261 research outputs found

    Springback Compensation: Fundamental Topics and Practical Application

    Get PDF
    Now that the simulation of deep drawing processes has become more reliable the virtual\ud compensation of the forming tools has become reality. In literature, the Displacement Adjustment (DA)\ud algorithm has proved to be most effective. In this article it is shown how the compensation factor, required for\ud (one-step) DA depends on material, process and geometrical parameters. For this an analytical bar stretchbending\ud model was used. A compensation factor is not required when DA is applied iteratively and the\ud products geometrical accuracy is improved further. This was demonstrated on an industrial part. The\ud compensation varies over the product, leading to a reduction in shape deviation of 90% and more, a result that\ud could not have been achieved with one-step compensatio

    Greenhouse and Field Evaluations of Entomopathogenic Nematodes (Nematode: Heterorhabditidae and Steinernematidae) for Control of Cabbage Maggot (Diopters: Anthomyiidae) on Cabbage

    Get PDF
    Entomb pathogenic nematodes-Heterorhabditis bacteriophora Poinar (Oswego strain), Steinenema carpocapsae (Weiser) (NY001 strain), Steinemema carpocapsae (25 strain), Steinemema feltiae Filipjev (=Neoaplectana carpocapsae Weiser) (369 strain), Steinernema feltiae (27 strain), and Steinernema riobravus Cabanillas and Poinar (355 strain)-were examined for pathogenicity against cabbage maggot, Delia radicum (L.), larvae in the greenhouse and field. Applications (per plant) of 3,000 and 4,000 infective juveniles of S. feltiae (369 strain), 30,000 infective juveniles of H. bacteriophora (Oswego strain), and 300 and 30,000 infective juveniles of S. feltiae (27 strain) reduced the number of D. radicum that developed to pupae on potted cabbage plants. H. bacteriophora (Oswego) at applications of 3,000 and 30,000 infective juveniles per plant and S. feltiae (27 strain) at applications of 30,000 (but not 3,000) infective juveniles per plant significantly reduced root damage caused by larvae of D. radicum. Logarithmically increased dosages between 100 and 100,000 infective juveniles per plant of S. feltiae (27 strain) linearly reduced the number of D. radicum pupae that developed on potted cabbage plants and the damage caused to the roots by D. radicullarvae. Root and stem dry weights of cabbage plants infested with D. radicum were significantly greater for plants inoculated with 100,000 infective juveniles of S. feltiae (27 strain) than for plants not inoculated with nematodes. Nematode inoculation did not prevent significant losses in root or stem dry weights at dosages less than 100,000 infective juveniles per plant. Soil surface applications of 100,000 and 200,000 infective juveniles per plant of S. feltiae (27 strain) were more effective than subsurface applications in preventing damage by natural or augmented populations of D. radicum larvae on cabbage in the field. However, mortality rates of wax moth larvae exposed to soil samples treated with S. feltiae (27 strain) suggested that this nematode showed greater persistence when applied beneath rather than on the soil surfac

    Testing isotropy of the universe using the Ramsey resonance technique on ultracold neutron spins

    Get PDF
    Physics at the Planck scale could be revealed by looking for tiny violations of fundamental symmetries in low energy experiments. In 2008, a sensitive test of the isotropy of the Universe using has been performed with stored ultracold neutrons (UCN), this is the first clock-comparison experiment performed with free neutrons. During several days we monitored the Larmor frequency of neutron spins in a weak magnetic field using the Ramsey resonance technique. An non-zero cosmic axial field, violating rotational symmetry, would induce a daily variation of the precession frequency. Our null result constitutes one of the most stringent tests of Lorentz invariance to date.Comment: proceedings of the PNCMI2010 conferenc

    A next generation measurement of the electric dipole moment of the neutron at the FRM II

    Get PDF
    In this paper we discuss theoretical motivations and the status of experimental searches to find time-reversal symmetry-violating electric dipole moments (EDM). Emphasis is given to a next generation search for the EDM of the neutron, which is currently being set up at the FRM II neutron source in Garching, with an ultimate sensitivity goal of 5 × 10−28 cm (3σ). The layout of the apparatus allows for the detailed investigation of systematic effects by combining various means of magnetic field control and polarized UCN optics. All major components of the installations are portable and can be installed at the strongest available UCN beam

    Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017

    Get PDF
    One of the most efficient post-quantum signature schemes is Rainbow whose harness is based on the multivariate quadratic polynomial (MQ) problem. ELSA, a new multivariate signature scheme proposed at Asiacrypt 2017,has a similar construction to Rainbow. Its advantages, compared to Rainbow, are its smaller secret key and faster signature generation. In addition, its existential unforgeability against an adaptive chosen-message attack has been proven under the hardness of the MQ-problem induced by a public key of ELSA with a specific parameter set in the random oracle model. The high efficiency of ELSA is derived from a set of hidden quadratic equations used in the process of signature generation. However, the hidden quadratic equations yield a vulnerability. In fact, a piece of information of these equations can be recovered by using valid signatures and an equivalent secret key can be partially recovered from it. In this paper, we describe how to recover an equivalent secret key of ELSA by a chosen message attack. Our experiments show that we can recover an equivalent secret key for the claimed 128128-bit security parameter of ELSA on a standard PC in 177177 seconds with 13261326 valid signatures

    Public Key Compression for Constrained Linear Signature Schemes

    Get PDF
    We formalize the notion of a constrained linear trapdoor as an abstract strategy for the generation of signature schemes, concrete instantiations of which can be found in MQ-based, code-based, and lattice-based cryptography. Moreover, we revisit and expand on a transformation by Szepieniec et al. to shrink the public key at the cost of a larger signature while reducing their combined size. This transformation can be used in a way that is provably secure in the random oracle model, and in a more aggressive variant whose security remained unproven. In this paper we show that this transformation applies to any constrained linear trapdoor signature scheme, and prove the security of the first mode in the quantum random oracle model. Moreover, we identify a property of constrained linear trapdoors that is sufficient (and necessary) for the more aggressive variant to be secure in the quantum random oracle model. We apply the transformation to an MQ-based scheme, a code-based scheme and a lattice-based scheme targeting 128-bits of post quantum security, and we show that in some cases the combined size of a signature and a public key can be reduced by more than a factor 300
    • …
    corecore