67 research outputs found

    Lamb Wave Modes in Coal-Tar-Coated Steel Plates

    Get PDF
    In order to study the feasibility of using ultrasonic Lamb wave modes for detection and sizing of corrosion-related flaws in buried steel pipelines, we have calculated Lamb wave modes and performed numerous experiments on steel plates coated on one side with coal-tar enamel. The purpose of this paper is to discuss these theoretical and experimental results

    Rotation of pear-shaped 100^{100}Ru nucleus

    Full text link
    Atomic nuclei in general can have deformed shapes and nearly all these shapes are symmetric with respect to reflection. Only a few Actinide nuclei have stable reflection asymmetric pear shapes in their ground state and exhibit characteristic rotational bands. In this article, we report on the observation of two alternate parity rotational bands in 100Ru, which are connected by seven interleaved electric dipole transitions and their rates are found to be enhanced. In addition, the moments of inertia associated with these two opposite parity rotational bands have been found to be similar. These experimental observations indicate the rotation of a stable pear-shaped 100Ru nucleus, which is the first such observation outside the Actinide mass region. This shape is built on an excited configuration and originates from the rotational alignment of the angular momenta of a pair of neutrons. This unique observation establishes an alternate mechanism by which an atomic nucleus can assume a pear shape.Comment: 13 pages, 7 figures, 2 table

    Comparative efficacy of two microdoses of a potentized homoeopathic drug, Cadmium Sulphoricum, in reducing genotoxic effects produced by cadmium chloride in mice: a time course study

    Get PDF
    BACKGROUND: Cadmium poisoning in the environment has assumed an alarming problem in recent years. Effective antimutagenic agents which can reverse or combat cadmium induced genotoxicity in mice have not yet been reported. Therefore, in the present study, following the homeopathic principle of "like cures like", we tested the efficacy of two potencies of a homeopathic drug, Cadmium Sulphoricum (Cad Sulph), in reducing the genotoxic effects of Cadmium chloride in mice. Another objective was to determine the relative efficacy of three administrative modes, i.e. pre-, post- and combined pre and post-feeding of the homeopathic drugs. For this, healthy mice, Mus musculus, were intraperitoneally injected with 0.008% solution of CdCl(2) @ 1 ml/100 gm of body wt (i.e. 0.8 mcg/gm of bw), and assessed for the genotoxic effects through such studies as chromosome aberrations (CA), micronucleated erythrocytes (MNE), mitotic index (MI) and sperm head anomaly (SHA), keeping suitable succussed alcohol fed (positive) and CdCl(2) untreated normal (negative) controls. The CdCl(2) treated mice were divided into 3 subgroups, which were orally administered with the drug prior to, after and both prior to and after injection of CdCl(2) at specific fixation intervals and their genotoxic effects were analyzed. RESULTS: While the CA, MNE and SHA were reduced in the drug fed series as compared to their respective controls, the MI showed an apparent increase. The combined pre- and post-feeding of Cad Sulph showed maximum reduction of the genotoxic effects. CONCLUSIONS: Both Cad Sulph-30 and 200 were able to combat cadmium induced genotoxic effects in mice and that combined pre- and post-feeding mode of administration was found to be most effective in reducing the genotoxic effect of CdCl(2) followed by the post-feeding mode

    Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs

    Get PDF
    In this paper, we prove that the nonce-based enhanced hash-then-mask MAC (nEHtM\mathsf{nEHtM}) is secure up to 23n42^{\frac{3n}{4}} MAC queries and 2n2^n verification queries (ignoring logarithmic factors) as long as the number of faulty queries μ\mu is below 23n82^\frac{3n}{8}, significantly improving the previous bound by Dutta et al. Even when μ\mu goes beyond 23n82^{\frac{3n}{8}}, nEHtM\mathsf{nEHtM} enjoys graceful degradation of security. The second result is to prove the security of PRF-based nEHtM\mathsf{nEHtM}; when nEHtM\mathsf{nEHtM} is based on an nn-to-ss bit random function for a fixed size ss such that 1sn1\leq s\leq n, it is proved to be secure up to any number of MAC queries and 2s2^s verification queries, if (1) s=ns=n and μ<2n2\mu<2^{\frac{n}{2}} or (2) n2<s<2ns\frac{n}{2}<s<2^{n-s} and μ<max{2s2,2ns}\mu<\max\{2^{\frac{s}{2}},2^{n-s}\}, or (3) sn2s\leq \frac{n}{2} and μ<2n2\mu<2^{\frac{n}{2}}. This result leads to the security proof of truncated nEHtM\mathsf{nEHtM} that returns only ss bits of the original tag since a truncated permutation can be seen as a pseudorandom function. In particular, when s2n3s\leq\frac{2n}{3}, the truncated nEHtM\mathsf{nEHtM} is secure up to 2ns22^{n-\frac{s}{2}} MAC queries and 2s2^s verification queries as long as μ<min{2n2,2ns}\mu<\min\{2^{\frac{n}{2}},2^{n-s}\}. For example, when s=n2s=\frac{n}{2} (resp. s=n4s=\frac{n}{4}), the truncated nEHtM\mathsf{nEHtM} is secure up to 23n42^{\frac{3n}{4}} (resp. 27n82^{\frac{7n}{8}}) MAC queries. So truncation might provide better provable security than the original nEHtM\mathsf{nEHtM} with respect to the number of MAC queries

    Neuroprotection and acute spinal cord injury: A reappraisal

    Full text link
    corecore