WorldWideScience

Sample records for coat constraint-based anonymization

  1. Property-Based Anonymous Attestation in Trusted Cloud Computing

    Directory of Open Access Journals (Sweden)

    Zhen-Hu Ning

    2014-01-01

    Full Text Available In the remote attestation on Trusted Computer (TC computing mode TCCP, the trusted computer TC has an excessive burden, and anonymity and platform configuration information security of computing nodes cannot be guaranteed. To overcome these defects, based on the research on and analysis of current schemes, we propose an anonymous proof protocol based on property certificate. The platform configuration information is converted by the matrix algorithm into the property certificate, and the remote attestation is implemented by trusted ring signature scheme based on Strong RSA Assumption. By the trusted ring signature scheme based on property certificate, we achieve the anonymity of computing nodes and prevent the leakage of platform configuration information. By simulation, we obtain the computational efficiency of the scheme. We also expand the protocol and obtain the anonymous attestation based on ECC. By scenario comparison, we obtain the trusted ring signature scheme based on RSA, which has advantages with the growth of the ring numbers.

  2. Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol

    Science.gov (United States)

    2017-06-01

    node anonymity, base station anonymity, Wireless Sensor Networks (WSN), Mobile Ad hoc Network (MANET), Lightweight Ad hoc On-Demand – Next Generation ... Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified protocol prevents an attacker from identifying the sink node without...within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand – Next Generation

  3. An Applet-based Anonymous Distributed Computing System.

    Science.gov (United States)

    Finkel, David; Wills, Craig E.; Ciaraldi, Michael J.; Amorin, Kevin; Covati, Adam; Lee, Michael

    2001-01-01

    Defines anonymous distributed computing systems and focuses on the specifics of a Java, applet-based approach for large-scale, anonymous, distributed computing on the Internet. Explains the possibility of a large number of computers participating in a single computation and describes a test of the functionality of the system. (Author/LRW)

  4. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  5. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    Full Text Available A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000 model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks.

  6. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

    Directory of Open Access Journals (Sweden)

    Anas Bushnag

    2016-06-01

    Full Text Available Wireless sensor networks (WSN are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP. The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD, Dummy Adaptive Distribution (DAD and Controlled Dummy Adaptive Distribution (CAD were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network. Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  7. Pattern-Guided k-Anonymity

    Directory of Open Access Journals (Sweden)

    Rolf Niedermeier

    2013-10-01

    Full Text Available We suggest a user-oriented approach to combinatorial data anonymization. A data matrix is called k-anonymous if every row appears at least k times—the goal of the NP-hard k-ANONYMITY problem then is to make a given matrix k-anonymous by suppressing (blanking out as few entries as possible. Building on previous work and coping with corresponding deficiencies, we describe an enhanced k-anonymization problem called PATTERN-GUIDED k-ANONYMITY, where the users specify in which combinations suppressions may occur. In this way, the user of the anonymized data can express the differing importance of various data features. We show that PATTERN-GUIDED k-ANONYMITY is NP-hard. We complement this by a fixed-parameter tractability result based on a “data-driven parameterization” and, based on this, develop an exact integer linear program (ILP-based solution method, as well as a simple, but very effective, greedy heuristic. Experiments on several real-world datasets show that our heuristic easily matches up to the established “Mondrian” algorithm for k-ANONYMITY in terms of the quality of the anonymization and outperforms it in terms of running time.

  8. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  9. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    Science.gov (United States)

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  10. An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity

    Science.gov (United States)

    Simi, Ms. M. S.; Sankara Nayaki, Mrs. K.; Sudheep Elayidom, M., Dr.

