5,902 research outputs found

    Phase diagram of softly repulsive systems: The Gaussian and inverse-power-law potentials

    Full text link
    We redraw, using state-of-the-art methods for free-energy calculations, the phase diagrams of two reference models for the liquid state: the Gaussian and inverse-power-law repulsive potentials. Notwithstanding the different behavior of the two potentials for vanishing interparticle distances, their thermodynamic properties are similar in a range of densities and temperatures, being ruled by the competition between the body-centered-cubic (BCC) and face-centered-cubic (FCC) crystalline structures and the fluid phase. We confirm the existence of a reentrant BCC phase in the phase diagram of the Gaussian-core model, just above the triple point. We also trace the BCC-FCC coexistence line of the inverse-power-law model as a function of the power exponent nn and relate the common features in the phase diagrams of such systems to the softness degree of the interaction.Comment: 22 pages, 8 figure

    Targeted Presentation Skill Trainings to Nurture Construction Management Students at Florida International University

    Get PDF
    In today’s fast-paced work environment, competent construction managers (CM) are vital for project success. However, to be competent, these professionals require the mastery of not only technical skills but also soft skills that enable them to achieve their full potential. Regardless, many CM prize technical abilities over the day-to-day writing, speaking, and overall soft skills, assuming these are not as important to the knowledge of complex concepts. Industry leaders confirm this, as evidence states graduate construction managers lack the basic communication skills to “hit the ground running”. That said, academic programs should seek to adapt and nurture these vital skill sets. For this reason, this research seeks to understand FIU-STEM students’ current communication skills and advance CM students’ presentation skills through three multi-context communication-trainings. These activities offered students opportunities to enhance their presentation performance, improve their confidence, and overcome common presentation issues, thus increasing their chances to thrive in their careers

    Application of track-before-detect techniques in GNSS-based passive radar for maritime surveillance

    Get PDF
    GNSS-based passive radar has been recently proved able to enable moving target detection in maritime surveillance applications. The main restriction lies in the low Equivalent Isotropic Radiated Power (EIRP) level of navigation satellites. Extending the integration times with proper target motion compensation has been shown to be a viable solution to improve ship detectability, but this involves computational complexity and increasing sensitivity to motion model mismatches. In this work, we consider the application of a Track-Before-Detect (TBD) method to considerably increase the integration time (and therefore the detection capability) at the same time keeping the computational complexity affordable by practical systems. Dynamic programming TBD algorithms have been specialized for the considered framework and tested against experimental dataset. The obtained results show the effectiveness of this approach to improve the detection capability of the system despite the restricted power budget

    Implementasi Penanganan Serangan Mac-clone Pada Hotspot Mikrotik Di STMIK Pradnya Paramita Malang (Studi Kasus: STMIK Pradnya Paramitamalang)

    Full text link
    One of the facilities that is needed is a network agency. In educational institutions such as Colleges and universities are needed to look for references as well as add insight. The technology used is one that is technology hotspot. Currently there are many hotspot technology is applied to the High School and College. However, the hotspot network mikrotik used in STMIK Pradnya Paramita Malang still experienced many problems in network security. Attacks are frequent and intrusive security network that attacks Mac Clone. Disrupt and complicate the issue of employees as well as students who have access rights legally due access rights are duplicated by users who are not responsible. Therefore, to overcome these problems built a network security by firewall settings that the filter rule and NAT. Based on test results concluded that in building a network security RouterOS hotspot using 5.18 to leave the setting on the firewall, can address the existing Mac Clone attack on STMIK Pradnya Paramita Malang
    • …
    corecore