2,330 research outputs found

    Development of a heterogeneous laminating resin system

    Get PDF
    The factors which effect the impact resistance of laminating resin systems and yet retain equivalent performance with the conventional 450 K curing epoxy matrix systems in other areas were studied. Formulation work was conducted on two systems, an all-epoxy and an epoxy/bismaleimide, to gain fundamental information on the effect formulation changes have upon neat resin and composite properties. The all-epoxy work involved formulations with various amounts and combinations of eight different epoxy resins, four different hardeners, fifteen different toughening agents, a filler, and a catalyst. The epoxy/bismaleimide effort improved formulations with various amounts and combinations of nine different resins, four different hardeners, eight different toughening agents, four different catalysts, and a filler. When a formulation appeared to offer the proper combination of properties required for a laminating resin Celion 3K-70P fabric was prepregged. Initial screening tests on composites primarily involved Gardner type impact and measurement of short beam shear strengths under dry and hot/wet conditions

    THE ART ATHLETE: A SPORTS BIOMECHANICS PERSPECTIVE

    Get PDF
    Overuse injuries are as much a problem for ‘art athletes’ (dancers and musicians and performing artists generally) as they are for those we more commonly term ‘athletes’. Lower back injuries in male ballet dancers are certainly commonplace. 3D motion analysis in combination with 3D Static Strength Predicting analysis showed that compressive forces at L5/S1 were above the National Institute of Occupational Safety and Health ‘Back Compression Design Limit’ (~ 4,500N) and shear forces were high (~ 530 N) for male dancers performing two commonly used classical lifts. A research design for the use of an opto-reflective motion analysis (Vicon) to investigate shoulder joint loading in cellists and violinists will also be presented

    To Tune or Not to Tune?: In Search of Optimal Configurations for Data Analytics

    Get PDF
    This experimental study presents several overlooked issues that pose a challenge for data analytics configuration tuning and deployment. These issues include: 1) the assumption of static workload/environment ignoring the dynamic characteristics of the analytics environment (e.g. the frequent need for workload retuning). 2) the speed of tuning cost amortization and how this influences the tuning decision. 3) the need for a comprehensive incremental tuning for a diverse set of workloads. To prove our point, we present Tuneful, an efficient configuration tuning framework for data analytics. We show how it is designed to overcome the above issues and illustrate its applicability by experimenting with it on two cloud service providers

    Materials, photophysics and device engineering of perovskite light-emitting diodes

    Get PDF
    Here we provide a comprehensive review of a newly developed lighting technology based on metal halide perovskites (i.e. perovskite light-emitting diodes) encompassing the research endeavours into materials, photophysics and device engineering. At the outset we survey the basic perovskite structures and their various dimensions (namely three-, two- and zero-dimensional perovskites), and demonstrate how the compositional engineering of these structures affects the perovskite light-emitting properties. Next, we turn to the physics underpinning photo- and electroluminescence in these materials through their connection to the fundamental excited states, energy/charge transport processes and radiative and non-radiative decay mechanisms. In the remainder of the review, we focus on the engineering of perovskite light-emitting diodes, including the history of their development as well as an extensive analysis of contemporary strategies for boosting device performance. Key concepts include balancing the electron/hole injection, suppression of parasitic carrier losses, improvement of the photoluminescence quantum yield and enhancement of the light extraction. Overall, this review reflects the current paradigm for perovskite lighting, and is intended to serve as a foundation to materials and device scientists newly working in this field

    BALLET DANCER INJURIES DURING PERFORMANCE AND REHEARSAL ON VARIED DANCE SURFACES

    Get PDF
    Three dance surfaces regularly used by a professional touring ballet company (n=60) were quantified using standard sports surface testing apparatus. Surface sub-structure construction varied between surfaces and a range of surface force reduction values were reported. Injuries and associated variables occurring within the ballet company were recorded by the company medical staff. An injury was recorded if a dancer experienced an incident that restricted the dancer from performing all activities that were required of them for the period 24hrs after the incident. Injuries were delimited to those occurring in the lower limbs or trunk during reported non-lifting dance activity. Analysis of statistical significance was restricted due to a low injury data sample size. However certain trends in the injury data warrant future research. The surface with the highest variability in intra-surface force reduction was associated with the highest injury rates per week, lower limb injuries per week, mean days lost dancing per injury and likelihood of injury per performance day. Variability in intra-surface force reduction may have a stronger association with injury risk than mean surface force reduction magnitudes

    A primer on provenance

    Get PDF
    Better understanding data requires tracking its history and context.</jats:p

    Naturally Rehearsing Passwords

    Full text link
    We introduce quantitative usability and security models to guide the design of password management schemes --- systematic strategies to help users create and remember multiple passwords. In the same way that security proofs in cryptography are based on complexity-theoretic assumptions (e.g., hardness of factoring and discrete logarithm), we quantify usability by introducing usability assumptions. In particular, password management relies on assumptions about human memory, e.g., that a user who follows a particular rehearsal schedule will successfully maintain the corresponding memory. These assumptions are informed by research in cognitive science and validated through empirical studies. Given rehearsal requirements and a user's visitation schedule for each account, we use the total number of extra rehearsals that the user would have to do to remember all of his passwords as a measure of the usability of the password scheme. Our usability model leads us to a key observation: password reuse benefits users not only by reducing the number of passwords that the user has to memorize, but more importantly by increasing the natural rehearsal rate for each password. We also present a security model which accounts for the complexity of password management with multiple accounts and associated threats, including online, offline, and plaintext password leak attacks. Observing that current password management schemes are either insecure or unusable, we present Shared Cues--- a new scheme in which the underlying secret is strategically shared across accounts to ensure that most rehearsal requirements are satisfied naturally while simultaneously providing strong security. The construction uses the Chinese Remainder Theorem to achieve these competing goals

    On the Gold Standard for Security of Universal Steganography

    Get PDF
    While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them. The computational model for public-key steganography was proposed by von Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first universal public-key stegosystem - i.e. one that works on all channels - achieving security against replayable chosen-covertext attacks (SS-RCCA) and asked whether security against non-replayable chosen-covertext attacks (SS-CCA) is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every efficiently sampleable channel, but did not achieve universality. He posed the question whether universality and SS-CCA-security can be achieved simultaneously. No progress on this question has been achieved since more than a decade. In our work we solve Hopper's problem in a somehow complete manner: As our main positive result we design an SS-CCA-secure stegosystem that works for every memoryless channel. On the other hand, we prove that this result is the best possible in the context of universal steganography. We provide a family of 0-memoryless channels - where the already sent documents have only marginal influence on the current distribution - and prove that no SS-CCA-secure steganography for this family exists in the standard non-look-ahead model.Comment: EUROCRYPT 2018, llncs styl
    • …
    corecore