    2017-08-01

    For business and research oriented works engaging Data Analysis and Cloud services needing qualitative data, many organizations release huge microdata. It excludes an individual’s explicit identity marks like name, address and comprises of specific information like DOB, Pin-code, sex, marital status, which can be combined with other public data to recognize a person. This implication attack can be manipulated to acquire any sensitive information from social network platform, thereby putting the privacy of a person in grave danger. To prevent such attacks by modifying microdata, K-anonymization is used. With potentially increasing data, the effective method to anonymize it stands challenging. After series of trails and systematic comparison, in this paper, we propose three best algorithms along with its efficiency and effectiveness. Studies help researchers to identify the relationship between the values of k, degree of anonymization, choosing a quasi-identifier and focus on execution time.

  11. The selective adaptation of the alcoholics anonymous program by Gamblers Anonymous.

    Science.gov (United States)

    Browne, B R

    1991-09-01

    This paper is largely based on a year long observation study of Gamblers Anonymous and Alcoholics Anonymous meetings in northern California. The paper argues, contrary to popular assumption, that Gamblers Anonymous is significantly different from Alcoholics Anonymous. Differences, in members' consciousness for example, are discussed. The paper contends that although there is some12 step consciousness in G.A., the dominant consciousness ispage 17 consciousness. The significant differences are attributed to the selective adaptation of the Alcoholics Anonymous program. Several consequences of these differences, such as the central role of a language of the self in A.A. and not in G.A., are highlighted.

  12. Comments on ``Anonymous Reviews'' An Editor's View of Anonymous Reviews

    Science.gov (United States)

    Goff, John A.

    I have read with great interest the recent Forum commentaries in Eos by Myrl Beck, Charles Robinove, Robert Criss, and Anne Hofmeister regarding anonymous reviews. I heartily support their position that anonymous reviews should be avoided. I have not written an anonymous review in ages (and regret the few that I did), and have always appreciated and respected greatly anyone who signs a critical review of one of my own papers. However, I would like to add some perspective from the editorial standpoint. I have served as JGR associate editor for 3 years (never anonymously!), and as Eos editor for seismology and tectonophysics for 4. Over the years, I have rejected a fair number of papers, most of those based on anonymous reviews (fortunately, none of the above commentators was one of them). The vast majority of anonymous reviews I received were well considered. While I would wish that all reviews were signed, I don't think we can summarily dismiss the fear that many would have of enmity and reprisal over a critical review. Some of these fears are likely justified. On more than one occasion, have I witnessed overly aggressive responses on the part of authors to anonymous reviews that I considered to be entirely fair and constructive in their criticisms. I do think we need to do all we can to discourage anonymous reviews, but it will be difficult to completely remove that choice from the process.

  13. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    Science.gov (United States)

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  14. Surface Coating Constraint Induced Self-Discharging of Silicon Nanoparticles as Anodes for Lithium Ion Batteries

    Energy Technology Data Exchange (ETDEWEB)

    Luo, Langli; Zhao, Peng; Yang, Hui; Liu, Borui; Zhang, Jiguang; Cui, Yi; Yu, Guihua; Zhang, Sulin; Wang, Chong M.

    2015-10-01

    One of the key challenges of Si-based anodes for lithium ion batteries is the large volume change upon lithiation and delithiation, which commonly leads to electrochemo-mechanical degradation and subsequent fast capacity fading. Recent studies have shown that applying nanometer-thick coating layers on Si nanoparticle (SiNPs) enhances cyclability and capacity retention. However, it is far from clear how the coating layer function from the point of view of both surface chemistry and electrochemo-mechanical effect. Herein, we use in situ transmission electron microscopy to investigate the lithiation/delithiation kinetics of SiNPs coated with a conductive polymer, polypyrrole (PPy). We discovered that this coating layer can lead to “self-delithiation” or “self-discharging” at different stages of lithiation. We rationalized that the self-discharging is driven by the internal compressive stress generated inside the lithiated SiNPs due to the constraint effect of the coating layer. We also noticed that the critical size of lithiation-induced fracture of SiNPs is increased from ~ 150 nm for bare SiNPs to ~ 380 nm for the PPy-coated SiNPs, showing a mechanically protective role of the coating layer. These observations demonstrate both beneficial and detrimental roles of the surface coatings, shedding light on rational design of surface coatings for silicon to retain high-power and high capacity as anode for lithium ion batteries.

