4,206 research outputs found
Development of a heterogeneous laminating resin system
The factors which effect the impact resistance of laminating resin systems and yet retain equivalent performance with the conventional 450 K curing epoxy matrix systems in other areas were studied. Formulation work was conducted on two systems, an all-epoxy and an epoxy/bismaleimide, to gain fundamental information on the effect formulation changes have upon neat resin and composite properties. The all-epoxy work involved formulations with various amounts and combinations of eight different epoxy resins, four different hardeners, fifteen different toughening agents, a filler, and a catalyst. The epoxy/bismaleimide effort improved formulations with various amounts and combinations of nine different resins, four different hardeners, eight different toughening agents, four different catalysts, and a filler. When a formulation appeared to offer the proper combination of properties required for a laminating resin Celion 3K-70P fabric was prepregged. Initial screening tests on composites primarily involved Gardner type impact and measurement of short beam shear strengths under dry and hot/wet conditions
Creep fatigue of low-cobalt superalloys: Waspalloy, PM U 700 and wrought U 700
The influence of cobalt content on the high temperature creep fatigue crack initiation resistance of three primary alloys was evaluated. These were Waspalloy, Powder U 700, and Cast U 700, with cobalt contents ranging from 0 up to 17 percent. Waspalloy was studied at 538 C whereas the U 700 was studied at 760 C. Constraints of the program required investigation at a single strain range using diametral strain control. The approach was phenomenological, using standard low cycle fatigue tests involving continuous cycling tension hold cycling, compression hold cycling, and symmetric hold cycling. Cycling in the absence of or between holds was done at 0.5 Hz, whereas holds when introduced lasted 1 minute. The plan was to allocate two specimens to the continuous cycling, and one specimen to each of the hold time conditions. Data was taken to document the nature of the cracking process, the deformation response, and the resistance to cyclic loading to the formation of small cracks and to specimen separation. The influence of cobalt content on creep fatigue resistance was not judged to be very significant based on the results generated. Specific conclusions were that the hold time history dependence of the resistance is as significant as the influence of cobalt content and increased cobalt content does not produce increased creep fatigue resistance on a one to one basis
Lorenz gauge gravitational self-force calculations of eccentric binaries using a frequency domain procedure
We present an algorithm for calculating the metric perturbations and gravitational self-force for extreme-mass-ratio inspirals (EMRIs) with eccentric orbits. The massive black hole is taken to be Schwarzschild and metric perturbations are computed in Lorenz gauge. The perturbation equations are solved as coupled systems of ordinary differential equations in the frequency domain. Accurate local behavior of the metric is attained through use of the method of extended homogeneous solutions and mode-sum regularization is used to find the self-force. We focus on calculating the self-force with sufficient accuracy to ensure its error contributions to the phase in a long term orbital evolution will be radians. This requires the orbit-averaged force to have fractional errors and the oscillatory part of the self-force to have errors (a level frequently easily exceeded). Our code meets this error requirement in the oscillatory part, extending the reach to EMRIs with eccentricities of , if augmented by use of fluxes for the orbit-averaged force, or to eccentricities of when used as a stand-alone code. Further, we demonstrate accurate calculations up to orbital separations of , beyond that required for EMRI models and useful for comparison with post-Newtonian theory. Our principal developments include (1) use of fully constrained field equations, (2) discovery of analytic solutions for even-parity static modes, (3) finding a pre-conditioning technique for outer homogeneous solutions, (4) adaptive use of quad-precision and (5) jump conditions to handle near-static modes, and (6) a hybrid scheme for high eccentricities
Extremely asymmetrical scattering in gratings with varying mean structural parameters
Extremely asymmetrical scattering (EAS) is an unusual type of Bragg
scattering in slanted periodic gratings with the scattered wave (the +1
diffracted order) propagating parallel to the grating boundaries. Here, a
unique and strong sensitivity of EAS to small stepwise variations of mean
structural parameters at the grating boundaries is predicted theoretically (by
means of approximate and rigorous analyses) for bulk TE electromagnetic waves
and slab optical modes of arbitrary polarization in holographic (for bulk
waves) and corrugation (for slab modes) gratings. The predicted effects are
explained using one of the main physical reasons for EAS--the diffractional
divergence of the scattered wave (similar to divergence of a laser beam). The
approximate method of analysis is based on this understanding of the role of
the divergence of the scattered wave, while the rigorous analysis uses the
enhanced T-matrix algorithm. The effect of small and large stepwise variations
of the mean permittivity at the grating boundaries is analysed. Two distinctly
different and unusual patterns of EAS are predicted in the cases of wide and
narrow (compared to a critical width) gratings. Comparison between the
approximate and rigorous theories is carried out.Comment: 16 pages, 5 figure
'Mindless markers of the nation': The routine flagging of nationhood across the visual environment
The visual environment has increasingly been used as a lens with which to understand wider processes of social and economic change with studies employing in-depth qualitative approaches to focus on, for example, gentrification or trans-national networks. This exploratory paper offers an alternative perspective by using a novel method, quantitative photo mapping, to examine the extent to which a particular socio-cultural marker, the nation, is ‘flagged’ across three contrasting sites in Britain. As a multi-national state with an increasingly diverse population, Britain offers a particularly fruitful case study, drawing in debates around devolution, European integration and Commonwealth migration. In contributing to wider debates around banal nationalism, the paper notes the extent to which nations are increasingly articulated through commerce, consumption and market exchange and the overall significance of everyday markers (signs, objects, infrastructure) in naturalising a national view of the world
