51,018 research outputs found

    Dynamics of Dry Friction: A Numerical Investigation

    Get PDF
    We perform extended numerical simulation of the dynamics of dry friction, based on a model derived from the phenomenological description proposed by T. Baumberger et al.. In the case of small deviation from the steady sliding motion, the model is shown to be equivalent to the state- and rate-dependent friction law which was first introduced by Rice and Ruina on the basis of experiments on rocks. We obtain the dynamical phase diagram that agrees well with the experimental results on the paper-on-paper systems. In particular, the bifurcation between stick-slip and steady sliding are shown to change from a direct (supercritical) Hopf type to an inverted (subcritical) one as the driving velocity increases, in agreement with the experiments.Comment: 7 pages, 5 figures, using RevTe

    Preparation and characterization of interpenetrating phased TCP/HA/PLGA composites

    Get PDF
    The purpose of this study was to fabricate composites consisting of three interpenetrating networks: tricalcium phosphate (TCP), hydroxyapatite (HA), and poly(DL-lactide-co-glycolide) (PLGA). The porous TCP network was first produced by coating a polyurethane (PU) foam with hydrolysable alpha-TCP slurry. The HA network was derived from a calcium phosphate cement (CPC) filled in the porous TCP network. The remaining open pore network in the HA/TCP composite was further infiltrated with a PLGA network. The three sets of spatially continuous networks would have different biodegradation rates and thus bone tissue would grow towards the fastest biodegrading network while the remaining networks still maintaining their geometrical shape and carrying the physiological load for the tissue ingrowth

    #mytweet via Instagram: Exploring User Behaviour across Multiple Social Networks

    Full text link
    We study how users of multiple online social networks (OSNs) employ and share information by studying a common user pool that use six OSNs - Flickr, Google+, Instagram, Tumblr, Twitter, and YouTube. We analyze the temporal and topical signature of users' sharing behaviour, showing how they exhibit distinct behaviorial patterns on different networks. We also examine cross-sharing (i.e., the act of user broadcasting their activity to multiple OSNs near-simultaneously), a previously-unstudied behaviour and demonstrate how certain OSNs play the roles of originating source and destination sinks.Comment: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015. This is the pre-peer reviewed version and the final version is available at http://wing.comp.nus.edu.sg/publications/2015/lim-et-al-15.pd

    Effect of Socio-Demographics, Health-Related Problems, and Family Structure on Chronic Absenteeism Among Children

    Full text link
    Purpose/Background: From 5 to 7.5 million school children are chronically absent, defined as missing ≥15 days of school within a year. Students miss schools due to various reasons such as health, socioeconomic status, and environmental factors. We examined child’s health and behavior, family structure, and socio-demographics to understand chronic absenteeism. Materials & Methods: The population included children ages 6 to 17 years from the Medical Expenditure Panel Survey (MEPS) years 2008-2013. Multivariable logistic regressions were used to identify the risk factors of chronic absenteeism, adjusting for the complex sampling design. Results: Among socio-demographic variables, age ≥14 years, race/ethnicity, lower-income family, public health insurance, US-born, and speaking English at home were associated with chronic absenteeism. Asians, Mexican Hispanics, and blacks have lower chronic absenteeism than whites. Among health-related variables, children using an inhaler for asthma, having behavioral problems, and less healthy than other children were more likely to be chronically absent. Among family variables, a smaller family size was a risk factor for chronic absenteeism. Discussion/Conclusion: Asthma and behavioral problems were highly associated with chronic absenteeism. The identification of children at risk for chronic absenteeism will help the educational professionals identify the barriers to academic achievements and develop integrated educational interventions and policies to support disadvantaged children

    End-of-life vehicle (ELV) recycling management: improving performance using an ISM approach

    Get PDF
    With booming of the automobile industry, China has become the country with increasing car ownership all over the world. However, the end-of-life vehicle (ELV) recycling industry is at infancy, and there is little systematic review on ELV recycling management, as well as low adoption amongst domestic automobile industry. This study presents a literature review and an interpretive structural modeling (ISM) approach is employed to identify the drivers towards Chinese ELV recycling business from government, recycling organizations and consumer’s perspectives, so as to improve the sustainability of automobile supply chain by providing some strategic insights. The results derived from the ISM analysis manifest that regulations on auto-factory, disassembly technique, and value mining of recycling business are the essential ingredients. It is most effective and efficient to promote ELV recycling business by improving these attributes, also the driving and dependence power analysis are deemed to provide guidance on performance improvement of ELV recycling in the Chinese market

    Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters

    Full text link
    In Identity-Based Encryption (IBE) systems, key revocation is non-trivial. This is because a user's identity is itself a public key. Moreover, the private key corresponding to the identity needs to be obtained from a trusted key authority through an authenticated and secrecy protected channel. So far, there exist only a very small number of revocable IBE (RIBE) schemes that support non-interactive key revocation, in the sense that the user is not required to interact with the key authority or some kind of trusted hardware to renew her private key without changing her public key (or identity). These schemes are either proven to be only selectively secure or have public parameters which grow linearly in a given security parameter. In this paper, we present two constructions of non-interactive RIBE that satisfy all the following three attractive properties: (i) proven to be adaptively secure under the Symmetric External Diffie-Hellman (SXDH) and the Decisional Linear (DLIN) assumptions; (ii) have constant-size public parameters; and (iii) preserve the anonymity of ciphertexts---a property that has not yet been achieved in all the current schemes
    corecore