164 research outputs found

    Effect of shape on mechanical properties and deformation behavior of Cu nanowires: An atomistic simulations study

    Full text link
    We study the effect of nanowire shape on mechanical properties and deformation behaviour of Cu nanowires using atomistic simulations. Simulations were carried out on [100][100] nanowires with different shapes such as triangular, square, pentagon, hexagon and circular.Results indicate yield strength is different for different shapes. In both cases, triangular nanowire exhibit the lowest yield strength, while circular nanowire is the strongest. Deformation in all the nanowires is dominated by partials slip and twinning. Due to twinning, different shapes expose different surfaces at the twinned region. All nanowires show ductile failure and square nanowire exhibits the highest failure strain, while it is lowest for triangular nanowire.Comment: 14 pages, 10 Figure

    Method and System for Scatter Correction in X-Ray Imaging

    Get PDF
    Approaches for deriving scatter information using inverse tracking of scattered X-rays is disclosed. In certain embodiments scattered rays are tracked from respective locations on a detector to a source of the X-ray radiation, as opposed to tracking schemes that proceed from the source to the detector. In one such approach, the inverse tracking is implemented using a density integrated volume that reduces the integration steps performed

    A SECURE MECHANISM FOR PROVIDING A HACK FREE MESH IN OPEN NETS

    Get PDF
    The thought of deniability arises from undeniable fact that coercers cannot show the forecasted evidence is wrong and so haven't any motive to refuse the needed evidence. This process tries to obstruct coercion efforts as coercers observe that their attempts are ineffective. We utilize this idea to make sure that providers of cloud storage can offer audit-free storage services. A lot of the techniques of deniable file encryption consist of the problems of understanding error including techniques of designed understanding. Inside our work we provide a powerful file encryption plan of cloud storage that allows the providers of cloud storage to produce convincing false user strategies for defend user privacy. We employ top features of attribute basis file encryption for obtaining of knowledge that's stored in the method of proper-grained access control additionally to deniable file encryption to postpone outdoors auditing. Our recommended plan will grant clients to get capable of offer fake secrets that appear genuine to exterior coercers

    Perfusionists: The Camouflaged Healthcare Professionals

    Get PDF

    A HIERARCHICAL SCHEME TO ACHIEVE FIND TIME AND OPERATION ON DOCUMENTS

    Get PDF
    Many works were suggested in many types of threat to achieve various benefits for search for example single keyword search, multi-keyword rated search, and so forth.  Of individuals works, multi-keyword kinds of rated search is becoming more importance because of its realistic effectiveness.  We submit a great search method which draws on the tree above encoded cloud information, and it also manages multi-keyword search furthermore to dynamic process on selection of documents.  For acquiring of high search effectiveness, we produce a tree-based index structure and propose an formula using the index tree. The forecasted plan is called to provide multi-keyword query furthermore to a particular result ranking, in addition dynamic update above document collections. Due to important structure of tree-based index, forecasted search system will effectively get sub-straight line search serious amounts of manage the operation of deletion furthermore to insertion of documents

    In-stent thrombosis after 68 months of implantation inspite of continuous dual antiplatelet therapy: a case report

    Get PDF
    Lately, there has been an increased incidence of late stent thrombosis; especially following Drug eluting stent (DES) implantation. Several factors are associated with an increased risk of stent thrombosis, including the procedure itself, patient and lesion characteristics, stent design, and premature cessation of anti-platelet drugs. We present a case of late stent thrombosis (LST) following DES implantation after a period of 68 months, making it the longest reported case of LST reported in the literature, despite the use of dual anti-platelet therapy
    • …
    corecore