4,206 research outputs found

    Development of a heterogeneous laminating resin system

    Get PDF
    The factors which effect the impact resistance of laminating resin systems and yet retain equivalent performance with the conventional 450 K curing epoxy matrix systems in other areas were studied. Formulation work was conducted on two systems, an all-epoxy and an epoxy/bismaleimide, to gain fundamental information on the effect formulation changes have upon neat resin and composite properties. The all-epoxy work involved formulations with various amounts and combinations of eight different epoxy resins, four different hardeners, fifteen different toughening agents, a filler, and a catalyst. The epoxy/bismaleimide effort improved formulations with various amounts and combinations of nine different resins, four different hardeners, eight different toughening agents, four different catalysts, and a filler. When a formulation appeared to offer the proper combination of properties required for a laminating resin Celion 3K-70P fabric was prepregged. Initial screening tests on composites primarily involved Gardner type impact and measurement of short beam shear strengths under dry and hot/wet conditions

    Creep fatigue of low-cobalt superalloys: Waspalloy, PM U 700 and wrought U 700

    Get PDF
    The influence of cobalt content on the high temperature creep fatigue crack initiation resistance of three primary alloys was evaluated. These were Waspalloy, Powder U 700, and Cast U 700, with cobalt contents ranging from 0 up to 17 percent. Waspalloy was studied at 538 C whereas the U 700 was studied at 760 C. Constraints of the program required investigation at a single strain range using diametral strain control. The approach was phenomenological, using standard low cycle fatigue tests involving continuous cycling tension hold cycling, compression hold cycling, and symmetric hold cycling. Cycling in the absence of or between holds was done at 0.5 Hz, whereas holds when introduced lasted 1 minute. The plan was to allocate two specimens to the continuous cycling, and one specimen to each of the hold time conditions. Data was taken to document the nature of the cracking process, the deformation response, and the resistance to cyclic loading to the formation of small cracks and to specimen separation. The influence of cobalt content on creep fatigue resistance was not judged to be very significant based on the results generated. Specific conclusions were that the hold time history dependence of the resistance is as significant as the influence of cobalt content and increased cobalt content does not produce increased creep fatigue resistance on a one to one basis

    Lorenz gauge gravitational self-force calculations of eccentric binaries using a frequency domain procedure

    Get PDF
    We present an algorithm for calculating the metric perturbations and gravitational self-force for extreme-mass-ratio inspirals (EMRIs) with eccentric orbits. The massive black hole is taken to be Schwarzschild and metric perturbations are computed in Lorenz gauge. The perturbation equations are solved as coupled systems of ordinary differential equations in the frequency domain. Accurate local behavior of the metric is attained through use of the method of extended homogeneous solutions and mode-sum regularization is used to find the self-force. We focus on calculating the self-force with sufficient accuracy to ensure its error contributions to the phase in a long term orbital evolution will be δΦ102\delta\Phi \lesssim 10^{-2} radians. This requires the orbit-averaged force to have fractional errors 108\lesssim 10^{-8} and the oscillatory part of the self-force to have errors 103\lesssim 10^{-3} (a level frequently easily exceeded). Our code meets this error requirement in the oscillatory part, extending the reach to EMRIs with eccentricities of e0.8e \lesssim 0.8, if augmented by use of fluxes for the orbit-averaged force, or to eccentricities of e0.5e \lesssim 0.5 when used as a stand-alone code. Further, we demonstrate accurate calculations up to orbital separations of a100Ma \simeq 100 M, beyond that required for EMRI models and useful for comparison with post-Newtonian theory. Our principal developments include (1) use of fully constrained field equations, (2) discovery of analytic solutions for even-parity static modes, (3) finding a pre-conditioning technique for outer homogeneous solutions, (4) adaptive use of quad-precision and (5) jump conditions to handle near-static modes, and (6) a hybrid scheme for high eccentricities

    Extremely asymmetrical scattering in gratings with varying mean structural parameters

    Get PDF
    Extremely asymmetrical scattering (EAS) is an unusual type of Bragg scattering in slanted periodic gratings with the scattered wave (the +1 diffracted order) propagating parallel to the grating boundaries. Here, a unique and strong sensitivity of EAS to small stepwise variations of mean structural parameters at the grating boundaries is predicted theoretically (by means of approximate and rigorous analyses) for bulk TE electromagnetic waves and slab optical modes of arbitrary polarization in holographic (for bulk waves) and corrugation (for slab modes) gratings. The predicted effects are explained using one of the main physical reasons for EAS--the diffractional divergence of the scattered wave (similar to divergence of a laser beam). The approximate method of analysis is based on this understanding of the role of the divergence of the scattered wave, while the rigorous analysis uses the enhanced T-matrix algorithm. The effect of small and large stepwise variations of the mean permittivity at the grating boundaries is analysed. Two distinctly different and unusual patterns of EAS are predicted in the cases of wide and narrow (compared to a critical width) gratings. Comparison between the approximate and rigorous theories is carried out.Comment: 16 pages, 5 figure

    'Mindless markers of the nation': The routine flagging of nationhood across the visual environment

