3,281 research outputs found
New features and applications of PRESTO, a computer code for the performance of regenerative, superheated steam turbine cycles
The code was designed to analyze performance at valves-wide-open design flow. The code can model conventional steam cycles as well as cycles that include such special features as process steam extraction and induction and feedwater heating by external heat sources. Convenience features and extensions to the special features were incorporated into the PRESTO code. The features are described, and detailed examples illustrating the use of both the original and the special features are given
Implementation of control point form of algebraic grid-generation technique
The control point form (CPF) provides explicit control of physical grid shape and grid spacing through the movement of the control points. The control point array, called a control net, is a space grid type arrangement of locations in physical space with an index for each direction. As an algebraic method CPF is efficient and works well with interactive computer graphics. A family of menu-driven, interactive grid-generation computer codes (TURBO) is being developed by using CPF. Key features of TurboI (a TURBO member) are discussed and typical results are presented. TurboI runs on any IRIS 4D series workstation
Dynamics of axial separation in long rotating drums
We propose a continuum description for the axial separation of granular
materials in a long rotating drum. The model, operating with two local
variables, concentration difference and the dynamic angle of repose, describes
both initial transient traveling wave dynamics and long-term segregation of the
binary mixture. Segregation proceeds through ultra-slow logarithmic coarsening.Comment: 4 pages, 3 Postscript figures; submitted to PR
Recommended from our members
Patient-Related Barriers to Timely Dialysis Access Preparation: A Qualitative Study of the Perspectives of Patients, Family Members, and Health Care Providers
Rational & Objective
A key aspect of smooth transition to dialysis is the timely creation of a permanent access. Despite early referral to kidney care, initiation onto dialysis is still suboptimal for many patients, which has clinical and cost implications. This study aimed to explore perspectives of various stakeholders on barriers to timely access creation.
Study Design
Qualitative study.
Setting & Participants
Semi-structured interviews with 96 participants (response rate, 67%), including patients with stage 4 chronic kidney disease (n = 30), new hemodialysis patients with (n = 18) and without (n = 20) permanent access (arteriovenous fistula), family members (n = 19), and kidney health care providers (n = 9).
Analytical Approach
Thematic analysis.
Results
Patients reported differential levels of behavioral activation toward access creation: avoidance/denial, wait and see, or active intention. 6 core themes were identified: (1) lack of symptoms, (2) dialysis fear and practical concerns (exaggerated fear, pain, cost, lifestyle disruptions, work-related concerns, burdening their families), (3) evaluating value against costs/risks of access creation (benefits, threat of operation, viability, prompt for early initiation), (4) preference for alternatives, (5) social influences (hearsay, family involvement, experiences of others), and (6) health care provider interactions (mistrust, interpersonal tension, lack of clarity on information). Themes were common to all groups, whereas nuanced perspectives of family members and health care providers were noted in some subthemes.
Limitations
Response bias.
Conclusions
Individual, interpersonal, and psychosocial factors compromise dialysis preparation and contribute to suboptimal dialysis initiation. Our findings support the need for interventions to improve patient and family engagement and address emotional concerns and misperceptions about preparing for dialysis
Thermophysical and elastic properties of Cu50Zr50 and (Cu50Zr50)95Al5 bulk-metallic-glass-forming alloys
By employing a containerless high-temperature high-vacuum electrostatic levitation technique, the thermophysical properties, including the ratio between the specific heat capacity and the hemispherical total emissivity, the specific volume, and the viscosity, of Cu50Zr50 and (Cu50Zr50)95Al5 bulk-metallic-glass (BMG)-forming liquids have been measured. Compared with Cu50Zr50, the improved glass-forming ability of (Cu50Zr50)95Al5 can be attributed to its dense liquid structure and its high value of viscosity. Additionally, the relationship between the viscosity of various BMG forming liquids at the melting temperature and the elastic properties of the corresponding glasses at room temperature will be compared
Chemical Raman Enhancement of Organic Adsorbates on Metal Surfaces
Using a combination of first-principles theory and experiments, we provide a
quantitative explanation for chemical contributions to surface-enhanced Raman
spectroscopy for a well-studied organic molecule, benzene thiol, chemisorbed on
planar Au(111) surfaces. With density functional theory calculations of the
static Raman tensor, we demonstrate and quantify a strong mode-dependent
modification of benzene thiol Raman spectra by Au substrates. Raman active
modes with the largest enhancements result from stronger contributions from Au
to their electron-vibron coupling, as quantified through a deformation
potential, a well-defined property of each vibrational mode. A straightforward
and general analysis is introduced that allows extraction of chemical
enhancement from experiments for specific vibrational modes; measured values
are in excellent agreement with our calculations.Comment: 5 pages, 4 figures and Supplementary material included as ancillary
fil
LiPISC: A Lightweight and Flexible Method for Privacy-Aware Intersection Set Computation
Privacy-aware intersection set computation (PISC) can be modeled as secure multi-party computation. The basic idea is to compute the intersection of input sets without leaking privacy. Furthermore, PISC should be sufficiently flexible to recommend approximate intersection items. In this paper, we reveal two previously unpublished attacks against PISC, which can be used to reveal and link one input set to another input set, resulting in privacy leakage. We coin these as Set Linkage Attack and Set Reveal Attack. We then present a lightweight and flexible PISC scheme (LiPISC) and prove its security (including against Set Linkage Attack and Set Reveal Attack)
Fuzzy identity-based data integrity auditing for reliable cloud storage systems
This is the author accepted manuscript. The final version is available from the publisher via the DOI in this record.As a core security issue in reliable cloud storage, data integrity has received much attention. Data auditing protocols enable
a verifier to efficiently check the integrity of the outsourced data without downloading the data. A key research challenge associated
with existing designs of data auditing protocols is the complexity in key management. In this paper, we seek to address the complex
key management challenge in cloud data integrity checking by introducing fuzzy identity-based auditing-the first in such an approach,
to the best of our knowledge. More specifically, we present the primitive of fuzzy identity-based data auditing, where a user’s identity
can be viewed as a set of descriptive attributes. We formalize the system model and the security model for this new primitive. We then
present a concrete construction of fuzzy identity-based auditing protocol by utilizing biometrics as the fuzzy identity. The new protocol
offers the property of error-tolerance, namely, it binds private key to one identity which can be used to verify the correctness of a
response generated with another identity, if and only if both identities are sufficiently close. We prove the security of our protocol based
on the computational Diffie-Hellman assumption and the discrete logarithm assumption in the selective-ID security model. Finally, we
develop a prototype implementation of the protocol which demonstrates the practicality of the proposal.This work is
supported by the National Natural Science Foundation of
China (61501333,61300213,61272436,61472083), the Fundamental
Research Funds for the Central Universities under
Grant ZYGX2015J05
- …