3,255 research outputs found
Ultrasonic Doppler measurement of renal artery blood flow
Studies were made of (1) blood flow redistribution during lower body negative pressure (LBNP), (2) the profile of blood flow across the mitral annulus of the heart (both perpendicular and parallel to the commissures), (3) testing and evaluation of a number of pulsed Doppler systems, (4) acute calibration of perivascular Doppler transducers, (5) redesign of the mitral flow transducers to improve reliability and ease of construction, and (6) a frequency offset generator designed for use in distinguishing forward and reverse components of blood flow by producing frequencies above and below the offset frequency. Finally methodology was developed and initial results were obtained from a computer analysis of time-varying Doppler spectra
Impact of Temperature, Ethanol and Cell Wall Material Composition on Cell Wall-Anthocyanin Interactions.
The effects of temperature and ethanol concentration on the kinetics of anthocyanin adsorption and desorption interactions with five cell wall materials (CWM) of different composition were investigated. Using temperatures of 15 °C and 30 °C and model wine with ethanol concentrations of 0% and 15% (v/v) over 120 min, the adsorption and desorption rates of five anthocyanin-glucosides were recorded in triplicate. Small-scale experiments were conducted using a benchtop incubator to mimic a single berry fermentation. Results indicate that more than 90% of the adsorption occurs within the first 60 min of the addition of anthocyanins to CWM. However, desorption appears to occur much faster, with maximum desorption being reached after 30 min. The extent of both adsorption and desorption was clearly dependent not only on temperature and ethanol concentration but also on the CWM composition
Development of fishery regulations using confounded data: a case study from the south Florida Greater Amberjack fishery
A designer's approach: How can autistic adults with learning disabilities be involved in the design process?
Autistic adults with limited speech and additional learning disabilities who are often excluded from design research are at the heart of this project. These are people whose perceptions, experiences and interactions with their surroundings are unique, but also are people who may not be able to communicate verbally their differences to the remaining 99% of the population. This, in combination with their distinctive cognitive profile, has resulted in a lack of studies involving people living with autism, and consequently their life experiences may neither be heard nor understood and remain largely unexplored. By reflecting upon the ongoing design collaboration between The Helen Hamlyn Centre for Design and the autism charity The Kingwood Trust, this paper reflects on the approach and methods used in three design studies. Particular attention is paid towards the careful selection, adaptation and development of collaborative design methods for autistic adults and their support staff to be involved. By working beyond the boundaries of a neurotypical culture, the project aims to support the greater goal of improving the everyday experiences of people living with autism by breaking down the barriers to participation
Brayton-cycle radioisotope heat source design study. Phase I - /Conceptual design/ report
Conceptual designs for radioisotope heat source systems to provide 25 kW thermal power to Brayton cycle power conversion system for space application
Practical private database queries based on a quantum key distribution protocol
Private queries allow a user Alice to learn an element of a database held by
a provider Bob without revealing which element she was interested in, while
limiting her information about the other elements. We propose to implement
private queries based on a quantum key distribution protocol, with changes only
in the classical post-processing of the key. This approach makes our scheme
both easy to implement and loss-tolerant. While unconditionally secure private
queries are known to be impossible, we argue that an interesting degree of
security can be achieved, relying on fundamental physical principles instead of
unverifiable security assumptions in order to protect both user and database.
We think that there is scope for such practical private queries to become
another remarkable application of quantum information in the footsteps of
quantum key distribution.Comment: 7 pages, 2 figures, new and improved version, clarified claims,
expanded security discussio
Relationship among research collaboration, number of documents and number of citations. A case study in Spanish computer science production in 2000-2009.
This paper analyzes the relationship among research collaboration, number of documents and number of citations of computer science research activity. It analyzes the number of documents and citations and how they vary by number of authors. They are also analyzed (according to author set cardinality) under different circumstances, that is, when documents are written in different types of collaboration, when documents are published in different document types, when documents are published in different computer science subdisciplines, and, finally, when documents are published by journals with different impact factor quartiles. To investigate the above relationships, this paper analyzes the publications listed in the Web of Science and produced by active Spanish university professors between 2000 and 2009, working in the computer science field. Analyzing all documents, we show that the highest percentage of documents are published by three authors, whereas single-authored documents account for the lowest percentage. By number of citations, there is no positive association between the author cardinality and citation impact. Statistical tests show that documents written by two authors receive more citations per document and year than documents published by more authors. In contrast, results do not show statistically significant differences between documents published by two authors and one author. The research findings suggest that international collaboration results on average in publications with higher citation rates than national and institutional collaborations. We also find differences regarding citation rates between journals and conferences, across different computer science subdisciplines and journal quartiles as expected. Finally, our impression is that the collaborative level (number of authors per document) will increase in the coming years, and documents published by three or four authors will be the trend in computer science literature
Presupposition projection as proof construction
Even though Van der Sandt's presuppositions as anaphora approach is empirically successful, it fails to give a formal account of the interaction between world-knowledge and presuppositions. In this paper, an algorithm is sketched which is based on the idea of presuppositions as anaphora. It improves on this approach by employing a deductive system, Constructive Type Theory (CTT), to get a formal handle on the way world-knowledge influences presupposition projection. In CTT, proofs for expressions are explicitly represented as objects. These objects can be seen as a generalization of DRT's discourse markers. They are useful in dealing with presuppositional phenomena which require world-knowledge, such as Clark's bridging examples and Beaver's conditional presuppositions
Sonic crystal lenses that obey Lensmaker's formula
This paper presents a theoretical study of the phenomenon of acoustic imaging
by sonic crystals, which are made of two-dimensional regular arrays of rigid
cylinders placed in parallel in air. The scattering of acoustic waves is
computed using the standard multiple scattering theory, and the band structures
are computed by the plane-wave expansion method. It is shown that properly
arranged arrays not only can behave as acoustic lenses, but also the focusing
effect can be well described by Lensmaker's formula. Possible applications are
also discussed.Comment: 4 pages, 5 figure
Forward-Security in Private-Key Cryptography
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We provide definitions of security, practical proven-secure constructions, and applications for the main primitives in this area. We identify forward-secure pseudorandom bit generators as the central primitive, providing several constructions and then showing how forward-secure message authentication schemes and symmetric encryption schemes can be built based on standard schemes for these problems coupled with forward-secure pseudorandom bit generators. We then apply forward-secure message authentication schemes to the problem of maintaining secure access logs in the presence of break-ins
- …
