106 research outputs found

    Primjena i kompozicija individualiziranih zaštitnih elemenata linijske grafike u projektiranju novčanica

    Get PDF
    Proces stvaranja novčanica je dugotrajan i složen, što rezultira kompleksnim rješenjima koja predstavljaju pravo remek djelo grafike. Novčanice su prožete brojnim detaljima i prenose različite informacije koje se analiziraju u teorijskom dijelu rada. Prvotno se postavljaju kriteriji po kojima se izrađuje detaljna analiza velikog broja zaštitnih i konceptualnih elemenata na primjerima novčanica. Time je prikazan okvirni povijesni pregled razvoja novčanica i utjecaji kojima je bio izložen. Analizira se međuovisnost dizajna o sigurnosnim značajkama, te se ispituje razina informiranosti javnosti o zaštitama na novčanicama. Zaključuje se koje metode zaštite su najučinkovitije, te kako šira javnost najčešće provjerava autentičnost novčanica. U eksperimentalnom dijelu rada se na temelju donesenih zaključaka iz teorijskog dijela izrađuje prototip novčanice koja je u najvećoj mjeri prožeta individualiziranim PostScript programskim rješenjima elemenata linijske grafike (rozete, mikrotekst, zaštitne linije, brojevi apoena), a od ostalih zaštita modeliran je individualizirani raster transformacijom matematičkog izraza u PostScript programski kod. Sve ostale zaštite tipične za novčanice simulirane su alatima za rastersku i vektorsku grafiku. U radu se ispituje utjecaj kompozicije zaštitnih elemenata na prepoznavanje autentičnosti novčanica, te efikasnost samih individualiziranih programskih rješenja

    Temperature, fluid content and rheology of localized ductile shear zones in subsolidus cooling plutons

    No full text
    Temperature and fluid content are critical parameters that control rock rheology and strain localization in the continental crust. Here, we determine by thermodynamic modelling the (Formula presented.) of localized ductile shearing during cooling of three different granitoid plutons: the Rieserferner and the Adamello plutons in the Italian Alps, and the Lake Edison pluton in the Sierra Nevada\u2014USA. Shear zones exploited precursor joints, associated veins and alteration zones. (Formula presented.) and P 12T phase diagram sections were computed with Perple_X in the system MnO 12Na2O 12CaO\ua0 12K2O 12FeO 12MgO 12Al2O3 12SiO2 12H2O 12Fe2O3. The phase diagram sections show that the nucleation of the brittle precursors (joints, veins) occurred at T\ubb 450\ub0C at fluid-saturated conditions. Localized ductile shearing likely occurred at temperature ranging between 420 and 460\ub0C evolving from initially fluid-saturated to fluid-undersaturated conditions in a closed system. In this temperature range, granitoid rocks are potentially subject to a series of retrograde metamorphic reactions replacing the load-bearing feldspars with weaker phyllosilicates. Metamorphic reactions occurred in spatial association with the precursory structures, leading to localized shearing. Decreasing temperature and fluid-undersaturated conditions likely hampered progressive strain accommodation in shear zones by slowing down metamorphic reactions, thermally activated dislocation creep processes, fluid-mediated deformation mechanisms and weakening mechanisms. Polyphase granitoid ultramylonite and mylonitic quartz veins have been affected differently by the fluid-undersaturated conditions of the system, as consequence of different dominant deformation mechanisms and syn-kinematic paragenesis during localized shearing. Localized ductile shearing in cooling plutons effectively occurs in a limited temperature range (420\u2013460\ub0C) in which the strain accommodation capacity of the shear zone is controlled by the negative feedback between the cooling rate, the kinetics of metamorphic reactions and deformation mechanisms, and the consumption of the limited amount of available fluids

    Cryptographic

    No full text
    methods of data protection have taken on new importance as computers have become faster and as strong cryptographic algorithms, such as the Data Encryption Standard (DES), have become available. But standard a encipherment technique is only the jrst step in applying cryptography in a computing center. This paper discusses the Information Protection System (IPS), a set of cryptographic application programs designed to use the DES algorithm in a working computing center. In designing IPS, several important augmentations of DES were formulated. IPS was first implemented to help increase computing-center security at the IBM Thomas J. Watson Research Center and is now widely installed at other IBM locations. IPS is not an IBM product and is not available for use outside IBM, but many cryptographic techniques in IPS were incorporated into the IBM cryptographic products announced in 1977

    Thermodynamic Approach

    No full text
    corecore