  15. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    Science.gov (United States)

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  16. Policy-Aware Sender Anonymity in Location-Based Services

    Science.gov (United States)

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  17. System for Anonymous Data Collection Based on Group Signature Scheme

    Directory of Open Access Journals (Sweden)

    David Troják

    2016-01-01

    Full Text Available This paper deals with an anonymous data collection in the Internet of Things (IoT. the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive. the proposed data‑collection system provides anonymity for the data sources by applying a cooperation group scheme. the group scheme also provides a low power consumption. the system is built upon the Tor (The Onion Router anonymous network, which is a part of the Internet darknet. the proposed system was designed for the Android devices on the client side and for Java environment on the server side. We evaluated the anonymous data collection in a real‑use scenario that covers selected data acquisition (e.g. signal strength from smartphones triggered by their geographical location change. the results show that the proposed system provides the sufficient data source anonymity, an effective revocation, a low computational cost and a low overhead.

  18. (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems.

    Science.gov (United States)

    Li, Hongtao; Guo, Feng; Zhang, Wenyin; Wang, Jie; Xing, Jinsheng

    2018-02-14

    The widely use of IoT technologies in healthcare services has pushed forward medical intelligence level of services. However, it also brings potential privacy threat to the data collection. In healthcare services system, health and medical data that contains privacy information are often transmitted among networks, and such privacy information should be protected. Therefore, there is a need for privacy-preserving data collection (PPDC) scheme to protect clients (patients) data. We adopt (a,k)-anonymity model as privacy pretection scheme for data collection, and propose a novel anonymity-based PPDC method for healthcare services in this paper. The threat model is analyzed in the client-server-to-user (CS2U) model. On client-side, we utilize (a,k)-anonymity notion to generate anonymous tuples which can resist possible attack, and adopt a bottom-up clustering method to create clusters that satisfy a base privacy level of (a 1 ,k 1 )-anonymity. On server-side, we reduce the communication cost through generalization technology, and compress (a 1 ,k 1 )-anonymous data through an UPGMA-based cluster combination method to make the data meet the deeper level of privacy (a 2 ,k 2 )-anonymity (a 1  ≥ a 2 , k 2  ≥ k 1 ). Theoretical analysis and experimental results prove that our scheme is effective in privacy-preserving and data quality.

  19. A hidden service model based on HS-HS anonymous network

    Science.gov (United States)

    Meng, Yitong; Zhao, Xing; Fei, Jinlong; Zhu, Yuefei

    2017-10-01

    The Hidden Service provided by Tor anonymous network can effectively protect the anonymity and security of the Hidden server, this article through the analysis of the data packet structure of Tor, three jump transmission mechanism and link establishment protocol and Hidden Service communication process, in view of the Hidden node number too much, link building Service for too long and too redundant link problem. An improved hidden service model HS-HS is proposed that incorporating multiple transmission link and reuse, and at the same time will be important transit point for reuse protection link anonymity, through the ExperimenTor simulation environment test, verify the improved model of HS-HS can be more effective in guarantee anonymity and security, improve the overall efficiency of data transmission, to meet the needs of today's anonymous service.

  20. Comparison of the Personality Profiles of Inmate Anonymous and Non-Anonymous Male Addicts

    Directory of Open Access Journals (Sweden)

    Nasrolah Erfani

    2013-05-01

    Full Text Available Aim: This study compared the personality profiles of inmate anonymous and non-anonymous male addicts. Method: The participants of study were anonymous and non-anonymous male addicts of the prisons of the Hamadan province in 1391. The population was 3130 addicts, including 627 anonymous and 2503 non-anonymous addicts. The 310 addicts were selected by stratified random sampling the sample size was determined by Cochran formula.The short-form NEO Five Factor personality questionnaire administered among selected sample. Data analyzed by descriptive statistic as frequency and percentage, also, inferential statistic as multivariate analysis of variance was run. Results: The results showed that personality profiles of anonymous and non-anonymous addicts were significantly different. That is, mean score of neuroticism in anonymous addicts was less than non anonymous. Also, mean score of extraversion was higher in anonymous addicts. Conclusion: It can be concluded that the anonymous male addicts are differ with non-anonymous male addicts in personality traits.

