2,570 research outputs found

    Understanding and controlling the structure and segregation behaviour of AuRh nanocatalysts

    Get PDF
    Heterogeneous catalysis, which is widely used in the chemical industry, makes a great use of supported late-transition-metal nanoparticles, and bimetallic catalysts often show superior catalytic performances as compared to their single metal counterparts. In order to optimize catalyst efficiency and discover new active combinations, an atomic-level understanding and control of the catalyst structure is desirable. In this work, the structure of catalytically active AuRh bimetallic nanoparticles prepared by colloidal methods and immobilized on rutile titania nanorods was investigated using aberration-corrected scanning transmission electron microscopy. Depending on the applied post-treatment, different types of segregation behaviours were evidenced, ranging from Rh core-Au shell to Janus via Rh ball-Au cup configuration. The stability of these structures was predicted by performing density-functional-theory calculations on unsupported and titania-supported Au-Rh clusters; it can be rationalized from the lower surface and cohesion energies of Au with respect to Rh, and the preferential binding of Rh with the titania support. The bulk-immiscible AuRh/TiO2 system can serve as a model to understand similar supported nanoalloy systems and their synergistic behaviour in catalysis

    Anti-Spoofing for Text-Independent Speaker Verification: An Initial Database, Comparison of Countermeasures, and Human Performance

    Get PDF
    Due to copyright restrictions, the access to the full text of this article is only available via subscription.In this paper, we present a systematic study of the vulnerability of automatic speaker verification to a diverse range of spoofing attacks. We start with a thorough analysis of the spoofing effects of five speech synthesis and eight voice conversion systems, and the vulnerability of three speaker verification systems under those attacks. We then introduce a number of countermeasures to prevent spoofing attacks from both known and unknown attackers. Known attackers are spoofing systems whose output was used to train the countermeasures, while an unknown attacker is a spoofing system whose output was not available to the countermeasures during training. Finally, we benchmark automatic systems against human performance on both speaker verification and spoofing detection tasks.EPSRC ; TÜBİTA

    Constraints on the χ_(c1) versus χ_(c2) polarizations in proton-proton collisions at √s = 8 TeV

    Get PDF
    The polarizations of promptly produced χ_(c1) and χ_(c2) mesons are studied using data collected by the CMS experiment at the LHC, in proton-proton collisions at √s=8  TeV. The χ_c states are reconstructed via their radiative decays χ_c → J/ψγ, with the photons being measured through conversions to e⁺e⁻, which allows the two states to be well resolved. The polarizations are measured in the helicity frame, through the analysis of the χ_(c2) to χ_(c1) yield ratio as a function of the polar or azimuthal angle of the positive muon emitted in the J/ψ → μ⁺μ⁻ decay, in three bins of J/ψ transverse momentum. While no differences are seen between the two states in terms of azimuthal decay angle distributions, they are observed to have significantly different polar anisotropies. The measurement favors a scenario where at least one of the two states is strongly polarized along the helicity quantization axis, in agreement with nonrelativistic quantum chromodynamics predictions. This is the first measurement of significantly polarized quarkonia produced at high transverse momentum
    corecore