497 research outputs found
Statics and Dynamics of Strongly Charged Soft Matter
Soft matter materials, such as polymers, membranes, proteins, are often
electrically charged. This makes them water soluble, which is of great
importance in technological application and a prerequisite for biological
function. We discuss a few static and dynamic systems that are dominated by
charge effects. One class comprises complexation between oppositely charged
objects, for example the adsorption of charged ions or charged polymers (such
as DNA) on oppositely charged substrates of different geometry. The second
class comprises effective interactions between similarly charged objects. Here
the main theme is to understand the experimental finding that similarly and
highly charged bodies attract each other in the presence of multi-valent
counterions. This is demonstrated using field-theoretic arguments as well as
Monte-Carlo simulations for the case of two homogeneously charged bodies.
Realistic surfaces, on the other hand, are corrugated and also exhibit
modulated charge distributions, which is important for static properties such
as the counterion-density distribution, but has even more pronounced
consequences for dynamic properties such as the counterion mobility. More
pronounced dynamic effects are obtained with highly condensed charged systems
in strong electric fields. Likewise, an electrostatically collapsed highly
charged polymer is unfolded and oriented in strong electric fields. At the end
of this review, we give a very brief account of the behavior of water at planar
surfaces and demonstrate using ab-initio methods that specific interactions
between oppositely charged groups cause ion-specific effects that have recently
moved into the focus of interest.Comment: 61 pages, 31 figures, Physics Reports (2005)-in press (high quality
figures available from authors
Dates of birth and seasonal changes in well-being among 4904 subjects completing the seasonal pattern assessment questionnaire
Background: Abnormal distributions of birthdates, suggesting intrauterine aetiological factors, have been found in several psychiatric disorders, including one study of out-patients with Seasonal Affective Disorder (S.A.D.). We investigated birthdate distribution in relation to seasonal changes in well-being among a cohort who had completed the Seasonal Pattern Assessment Questionnaire (SPAQ). Method: A sample of 4904 subjects, aged 16 to 64, completed the SPAQ. 476 were cases of S.A.D. on the SPAQ and 580 were cases of sub-syndromal S.A.D. (S-S.A.D.). 92 were interview confirmed cases of S.A.D. Months and dates of birth were compared between S.A.D. cases and all others, between S.A.D. and S-S.A.D. cases combined and all others, and between interview confirmed cases and all others. Seasonality, as measured through seasonal fluctuations in well-being on the Global Seasonality Scores (GSS) of the SPAQ, was compared for all subjects by month and season of birth. Results: There was no evidence of an atypical pattern of birthdates for subjects fulfilling criteria for S.A.D., for the combined S.A.D. / S-S.A.D. group or for interview confirmed cases. There was also no relationship between seasonality on the GSS and month or season of birth. Limitations: Diagnoses of S.A.D. made by SPAQ criteria are likely to be overinclusive. Conclusion: Our findings differ from studies of patients with more severe mood disorders, including psychiatric out-patients with S.A.D. The lack of association between seasonality and birthdates in our study adds credence to the view that the aetiology of S.A.D. relates to separable factors predisposing to affective disorders and to seasonality
Development of an Arabic text-to-speech system
Research on Text-to-speech technology has received
the interest of professional researchers in many languages which is a consequence of wide range of applications where Text-To-Speech is implemented. However, Arabic language, spoken by millions of people as an official language in 24 different countries, gained less attention compared with other languages despite the fact that it has a religious value for more than 1.6 billion Muslim worldwide. These facts exhibit the need for a high quality, smallsize, and completely free Arabic TTS with the ability of future
improvements. The vowelized written text of Arabic language
carries the pronunciation rules with limited exceptions, so rulebased system with an exception dictionary for words that fail with those letter-to-phoneme rules may be a much more reasonable approach. This paper is a development of a rulebased text-to-speech Hybrid synthesis system which is a
combination formant and concatenation techniques with
acceptable naturalness. The simulation results of the system
shows good quality in handling word, phrase, and sentence level compared to other available Arabic TTS systems. The accuracy of the overall system is 96%. Further improvements need to be done for stressed syllable position and intonation
Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques
The hurried development of multimedia and internet allows for wide
distribution of digital media data. It becomes much easier to edit, modify and
duplicate digital information. In additional, digital document is also easy to
copy and distribute, therefore it may face many threats. It became necessary to
find an appropriate protection due to the significance, accuracy and
sensitivity of the information. Furthermore, there is no formal method to be
followed to discover a hidden data. In this paper, a new information hiding
framework is presented.The proposed framework aim is implementation of