  1. An overview of anonymity and anonymous communication

    NARCIS (Netherlands)

    Koot, M.

    2008-01-01

    Privacy is becoming an increasingly important aspect in distributed systems. In anonymous communication, privacy is provided to communicating parties by hiding their identities from each other and/or from others. This paper discusses the problem of anonymous communication and clarifies the notion of

  2. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  3. K-Anonymity Based Privacy Risk Budgeting System for Interactive Record Linkage

    Directory of Open Access Journals (Sweden)

    Hye-Chung Kum

    2017-04-01

    The k-anonymity based privacy risk budgeting system provides a mechanism where we can concretely reason about the tradeoff between the privacy risks due to information disclosed, accuracy gained, and biases reduced during interactive record linkage.

  4. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  5. Constraint-based reachability

    Directory of Open Access Journals (Sweden)

    Arnaud Gotlieb

    2013-02-01

    Full Text Available Iterative imperative programs can be considered as infinite-state systems computing over possibly unbounded domains. Studying reachability in these systems is challenging as it requires to deal with an infinite number of states with standard backward or forward exploration strategies. An approach that we call Constraint-based reachability, is proposed to address reachability problems by exploring program states using a constraint model of the whole program. The keypoint of the approach is to interpret imperative constructions such as conditionals, loops, array and memory manipulations with the fundamental notion of constraint over a computational domain. By combining constraint filtering and abstraction techniques, Constraint-based reachability is able to solve reachability problems which are usually outside the scope of backward or forward exploration strategies. This paper proposes an interpretation of classical filtering consistencies used in Constraint Programming as abstract domain computations, and shows how this approach can be used to produce a constraint solver that efficiently generates solutions for reachability problems that are unsolvable by other approaches.

  6. Anonymous steps: gender and Gamblers Anonymous

    OpenAIRE

    Rogers, Jim

    2015-01-01

    The biggest source of help for problem gamblers remains gamblers anonymous (GA) in terms of accessibility and availability. GA has traditionally been very much a male preserve. This paper reports on a literature review of Gamblers Anonymous together with data from observations of a contemporary open GA meeting over a one year period. Whilst some studies from North America suggest a changing culture and gender balance within GA programmes observations from the North of England, supported b...

  7. Utility-preserving anonymization for health data publishing.

    Science.gov (United States)

    Lee, Hyukki; Kim, Soohyung; Kim, Jong Wook; Chung, Yon Dohn

    2017-07-11

    Publishing raw electronic health records (EHRs) may be considered as a breach of the privacy of individuals because they usually contain sensitive information. A common practice for the privacy-preserving data publishing is to anonymize the data before publishing, and thus satisfy privacy models such as k-anonymity. Among various anonymization techniques, generalization is the most commonly used in medical/health data processing. Generalization inevitably causes information loss, and thus, various methods have been proposed to reduce information loss. However, existing generalization-based data anonymization methods cannot avoid excessive information loss and preserve data utility. We propose a utility-preserving anonymization for privacy preserving data publishing (PPDP). To preserve data utility, the proposed method comprises three parts: (1) utility-preserving model, (2) counterfeit record insertion, (3) catalog of the counterfeit records. We also propose an anonymization algorithm using the proposed method. Our anonymization algorithm applies full-domain generalization algorithm. We evaluate our method in comparison with existence method on two aspects, information loss measured through various quality metrics and error rate of analysis result. With all different types of quality metrics, our proposed method show the lower information loss than the existing method. In the real-world EHRs analysis, analysis results show small portion of error between the anonymized data through the proposed method and original data. We propose a new utility-preserving anonymization method and an anonymization algorithm using the proposed method. Through experiments on various datasets, we show that the utility of EHRs anonymized by the proposed method is significantly better than those anonymized by previous approaches.

