3,193 research outputs found

    Second harmonic generation in SiC polytypes

    Full text link
    LMTO calculations are presented for the frequency dependent second harmonic generation (SHG) in the polytypes 2H, 4H, 6H, 15R and 3C of SiC. All independent tensor components are calculated. The spectral features and the ratios of the 333 to 311 tensorial components are studied as a function of the degree of hexagonality. The relationship to the linear optical response and the underlying band structure are investigated. SHG is suggested to be a sensitive tool for investigating the near band edge interband excitations.Comment: 12 pages, 10 figure

    Habilidade competitiva de genótipos de feijão comum do grupo "preto" com plantas daninhas.

    Get PDF
    A hipótese dessa pesquisa é de que há variabilidade entre genótipos de feijão do grupo Preto quanto à competitividade com plantas daninhas e é possível identificar características de plantas que explicam expressivamente a habilidade competitiva. O objetivo desse trabalho foi avaliar a habilidade competitiva de genótipos de feijão do grupo preto com plantas daninhas. As perdas de produtividade de grãos em genótipos de feijão preto, decorrentes da interferência exercida pelas plantas daninhas, variaram de 30,8 a 54,9 %, sendo que os genótipos que apresentaram as menores perdas de produtividade também suprimiram em maior grau o crescimento das plantas daninhas. Houve tendência de aumento das reduções de produtividade de grãos em razão da interferência de plantas daninhas com o aumento da produtividade verificada na ausência de interferência. Não foi possível identificar características de plantas que afetam significativamente a habilidade dos genótipos de feijão em competir com plantas daninhas

    Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel

    Full text link
    Wrist-wearables such as smartwatches and fitness bands are equipped with a variety of high-precision sensors that support novel contextual and activity-based applications. The presence of a diverse set of on-board sensors, however, also expose an additional attack surface which, if not adequately protected, could be potentially exploited to leak private user information. In this paper, we investigate the feasibility of a new attack that takes advantage of a wrist-wearable's motion sensors to infer input on mechanical devices typically used to secure physical access, for example, combination locks. We outline an inference framework that attempts to infer a lock's unlock combination from the wrist motion captured by a smartwatch's gyroscope sensor, and uses a probabilistic model to produce a ranked list of likely unlock combinations. We conduct a thorough empirical evaluation of the proposed framework by employing unlocking-related motion data collected from human subject participants in a variety of controlled and realistic settings. Evaluation results from these experiments demonstrate that motion data from wrist-wearables can be effectively employed as a side-channel to significantly reduce the unlock combination search-space of commonly found combination locks, thus compromising the physical security provided by these locks

    What factors influence training opportunities for older workers? Three factorial surveys exploring the attitudes of HR professionals

    Get PDF
    The core research questions addressed in this paper are: what factors influence HR professionals in deciding whether to approve training proposals for older workers? What kind of training are they more likely to recommend for older employees and in which organizational contexts? We administered three factorial surveys to 66 HR professionals in Italy. Participants made specific training decisions based on profiles of hypothetical older workers. Multilevel analyses indicated that access to training decreases strongly with age, while highly-skilled older employees with low absenteeism rates are more likely to enjoy training opportunities. In addition, older workers displaying positive performance are more likely to receive training than older workers who perform poorly, suggesting that training late in working life may serve as a reward for good performance rather than as a means of enhancing productivity. The older the HR professional evaluating training proposals, the higher the probability that older workers will be recommended for training. keywords: training; older workers; HR professionals; factorial survey; multilevel model

    On the Gold Standard for Security of Universal Steganography

    Get PDF
    While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them. The computational model for public-key steganography was proposed by von Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first universal public-key stegosystem - i.e. one that works on all channels - achieving security against replayable chosen-covertext attacks (SS-RCCA) and asked whether security against non-replayable chosen-covertext attacks (SS-CCA) is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every efficiently sampleable channel, but did not achieve universality. He posed the question whether universality and SS-CCA-security can be achieved simultaneously. No progress on this question has been achieved since more than a decade. In our work we solve Hopper's problem in a somehow complete manner: As our main positive result we design an SS-CCA-secure stegosystem that works for every memoryless channel. On the other hand, we prove that this result is the best possible in the context of universal steganography. We provide a family of 0-memoryless channels - where the already sent documents have only marginal influence on the current distribution - and prove that no SS-CCA-secure steganography for this family exists in the standard non-look-ahead model.Comment: EUROCRYPT 2018, llncs styl

    FACT -- the First Cherenkov Telescope using a G-APD Camera for TeV Gamma-ray Astronomy (HEAD 2010)

    Get PDF
    Geiger-mode Avalanche Photodiodes (G-APD) bear the potential to significantly improve the sensitivity of Imaging Air Cherenkov Telescopes (IACT). We are currently building the First G-APD Cherenkov Telescope (FACT) by refurbishing an old IACT with a mirror area of 9.5 square meters and construct a new, fine pixelized camera using novel G-APDs. The main goal is to evaluate the performance of a complete system by observing very high energy gamma-rays from the Crab Nebula. This is an important field test to check the feasibility of G-APD-based cameras to replace at some time the PMT-based cameras of planned future IACTs like AGIS and CTA. In this article, we present the basic design of such a camera as well as some important details to be taken into account.Comment: Poster shown at HEAD 2010, Big Island, Hawaii, March 1-4, 201
    corecore