497 research outputs found

    Statics and Dynamics of Strongly Charged Soft Matter

    Full text link
    Soft matter materials, such as polymers, membranes, proteins, are often electrically charged. This makes them water soluble, which is of great importance in technological application and a prerequisite for biological function. We discuss a few static and dynamic systems that are dominated by charge effects. One class comprises complexation between oppositely charged objects, for example the adsorption of charged ions or charged polymers (such as DNA) on oppositely charged substrates of different geometry. The second class comprises effective interactions between similarly charged objects. Here the main theme is to understand the experimental finding that similarly and highly charged bodies attract each other in the presence of multi-valent counterions. This is demonstrated using field-theoretic arguments as well as Monte-Carlo simulations for the case of two homogeneously charged bodies. Realistic surfaces, on the other hand, are corrugated and also exhibit modulated charge distributions, which is important for static properties such as the counterion-density distribution, but has even more pronounced consequences for dynamic properties such as the counterion mobility. More pronounced dynamic effects are obtained with highly condensed charged systems in strong electric fields. Likewise, an electrostatically collapsed highly charged polymer is unfolded and oriented in strong electric fields. At the end of this review, we give a very brief account of the behavior of water at planar surfaces and demonstrate using ab-initio methods that specific interactions between oppositely charged groups cause ion-specific effects that have recently moved into the focus of interest.Comment: 61 pages, 31 figures, Physics Reports (2005)-in press (high quality figures available from authors

    Dates of birth and seasonal changes in well-being among 4904 subjects completing the seasonal pattern assessment questionnaire

    Get PDF
    Background: Abnormal distributions of birthdates, suggesting intrauterine aetiological factors, have been found in several psychiatric disorders, including one study of out-patients with Seasonal Affective Disorder (S.A.D.). We investigated birthdate distribution in relation to seasonal changes in well-being among a cohort who had completed the Seasonal Pattern Assessment Questionnaire (SPAQ). Method: A sample of 4904 subjects, aged 16 to 64, completed the SPAQ. 476 were cases of S.A.D. on the SPAQ and 580 were cases of sub-syndromal S.A.D. (S-S.A.D.). 92 were interview confirmed cases of S.A.D. Months and dates of birth were compared between S.A.D. cases and all others, between S.A.D. and S-S.A.D. cases combined and all others, and between interview confirmed cases and all others. Seasonality, as measured through seasonal fluctuations in well-being on the Global Seasonality Scores (GSS) of the SPAQ, was compared for all subjects by month and season of birth. Results: There was no evidence of an atypical pattern of birthdates for subjects fulfilling criteria for S.A.D., for the combined S.A.D. / S-S.A.D. group or for interview confirmed cases. There was also no relationship between seasonality on the GSS and month or season of birth. Limitations: Diagnoses of S.A.D. made by SPAQ criteria are likely to be overinclusive. Conclusion: Our findings differ from studies of patients with more severe mood disorders, including psychiatric out-patients with S.A.D. The lack of association between seasonality and birthdates in our study adds credence to the view that the aetiology of S.A.D. relates to separable factors predisposing to affective disorders and to seasonality

    Development of an Arabic text-to-speech system

    Get PDF
    Research on Text-to-speech technology has received the interest of professional researchers in many languages which is a consequence of wide range of applications where Text-To-Speech is implemented. However, Arabic language, spoken by millions of people as an official language in 24 different countries, gained less attention compared with other languages despite the fact that it has a religious value for more than 1.6 billion Muslim worldwide. These facts exhibit the need for a high quality, smallsize, and completely free Arabic TTS with the ability of future improvements. The vowelized written text of Arabic language carries the pronunciation rules with limited exceptions, so rulebased system with an exception dictionary for words that fail with those letter-to-phoneme rules may be a much more reasonable approach. This paper is a development of a rulebased text-to-speech Hybrid synthesis system which is a combination formant and concatenation techniques with acceptable naturalness. The simulation results of the system shows good quality in handling word, phrase, and sentence level compared to other available Arabic TTS systems. The accuracy of the overall system is 96%. Further improvements need to be done for stressed syllable position and intonation

    Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques

    Full text link
    The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information. Furthermore, there is no formal method to be followed to discover a hidden data. In this paper, a new information hiding framework is presented.The proposed framework aim is implementation of framework computation between advance encryption standard (AES) and distortion technique (DT) which embeds information in image page within executable file (EXE file) to find a secure solution to cover file without change the size of cover file. The framework includes two main functions; first is the hiding of the information in the image page of EXE file, through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the stego file, extract the information, and decryption of the information).Comment: 6 Pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.42

    Drag forces on inclusions in classical fields with dissipative dynamics

    Full text link
    We study the drag force on uniformly moving inclusions which interact linearly with dynamical free field theories commonly used to study soft condensed matter systems. Drag forces are shown to be nonlinear functions of the inclusion velocity and depend strongly on the field dynamics. The general results obtained can be used to explain drag forces in Ising systems and also predict the existence of drag forces on proteins in membranes due to couplings to various physical parameters of the membrane such as composition, phase and height fluctuations.Comment: 14 pages, 7 figure

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography

    Get PDF
    The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java

    Strong Coupling Electrostatics in the Presence of Dielectric Inhomogeneities

    Full text link
    We study the strong-coupling (SC) interaction between two like-charged membranes of finite thickness embedded in a medium of higher dielectric constant. A generalized SC theory is applied along with extensive Monte-Carlo simulations to study the image charge effects induced by multiple dielectric discontinuities in this system. These effects lead to strong counterion crowding in the central region of the inter-surface space upon increasing the solvent/membrane dielectric mismatch and change the membrane interactions from attractive to repulsive at small separations. These features agree quantitatively with the SC theory at elevated couplings or dielectric mismatch where the correlation hole around counterions is larger than the thickness of the central counterion layer.Comment: 4 pages, 3 figure

    Role of Multipoles in Counterion-Mediated Interactions between Charged Surfaces: Strong and Weak Coupling

    Full text link
    We present general arguments for the importance, or lack thereof, of the structure in the charge distribution of counterions for counterion-mediated interactions between bounding symmetrically charged surfaces. We show that on the mean field or weak coupling level, the charge quadrupole contributes the lowest order modification to the contact value theorem and thus to the intersurface electrostatic interactions. The image effects are non-existent on the mean-field level even with multipoles. On the strong coupling level the quadrupoles and higher order multipoles contribute additional terms to the interaction free energy only in the presence of dielectric inhomogeneities. Without them, the monopole is the only multipole that contributes to the strong coupling electrostatics. We explore the consequences of these statements in all their generality.Comment: 12 pages, 3 figure

    Experimental and Numerical Study of a Turbulent Multiple Jets Issued from Lobed Diffusers

    Get PDF
    A combined experimental and computational study of a turbulent multiple jet from lobed diffusers is performed. The main interest of these multiple lobed jets is to come up with the best configuration that improves the thermal and dynamic homogenization in air diffusion units that can be used for ventilation, heating and air conditioning of residential premises. Herein, the configuration of a central lobed jet surrounded by six equidistant peripheral lobed jets has been investigated. On the experimental level, flow velocities and temperatures were measured by a multifunctional thermo-anemometer. In terms of numerical simulation, the conservation equations of mass, momentum and energy are solved while involving four turbulence models, viz., the k-ϵ model, the k-ω, the shear stress transport (SST) k-ω model and the Reynolds Stress Model (RSM). The findings are compared with thermo-anemometer measurements. It turns out that the SST k- ω model is most appropriate for predicting the average flow characteristics

    Numerical evaluation of new Austrian tunneling method excavation sequences: a case study

    Get PDF
    The main aspects that require attention in tunnel design in terms of safety and economy are the precise estimation of probable ground conditions and ground behavior during construction. The variation in rock mass behavior due to tunnel excavation sequence plays an important role during the construction stage. The purpose of this research is to numerically evaluate the effect of excavation sequence on the ground behavior for the Lowari tunnel project, Pakistan. For the tunnel stability, the ground behavior observed during the actual partial face excavation sequence is compared with the top heading and bench excavation sequence. For this purpose, the intact rock parameters are used along with the characterization of rock mass joints related parameters to provide input for numerical modelling via FLAC 2D. The in-situ stresses for the numerical modelling are obtained using empirical equations. From the comparison of the two excavation sequences, it was observed that the actual excavation sequence used for Lowari tunnel construction utilized more support than the top heading and bench method. However, the actual excavation sequence provided good results in terms of stability
    corecore