framework computation between advance encryption standard (AES) and distortion
technique (DT) which embeds information in image page within executable file
(EXE file) to find a secure solution to cover file without change the size of
cover file. The framework includes two main functions; first is the hiding of
the information in the image page of EXE file, through the execution of four
process (specify the cover file, specify the information file, encryption of
the information, and hiding the information) and the second function is the
extraction of the hiding information through three process (specify the stego
file, extract the information, and decryption of the information).Comment: 6 Pages IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.42
Drag forces on inclusions in classical fields with dissipative dynamics
We study the drag force on uniformly moving inclusions which interact
linearly with dynamical free field theories commonly used to study soft
condensed matter systems. Drag forces are shown to be nonlinear functions of
the inclusion velocity and depend strongly on the field dynamics. The general
results obtained can be used to explain drag forces in Ising systems and also
predict the existence of drag forces on proteins in membranes due to couplings
to various physical parameters of the membrane such as composition, phase and
height fluctuations.Comment: 14 pages, 7 figure
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java
Strong Coupling Electrostatics in the Presence of Dielectric Inhomogeneities
We study the strong-coupling (SC) interaction between two like-charged
membranes of finite thickness embedded in a medium of higher dielectric
constant. A generalized SC theory is applied along with extensive Monte-Carlo
simulations to study the image charge effects induced by multiple dielectric
discontinuities in this system. These effects lead to strong counterion
crowding in the central region of the inter-surface space upon increasing the
solvent/membrane dielectric mismatch and change the membrane interactions from
attractive to repulsive at small separations. These features agree
quantitatively with the SC theory at elevated couplings or dielectric mismatch
where the correlation hole around counterions is larger than the thickness of
the central counterion layer.Comment: 4 pages, 3 figure
Role of Multipoles in Counterion-Mediated Interactions between Charged Surfaces: Strong and Weak Coupling
We present general arguments for the importance, or lack thereof, of the
structure in the charge distribution of counterions for counterion-mediated
interactions between bounding symmetrically charged surfaces. We show that on
the mean field or weak coupling level, the charge quadrupole contributes the
lowest order modification to the contact value theorem and thus to the
intersurface electrostatic interactions. The image effects are non-existent on
the mean-field level even with multipoles. On the strong coupling level the
quadrupoles and higher order multipoles contribute additional terms to the
interaction free energy only in the presence of dielectric inhomogeneities.
Without them, the monopole is the only multipole that contributes to the strong
coupling electrostatics. We explore the consequences of these statements in all
their generality.Comment: 12 pages, 3 figure
Experimental and Numerical Study of a Turbulent Multiple Jets Issued from Lobed Diffusers
A combined experimental and computational study of a turbulent multiple jet from lobed diffusers is performed. The main interest of these multiple lobed jets is to come up with the best configuration that improves the thermal and dynamic homogenization in air diffusion units that can be used for ventilation, heating and air conditioning of residential premises. Herein, the configuration of a central lobed jet surrounded by six equidistant peripheral lobed jets has been investigated. On the experimental level, flow velocities and temperatures were measured by a multifunctional thermo-anemometer. In terms of numerical simulation, the conservation equations of mass, momentum and energy are solved while involving four turbulence models, viz., the k-ϵ model, the k-ω, the shear stress transport (SST) k-ω model and the Reynolds Stress Model (RSM). The findings are compared with thermo-anemometer measurements. It turns out that the SST k- ω model is most appropriate for predicting the average flow characteristics
Numerical evaluation of new Austrian tunneling method excavation sequences: a case study
The main aspects that require attention in tunnel design in terms of safety and economy are the precise estimation of probable ground conditions and ground behavior during construction. The variation in rock mass behavior due to tunnel excavation sequence plays an important role during the construction stage. The purpose of this research is to numerically evaluate the effect of excavation sequence on the ground behavior for the Lowari tunnel project, Pakistan. For the tunnel stability, the ground behavior observed during the actual partial face excavation sequence is compared with the top heading and bench excavation sequence. For this purpose, the intact rock parameters are used along with the characterization of rock mass joints related parameters to provide input for numerical modelling via FLAC 2D. The in-situ stresses for the numerical modelling are obtained using empirical equations. From the comparison of the two excavation sequences, it was observed that the actual excavation sequence used for Lowari tunnel construction utilized more support than the top heading and bench method. However, the actual excavation sequence provided good results in terms of stability
- …