  8. “We are Anonymous.” Anonymity in the Public Sphere – Challenges of Free and Open Communication

    Directory of Open Access Journals (Sweden)

    Saskia Sell

    2013-05-01

    Full Text Available Anonymity, the stealth mode of public communication, challenges different actors who deal with freedom of communication issues in their day to day life – be it professional journalists, information and communication scientists, technicians or political activists. This article aims to deliver theoretical background on the concept of anonymity on the macro-level, as well as to shed light on how different communicators deal with anonymity on the micro-level. Based on the example of the Anonymous movement, communicative actions are put in relation to media technological artifacts and their surrounding media environment with a focus on journalistic practice and public response to the phenomenon. The analysis concludes with the need for a preservation of options for anonymous public communication as a dimension of freedom of communication after carefully considering both the advantages and the potential risks connected to that mode of private-public communication.

  9. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user...... to access anonymously services such as whistle blowing and net-counselling. Our approach: (1) allows a mobile user, remembering a short password, to anonymously and securely retrieve the credentials necessary for his anonymous communication without assuming a pre-established anonymous channel...

  10. Constraint-based scheduling applying constraint programming to scheduling problems

    CERN Document Server

    Baptiste, Philippe; Nuijten, Wim

    2001-01-01

    Constraint Programming is a problem-solving paradigm that establishes a clear distinction between two pivotal aspects of a problem: (1) a precise definition of the constraints that define the problem to be solved and (2) the algorithms and heuristics enabling the selection of decisions to solve the problem. It is because of these capabilities that Constraint Programming is increasingly being employed as a problem-solving tool to solve scheduling problems. Hence the development of Constraint-Based Scheduling as a field of study. The aim of this book is to provide an overview of the most widely used Constraint-Based Scheduling techniques. Following the principles of Constraint Programming, the book consists of three distinct parts: The first chapter introduces the basic principles of Constraint Programming and provides a model of the constraints that are the most often encountered in scheduling problems. Chapters 2, 3, 4, and 5 are focused on the propagation of resource constraints, which usually are responsibl...

  11. Data anonymization patent landscape

    Directory of Open Access Journals (Sweden)

    Mirjana Pejić Bach

    2017-01-01

    Full Text Available The omnipresent, unstoppable increase in digital data has led to a greater understanding of the importance of data privacy. Different approaches are used to implement data privacy. The goal of this paper is to develop a data anonymization patent landscape, by determining the following: (i the trend in data anonymization patenting, (ii the type of technical content protected in data anonymization, (iii the organizations and countries most active in patenting data anonymization know-how; and (iv the topics emerging most often in patent titles. Patents from the PatSeer database relating to data anonymization from 2001 to 2015 were analyzed. We used the longitudinal approach in combination with text mining techniques to develop a data anonymization patent landscape. The results indicated the following. The number of single patent families is growing with a high increase after 2010, thus indicating a positive trend in the area of patenting data anonymization solutions. The majority of patenting activities relate to the G Physics section. Organizations from the USA and Japan assigned the majority of patents related to data anonymization. The results of text mining indicate that the most often used word in titles of data anonymization patents are “anonym*, “method”, “data” and “system”. Several additional words that indicated the most frequent topics related to data anonymization were: “equipment”, “software”, “protection”, “identification”, or “encryption”, and specific topics such as “community”, “medical”, or “service”.

  12. Anon-Pass: Practical Anonymous Subscriptions.

    Science.gov (United States)

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch . Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user.

  13. Quantum anonymous voting with anonymity check

    International Nuclear Information System (INIS)

    Horoshko, Dmitri; Kilin, Sergei

    2011-01-01

    We propose a new protocol for quantum anonymous voting having serious advantages over the existing protocols: it protects both the voters from a curious tallyman and all the participants from a dishonest voter in unconditional way. The central idea of the protocol is that the ballots are given back to the voters after the voting process, which gives a possibility for two voters to check the anonymity of the vote counting process by preparing a special entangled state of two ballots. Any attempt of cheating from the side of the tallyman results in destroying the entanglement, which can be detected by the voters.

