372 research outputs found

    Stimulation of commercial coal seam methane production aimed at improving mining technology

    Get PDF
    The relevance of the current research is due to the urgent need to revise the existing normative bases and procedures involved in intensive development of coal-methane deposits and commercial production of coal seam methane. The article presents the analysis of data on coal production volume and amount of methane emitted into the atmosphere in Kuzbass. There is a need to develop the exploration techniques that would allow implementing pre-mining gas drainage of coal seams and provide the companies with the guidance on coal seam methane drainage in very gassy coal mines. Commercial production of methane should become an integral part of economy and energy balance of the Russian Federation, which, in its turn, would enhance environmental protection due to reducing methane emissions, the largest source of greenhouse effect

    Fullerene van der waals Oligomers as electron traps

    Get PDF
    Density functional theory calculations indicate that van der Waals fullerene dimers and larger oligomers can form interstitial electron traps in which the electrons are even more strongly bound than in isolated fullerene radical anions. The fullerenes behave like super atoms , and the interstitial electron traps represent one-electron intermolecular σ-bonds. Spectroelectrochemical measurements on a bis-fullerene-substituted peptide provide experimental support. The proposed deep electron traps are relevant for all organic electronics applications in which non-covalently linked fullerenes in van der Waals contact with one another serve as n-type semiconductors

    Security Applications of Formal Language Theory

    Get PDF
    We present an approach to improving the security of complex, composed systems based on formal language theory, and show how this approach leads to advances in input validation, security modeling, attack surface reduction, and ultimately, software design and programming methodology. We cite examples based on real-world security flaws in common protocols representing different classes of protocol complexity. We also introduce a formalization of an exploit development technique, the parse tree differential attack, made possible by our conception of the role of formal grammars in security. These insights make possible future advances in software auditing techniques applicable to static and dynamic binary analysis, fuzzing, and general reverse-engineering and exploit development. Our work provides a foundation for verifying critical implementation components with considerably less burden to developers than is offered by the current state of the art. It additionally offers a rich basis for further exploration in the areas of offensive analysis and, conversely, automated defense tools and techniques. This report is divided into two parts. In Part I we address the formalisms and their applications; in Part II we discuss the general implications and recommendations for protocol and software design that follow from our formal analysis

    Integrating metalloporphycenes into p-type NiO-based dye-sensitized solar cells

    Get PDF
    In the current work, we have explored a novel synthetic route towards metalated porphycenes and their use in p-type NiO-based dye-sensitized solar cells. Particular emphasis is placed on the influence that the relative positioning of the anchoring group exerts on the DSSC performance

    Euphemistic Headlines in Economic News Articles of German Newspaper ‘Die Tageszeitung’

    Get PDF
    Analysis of Euphemized Headlines on Economic Issues from the German Electronic Publication ‘Die Tageszeitung’. The study examines articles from the period 2022 to 2023, as this timeframe coincided with heightened attention from German media towards events related to the energy crisis and economic problems. The relevance of this research lies in the fact that economic issues often give rise to the emergence of new euphemisms and euphemistic expressions. Based on criteria such as denotation of undesired referents and improvement of referent characterization, euphemized article headlines were identified. A total of 44 euphemistic expressions were selected using a comprehensive sampling method. The authors provide detailed commentary on each expression from the perspective of hedging techniques. A classification of euphemistic expressions in German-language journalistic discourse is proposed, encompassing five thematic groups: povertywealth, strikes, work, price increases, and inflation. It is noted that the group of headlines addressing inflation and price increases (particularly in relation to gas and electricity) is most susceptible to euphemization. The authors conclude that German journalists employ various euphemistic techniques in their headlines, including loanwords, compound words, wordplay, and others

    Specificity of the Concertmaster’s Work At the Vocal Department of a Music Educational Institution (College)

    Full text link
    The article considers the specifics of work of a concertmaster at the vocal Department of a secondary vocational music institution and the specific features of work with novice and professional singers. The professional, psychological, pedagogical and artistic qualities of a concertmaster required for training vocalists are described. The role of a piano concertmaster in the educational process at a vocal department of an educational institution is defined. Examples of modern concertmaster projects are considered. The article describes experience of concertmasters who performed with outstanding musicians. The issues of using concertmaster’s experience, gained during work with professional singers in a musical theater and in a music recording studio, in the training process are considered.Рассмотрены вопросы специфики работы концертмейстера на вокальном отделении среднего профессионального музыкального учебного заведения, а также особенности работы с начинающими и профессиональными певцами. Описаны профессиональные, психолого-педагогические, артистические качества концертмейстера, необходимые при обучении вокалистов. Определена роль пианиста-концертмейстера в образовательном процессе на вокальном отделении образовательной организации. Рассмотрены примеры современных концертмейстерских проектов. Описан опыт работы концертмейстеров выдающихся музыкантов. Рассмотрены вопросы использования в процессе обучения опыта концертмейстера, приобретенного при работе с профессиональными певцами, в музыкальном театре, в студии музыкальной звукозаписи

    Hedge Euphemisms as Tools of Economic Discourse

    Get PDF
    An attempt is made to analyze euphemized and non-euphemized versions of statements using the example of headings of short exchange messages. The relevance of the study is due to the need to study the causes and situations of the appearance of hedge euphemisms in the German language, as well as their functioning in economic discourse. The definitions, classifications and functional features of euphemisms and hedging tools in linguistics are considered. Particular attention is paid to the camouflaging function of euphemisms. The authors of the article designate euphemized statements that perform a camouflaging function with the term hedge euphemisms. The authors have collected messages (IndexCheck) of the Stuttgart Stock Exchange for investors and traders about changes in quotations from January to July 2021. It has been established that hedge euphemisms are found primarily in reports of a decline in the index. It is shown that message headers are classified depending on the presence of a component with a euphemistic coloration in them. It is noted that the ratio of euphemized and noneuphemized statements is approximately 2 : 1. It is argued that the authors of hedge euphemisms modify negative situations by resorting to the denomination process in order to mask the lexemes denoting negative situations from the point of view of investors

    ELFbac: Using the Loader Format for Intent-Level Semantics and Fine-Grained Protection

    Get PDF
    Adversaries get software to do bad things by rewriting memory and changing control flow. Current approaches to protecting against these attacks leave many exposures; for example, OS-level filesystem protection and OS/architecture support of the userspace/kernelspace distinction fail to protect corrupted userspace code from changing userspace data. In this paper we present a new approach: using the ELF/ABI sections already produced by the standard binary toolchain to define, specify, and enforce fine-grained policy within an application\u27s address space. We experimentally show that enforcement of such policies would stop a large body of current attacks and discuss ways we could extend existing architecture to more efficiently provide such enforcement. Our approach is designed to work with existing ELF executables and the GNU build chain, but it can be extended into the compiler toolchains to support code annotations that take advantage of ELFbac enforcement-while maintaining full compatibility with the existing ELF ABI

    Two pathways of proton transfer reaction to (triphos)Cu(η1-BH4) via a dihydrogen bond [triphos = 1,1,1-tris(diphenylphosphinomethyl)ethane]

    Get PDF
    The interaction of alcohols of variable strength with the copper(i) borohydride complex (triphos)Cu(η1-BH4) results in a great variety of DHB complexes which encompass different mechanisms involving M–H and E–H bond (E = B, O) activation steps
    corecore