get PDF
    491-49

    Alcoholysis of palm oil mid-fraction by lipase from Rhizopus rhizopodiformis

    Get PDF
    A mycelial lipase from Rhizopus rhizopodiformis was prepared in fragment form. The lipase was examined to catalyze the alcoholysis of palm oil mid-fraction (PMF) in organic solvents. High percentage conversions of PMF to alkyl esters were achieved when methanol or propanol was used as acyl acceptor. Of the two most prevalent fatty acids in PMF, palmitic acid seemed to be preferred over oleic acid in the formation of methyl and propyl esters. The optimal ratio of oil to methanol in the alcoholysis reaction is 1 to 2 moles. The lipase exhibited high alcoholysis activities in nonpolar solvents (log P>2), such as hexane, benzene, toluene, and heptane. The enzyme showed exceptionally high thermostability

    The evolution of ecological specialization across the range of a broadly distributed marine species

    Get PDF
    Ecological specialization is an important engine of evolutionary change and adaptive radiation, but empirical evidence of local adaptation in marine environments is rare, a pattern that has been attributed to the high dispersal ability of marine taxa and limited geographic barriers to gene flow. The broad-nosed pipefish, Syngnathus typhle, is one of the most broadly distributed syngnathid species and shows pronounced variation in cranial morphology across its range, a factor that may contribute to its success in colonizing new environments. We quantified variation in cranial morphology across the species range using geometric morphometrics, and tested for evidence of trophic specialization by comparing individual-level dietary composition with the community of prey available at each site. Although the diets of juvenile pipefish from each site were qualitatively similar, ontogenetic shifts in dietary composition resulted in adult populations with distinctive diets consistent with their divergent cranial morphology. Morphological differences found in nature are maintained under common garden conditions, indicating that trophic specialization in S. typhle is a heritable trait subject to selection. Our data highlight the potential for ecological specialization in response to spatially variable selection pressures in broadly distributed marine species.Swiss Academy of SciencesSwiss National Science FoundationSwiss National Science Foundation (SNSF)European CommissionUniversity of ZurichBrooklyn CollegeCity University of New Yorkinfo:eu-repo/semantics/acceptedVersio

    A comparative analysis of metacommunity types in the freshwater realm

    Get PDF
    Most metacommunity studies have taken a direct mechanistic approach, aiming to model the effects of local and regional processes on local communities within a metacommunity. An alternative approach is to focus on emergent patterns at the metacommunity level through applying the elements of metacommunity structure (EMS; Oikos, 97, 2002, 237) analysis. The EMS approach has very rarely been applied in the context of a comparative analysis of metacommunity types of main microbial, plant, and animal groups. Furthermore, to our knowledge, no study has associated metacommunity types with their potential ecological correlates in the freshwater realm. We assembled data for 45 freshwater metacommunities, incorporating biologically highly disparate organismal groups (i.e., bacteria, algae, macrophytes, invertebrates, and fish). We first examined ecological correlates (e.g., matrix properties, beta diversity, and average characteristics of a metacommunity, including body size, trophic group, ecosystem type, life form, and dispersal mode) of the three elements of metacommunity structure (i.e., coherence, turnover, and boundary clumping). Second, based on those three elements, we determined which metacommunity types prevailed in freshwater systems and which ecological correlates best discriminated among the observed metacommunity types. We found that the three elements of metacommunity structure were not strongly related to the ecological correlates, except that turnover was positively related to beta diversity. We observed six metacommunity types. The most common were Clementsian and quasi-nested metacommunity types, whereas Random, quasi-Clementsian, Gleasonian, and quasi-Gleasonian types were less common. These six metacommunity types were best discriminated by beta diversity and the first axis of metacommunity ecological traits, ranging from metacommunities of producer organisms occurring in streams to those of large predatory organisms occurring in lakes. Our results showed that focusing on the emergent properties of multiple metacommunities provides information additional to that obtained in studies examining variation in local community structure within a metacommunity.Peer reviewe

    Four-Round Concurrent Non-Malleable Commitments from One-Way Functions

    Get PDF
    How many rounds and which assumptions are required for concurrent non-malleable commitments? The above question has puzzled researchers for several years. Pass in [TCC 2013] showed a lower bound of 3 rounds for the case of black-box reductions to falsifiable hardness assumptions with respect to polynomial-time adversaries. On the other side, Goyal [STOC 2011], Lin and Pass [STOC 2011] and Goyal et al. [FOCS 2012] showed that one-way functions (OWFs) are sufficient with a constant number of rounds. More recently Ciampi et al. [CRYPTO 2016] showed a 3-round construction based on subexponentially strong one-way permutations. In this work we show as main result the first 4-round concurrent non-malleable commitment scheme assuming the existence of any one-way function. Our approach builds on a new security notion for argument systems against man-in-the-middle attacks: Simulation-Witness-Independence. We show how to construct a 4-round one-many simulation-witnesses-independent argument system from one-way functions. We then combine this new tool in parallel with a weak form of non-malleable commitments constructed by Goyal et al. in [FOCS 2014] obtaining the main result of our work

    The Sum Can Be Weaker Than Each Part

    Get PDF
    International audienceIn this paper we study the security of summing the outputs of two independent hash functions, in an effort to increase the security of the resulting design, or to hedge against the failure of one of the hash functions. The exclusive-or (XOR) combiner H1(M)⊕H2(M) is one of the two most classical combiners, together with the concatenation combiner H1(M) H2(M). While the security of the concatenation of two hash functions is well understood since Joux's seminal work on multicollisions, the security of the sum of two hash functions has been much less studied. The XOR combiner is well known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and 1.1. In a hash function setting, Hoch and Shamir have shown that if the compression functions are modeled as random oracles, or even weak random oracles (i.e. they can easily be inverted – in particular H1 and H2 offer no security), H1 ⊕ H2 is indifferentiable from a random oracle up to the birthday bound. In this work, we focus on the preimage resistance of the sum of two narrow-pipe n-bit hash functions, following the Merkle-Damgård or HAIFA structure (the internal state size and the output size are both n bits). We show a rather surprising result: the sum of two such hash functions, e.g. SHA-512 ⊕ Whirlpool, can never provide n-bit security for preimage resistance. More precisely, we present a generic preimage attack with a complexity of O(2 5n/6). While it is already known that the XOR combiner is not preserving for preimage resistance (i.e. there might be some instantiations where the hash functions are secure but the sum is not), our result is much stronger: for any narrow-pipe functions, the sum is not preimage resistant. Besides, we also provide concrete preimage attacks on the XOR combiner (and the concatenation combiner) when one or both of the compression functions are weak; this complements Hoch and Shamir's proof by showing its tightness for preimage resistance. Of independent interests, one of our main technical contributions is a novel structure to control simultaneously the behavior of independent hash computations which share the same input message. We hope that breaking the pairwise relationship between their internal states will have applications in related settings
    corecore