On the Gold Standard for Security of Universal Steganography
While symmetric-key steganography is quite well understood both in the
information-theoretic and in the computational setting, many fundamental
questions about its public-key counterpart resist persistent attempts to solve
them. The computational model for public-key steganography was proposed by von
Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first
universal public-key stegosystem - i.e. one that works on all channels -
achieving security against replayable chosen-covertext attacks (SS-RCCA) and
asked whether security against non-replayable chosen-covertext attacks (SS-CCA)
is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every
efficiently sampleable channel, but did not achieve universality. He posed the
question whether universality and SS-CCA-security can be achieved
simultaneously. No progress on this question has been achieved since more than
a decade. In our work we solve Hopper's problem in a somehow complete manner:
As our main positive result we design an SS-CCA-secure stegosystem that works
for every memoryless channel. On the other hand, we prove that this result is
the best possible in the context of universal steganography. We provide a
family of 0-memoryless channels - where the already sent documents have only
marginal influence on the current distribution - and prove that no
SS-CCA-secure steganography for this family exists in the standard
non-look-ahead model.Comment: EUROCRYPT 2018, llncs styl
Controls on the location of compressional deformation on the NW European margin
The distribution of Cenozoic compressional structures along the NW European margin has been compared with maps of the thickness of the crystalline crust derived from a compilation of seismic refraction interpretations and gravity modelling, and with the distribution of high-velocity lower crust and/or partially serpentinized upper mantle detected by seismic experiments. Only a subset of the mapped compressional structures coincide with areas susceptible to lithospheric weakening as a result of crustal hyperextension and partial serpentinization of the upper mantle. Notably, partially serpentinized upper mantle is well documented beneath the central part of the southern Rockall Basin, but compressional features are sparse in that area. Where compressional structures have formed but the upper mantle is not serpentinized, simple rheological modelling suggests an alternative weakening mechanism involving ductile lower crust and lithospheric decoupling. The presence of pre-existing weak zones (associated with the properties of the gouge and overpressure in fault zones) and local stress magnitude and orientation are important contributing factors
Naturally Rehearsing Passwords
We introduce quantitative usability and security models to guide the design
of password management schemes --- systematic strategies to help users create
and remember multiple passwords. In the same way that security proofs in
cryptography are based on complexity-theoretic assumptions (e.g., hardness of
factoring and discrete logarithm), we quantify usability by introducing
usability assumptions. In particular, password management relies on assumptions
about human memory, e.g., that a user who follows a particular rehearsal
schedule will successfully maintain the corresponding memory. These assumptions
are informed by research in cognitive science and validated through empirical
studies. Given rehearsal requirements and a user's visitation schedule for each
account, we use the total number of extra rehearsals that the user would have
to do to remember all of his passwords as a measure of the usability of the
password scheme. Our usability model leads us to a key observation: password
reuse benefits users not only by reducing the number of passwords that the user
has to memorize, but more importantly by increasing the natural rehearsal rate
for each password. We also present a security model which accounts for the
complexity of password management with multiple accounts and associated
threats, including online, offline, and plaintext password leak attacks.
Observing that current password management schemes are either insecure or
unusable, we present Shared Cues--- a new scheme in which the underlying secret
is strategically shared across accounts to ensure that most rehearsal
requirements are satisfied naturally while simultaneously providing strong
security. The construction uses the Chinese Remainder Theorem to achieve these
competing goals
Public sector reforms, privatisation and regimes of control in a Chinese enterprise
The Chinese economic reform has recently become a major focus of attention around the world. The underlying rationale for the Chinese government's privatisation and public sector reforms is the view that reformed state enterprises and privately managed firms will demonstrate superior management control and better performance, and hence encourage economic growth and employment. There are very few intensive case studies published in English journals studying whether firms privatised in China have reversed previous losses and introduced better management controls, leading to increased investment, productivity, and overall organizational effectiveness and efficiency. The researchers do not seek to deny the control problems of Chinese SOEs, but question the consequences of the new controls installed during the post-privatisation period. The paper also reveals a declining tendency in employment; altered distributions of wealth ? especially to the state ? and labour, and a lack of improvements in the accountability of privatised companies. Overall, the paper argues, the aims of reform policies in China, including better control, increased profitability and an improved working life for Chinese people, have not materialized. The paper calls for more research on the above issues in the Chinese context
Investigating knowledge management factors affecting Chinese ICT firms performance: An integrated KM framework
This is an Author's Accepted Manuscript of an article published in the Journal of Information Systems Management, 28(1), 19 - 29, 2011, copyright Taylor & Francis, available online at: http://www.tandfonline.com/10.1080/10580530.2011.536107.This article sets out to investigate the critical factors of Knowledge Management (KM) which are considered to have an impact on the performance of Chinese information and communication technology (ICT) firms. This study confirms that the cultural environment of an enterprise is central to its success in the context of China. It shows that a collaborated, trusted, and learning environment within ICT firms will have a positive impact on their KM performance
- …