    Get PDF
    The visual environment has increasingly been used as a lens with which to understand wider processes of social and economic change with studies employing in-depth qualitative approaches to focus on, for example, gentrification or trans-national networks. This exploratory paper offers an alternative perspective by using a novel method, quantitative photo mapping, to examine the extent to which a particular socio-cultural marker, the nation, is ‘flagged’ across three contrasting sites in Britain. As a multi-national state with an increasingly diverse population, Britain offers a particularly fruitful case study, drawing in debates around devolution, European integration and Commonwealth migration. In contributing to wider debates around banal nationalism, the paper notes the extent to which nations are increasingly articulated through commerce, consumption and market exchange and the overall significance of everyday markers (signs, objects, infrastructure) in naturalising a national view of the world

    On the Gold Standard for Security of Universal Steganography

    Get PDF
    While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them. The computational model for public-key steganography was proposed by von Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first universal public-key stegosystem - i.e. one that works on all channels - achieving security against replayable chosen-covertext attacks (SS-RCCA) and asked whether security against non-replayable chosen-covertext attacks (SS-CCA) is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every efficiently sampleable channel, but did not achieve universality. He posed the question whether universality and SS-CCA-security can be achieved simultaneously. No progress on this question has been achieved since more than a decade. In our work we solve Hopper's problem in a somehow complete manner: As our main positive result we design an SS-CCA-secure stegosystem that works for every memoryless channel. On the other hand, we prove that this result is the best possible in the context of universal steganography. We provide a family of 0-memoryless channels - where the already sent documents have only marginal influence on the current distribution - and prove that no SS-CCA-secure steganography for this family exists in the standard non-look-ahead model.Comment: EUROCRYPT 2018, llncs styl

    Controls on the location of compressional deformation on the NW European margin

    Get PDF
    The distribution of Cenozoic compressional structures along the NW European margin has been compared with maps of the thickness of the crystalline crust derived from a compilation of seismic refraction interpretations and gravity modelling, and with the distribution of high-velocity lower crust and/or partially serpentinized upper mantle detected by seismic experiments. Only a subset of the mapped compressional structures coincide with areas susceptible to lithospheric weakening as a result of crustal hyperextension and partial serpentinization of the upper mantle. Notably, partially serpentinized upper mantle is well documented beneath the central part of the southern Rockall Basin, but compressional features are sparse in that area. Where compressional structures have formed but the upper mantle is not serpentinized, simple rheological modelling suggests an alternative weakening mechanism involving ductile lower crust and lithospheric decoupling. The presence of pre-existing weak zones (associated with the properties of the gouge and overpressure in fault zones) and local stress magnitude and orientation are important contributing factors

    Naturally Rehearsing Passwords

    Full text link
    We introduce quantitative usability and security models to guide the design of password management schemes --- systematic strategies to help users create and remember multiple passwords. In the same way that security proofs in cryptography are based on complexity-theoretic assumptions (e.g., hardness of factoring and discrete logarithm), we quantify usability by introducing usability assumptions. In particular, password management relies on assumptions about human memory, e.g., that a user who follows a particular rehearsal schedule will successfully maintain the corresponding memory. These assumptions are informed by research in cognitive science and validated through empirical studies. Given rehearsal requirements and a user's visitation schedule for each account, we use the total number of extra rehearsals that the user would have to do to remember all of his passwords as a measure of the usability of the password scheme. Our usability model leads us to a key observation: password reuse benefits users not only by reducing the number of passwords that the user has to memorize, but more importantly by increasing the natural rehearsal rate for each password. We also present a security model which accounts for the complexity of password management with multiple accounts and associated threats, including online, offline, and plaintext password leak attacks. Observing that current password management schemes are either insecure or unusable, we present Shared Cues--- a new scheme in which the underlying secret is strategically shared across accounts to ensure that most rehearsal requirements are satisfied naturally while simultaneously providing strong security. The construction uses the Chinese Remainder Theorem to achieve these competing goals

    Public sector reforms, privatisation and regimes of control in a Chinese enterprise

    Get PDF
    The Chinese economic reform has recently become a major focus of attention around the world. The underlying rationale for the Chinese government's privatisation and public sector reforms is the view that reformed state enterprises and privately managed firms will demonstrate superior management control and better performance, and hence encourage economic growth and employment. There are very few intensive case studies published in English journals studying whether firms privatised in China have reversed previous losses and introduced better management controls, leading to increased investment, productivity, and overall organizational effectiveness and efficiency. The researchers do not seek to deny the control problems of Chinese SOEs, but question the consequences of the new controls installed during the post-privatisation period. The paper also reveals a declining tendency in employment; altered distributions of wealth ? especially to the state ? and labour, and a lack of improvements in the accountability of privatised companies. Overall, the paper argues, the aims of reform policies in China, including better control, increased profitability and an improved working life for Chinese people, have not materialized. The paper calls for more research on the above issues in the Chinese context

    Investigating knowledge management factors affecting Chinese ICT firms performance: An integrated KM framework

    Get PDF
    This is an Author's Accepted Manuscript of an article published in the Journal of Information Systems Management, 28(1), 19 - 29, 2011, copyright Taylor & Francis, available online at: http://www.tandfonline.com/10.1080/10580530.2011.536107.This article sets out to investigate the critical factors of Knowledge Management (KM) which are considered to have an impact on the performance of Chinese information and communication technology (ICT) firms. This study confirms that the cultural environment of an enterprise is central to its success in the context of China. It shows that a collaborated, trusted, and learning environment within ICT firms will have a positive impact on their KM performance
    corecore