3,193 research outputs found
Second harmonic generation in SiC polytypes
LMTO calculations are presented for the frequency dependent second harmonic
generation (SHG) in the polytypes 2H, 4H, 6H, 15R and 3C of SiC. All
independent tensor components are calculated. The spectral features and the
ratios of the 333 to 311 tensorial components are studied as a function of the
degree of hexagonality. The relationship to the linear optical response and the
underlying band structure are investigated. SHG is suggested to be a sensitive
tool for investigating the near band edge interband excitations.Comment: 12 pages, 10 figure
Habilidade competitiva de genótipos de feijão comum do grupo "preto" com plantas daninhas.
A hipótese dessa pesquisa é de que há variabilidade entre genótipos de feijão do grupo Preto quanto à competitividade com plantas daninhas e é possível identificar características de plantas que explicam expressivamente a habilidade competitiva. O objetivo desse trabalho foi avaliar a habilidade competitiva de genótipos de feijão do grupo preto com plantas daninhas. As perdas de produtividade de grãos em genótipos de feijão preto, decorrentes da interferência exercida pelas plantas daninhas, variaram de 30,8 a 54,9 %, sendo que os genótipos que apresentaram as menores perdas de produtividade também suprimiram em maior grau o crescimento das plantas daninhas. Houve tendência de aumento das reduções de produtividade de grãos em razão da interferência de plantas daninhas com o aumento da produtividade verificada na ausência de interferência. Não foi possível identificar características de plantas que afetam significativamente a habilidade dos genótipos de feijão em competir com plantas daninhas
Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel
Wrist-wearables such as smartwatches and fitness bands are equipped with a
variety of high-precision sensors that support novel contextual and
activity-based applications. The presence of a diverse set of on-board sensors,
however, also expose an additional attack surface which, if not adequately
protected, could be potentially exploited to leak private user information. In
this paper, we investigate the feasibility of a new attack that takes advantage
of a wrist-wearable's motion sensors to infer input on mechanical devices
typically used to secure physical access, for example, combination locks. We
outline an inference framework that attempts to infer a lock's unlock
combination from the wrist motion captured by a smartwatch's gyroscope sensor,
and uses a probabilistic model to produce a ranked list of likely unlock
combinations. We conduct a thorough empirical evaluation of the proposed
framework by employing unlocking-related motion data collected from human
subject participants in a variety of controlled and realistic settings.
Evaluation results from these experiments demonstrate that motion data from
wrist-wearables can be effectively employed as a side-channel to significantly
reduce the unlock combination search-space of commonly found combination locks,
thus compromising the physical security provided by these locks
Recomendação de variedades de milho para o Sul do Brasil: rede de ensaios preliminares-Safra 2009/10.
bitstream/item/45104/1/circular-99.pd
What factors influence training opportunities for older workers? Three factorial surveys exploring the attitudes of HR professionals
The core research questions addressed in this paper are: what factors influence HR professionals in deciding whether to approve training proposals for older workers? What kind of training are they more likely to recommend for older employees and in which organizational contexts? We administered three factorial surveys to 66 HR professionals in Italy. Participants made specific training decisions based on profiles of hypothetical older workers. Multilevel analyses indicated that access to training decreases strongly with age, while highly-skilled older employees with low absenteeism rates are more likely to enjoy training opportunities. In addition, older workers displaying positive performance are more likely to receive training than older workers who perform poorly, suggesting that training late in working life may serve as a reward for good performance rather than as a means of enhancing productivity. The older the HR professional evaluating training proposals, the higher the probability that older workers will be recommended for training.
keywords: training; older workers; HR professionals; factorial survey; multilevel model
On the Gold Standard for Security of Universal Steganography
While symmetric-key steganography is quite well understood both in the
information-theoretic and in the computational setting, many fundamental
questions about its public-key counterpart resist persistent attempts to solve
them. The computational model for public-key steganography was proposed by von
Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first
universal public-key stegosystem - i.e. one that works on all channels -
achieving security against replayable chosen-covertext attacks (SS-RCCA) and
asked whether security against non-replayable chosen-covertext attacks (SS-CCA)
is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every
efficiently sampleable channel, but did not achieve universality. He posed the
question whether universality and SS-CCA-security can be achieved
simultaneously. No progress on this question has been achieved since more than
a decade. In our work we solve Hopper's problem in a somehow complete manner:
As our main positive result we design an SS-CCA-secure stegosystem that works
for every memoryless channel. On the other hand, we prove that this result is
the best possible in the context of universal steganography. We provide a
family of 0-memoryless channels - where the already sent documents have only
marginal influence on the current distribution - and prove that no
SS-CCA-secure steganography for this family exists in the standard
non-look-ahead model.Comment: EUROCRYPT 2018, llncs styl
FACT -- the First Cherenkov Telescope using a G-APD Camera for TeV Gamma-ray Astronomy (HEAD 2010)
Geiger-mode Avalanche Photodiodes (G-APD) bear the potential to significantly
improve the sensitivity of Imaging Air Cherenkov Telescopes (IACT). We are
currently building the First G-APD Cherenkov Telescope (FACT) by refurbishing
an old IACT with a mirror area of 9.5 square meters and construct a new, fine
pixelized camera using novel G-APDs. The main goal is to evaluate the
performance of a complete system by observing very high energy gamma-rays from
the Crab Nebula. This is an important field test to check the feasibility of
G-APD-based cameras to replace at some time the PMT-based cameras of planned
future IACTs like AGIS and CTA. In this article, we present the basic design of
such a camera as well as some important details to be taken into account.Comment: Poster shown at HEAD 2010, Big Island, Hawaii, March 1-4, 201
- …