  14. Anonymous quantum communications using the quantum one-time pad

    International Nuclear Information System (INIS)

    Wang, Qing-Le; Gao, Fei-; Liu, Bin; Song, Ting-Ting; Wen, Qiao-Yan

    2015-01-01

    We present the first quantum secure communication protocol for an anonymous receiver without the assistance of anonymous entanglement. In previous works, if a public sender wants to send quantum messages to a chosen receiver while protecting the identity of the receiver from others, all participants should cooperate first to construct the entanglement between the sender and the anonymous receiver. This is the most important process in anonymous quantum communications. With anonymous entanglement, the sender can communicate quantum messages to the anonymous receiver by applying teleportation protocols. In contrast, our protocol is novel and achieves communication of quantum messages directly from the public sender to the anonymous receiver based on the quantum one-time pad and current achievements. Notably, the anonymity of the receiver, as well as the privacy of the quantum messages, is perfectly protected with the exception of an exponentially small probability in our protocol. (paper)

  15. A Framework For Enhancing Privacy In Location Based Services Using K-Anonymity Model

    Directory of Open Access Journals (Sweden)

    Jane Mugi

    2015-08-01

    Full Text Available Abstract This paper presents a framework for enhancing privacy in Location Based Services using K-anonymity model. Users of location based services have to reveal their location information in order to use these services however this has threatened the user privacy. K-anonymity approach has been studied extensively in various forms. However it is only effective when the user location is fixed. When a user moves and continuously sends their location information the location service provider can approximate user trajectory which poses a threat to the trajectory privacy of the user. This framework will ensure that user privacy is enhanced for both snapshot and continuous queries. The efficiency and effectiveness of the proposed framework was evaluated the results indicate that the proposed framework has high success rate and good run time performance.

  16. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  17. An Efficient Big Data Anonymization Algorithm Based on Chaos and Perturbation Techniques

    Directory of Open Access Journals (Sweden)

    Can Eyupoglu

    2018-05-01

    Full Text Available The topic of big data has attracted increasing interest in recent years. The emergence of big data leads to new difficulties in terms of protection models used for data privacy, which is of necessity for sharing and processing data. Protecting individuals’ sensitive information while maintaining the usability of the data set published is the most important challenge in privacy preserving. In this regard, data anonymization methods are utilized in order to protect data against identity disclosure and linking attacks. In this study, a novel data anonymization algorithm based on chaos and perturbation has been proposed for privacy and utility preserving in big data. The performance of the proposed algorithm is evaluated in terms of Kullback–Leibler divergence, probabilistic anonymity, classification accuracy, F-measure and execution time. The experimental results have shown that the proposed algorithm is efficient and performs better in terms of Kullback–Leibler divergence, classification accuracy and F-measure compared to most of the existing algorithms using the same data set. Resulting from applying chaos to perturb data, such successful algorithm is promising to be used in privacy preserving data mining and data publishing.

  18. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel; Kalnis, Panos; Tao, Yufei

    2011-01-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  19. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  20. Anonymous Authorship Control for User-Generated Content

    Directory of Open Access Journals (Sweden)

    Suk-Bong LEE

    2007-12-01

    Full Text Available User-Generated Content (UGC is opening up new large market in content services, and more and more people are visiting web sites to share and enjoy UGCs. These trends make many authors to move into online. Authors want to conserve their authorship and expect to publish their UGC anonymously in cases. To meet the requirements, we propose a new authorship control model based on watermarking and metadata. Authors can embed their authorship into their UGC with identities or with anonym. Even though an author publishes his UGC anonymously, he can prove his authorship without unveiling his identity via 5 methods utilizing the proposed authorship model. The proposed model and methods need no TTP and are robust even based on fragile underlying watermarking scheme.

  1. Anonymity and Openness in Donor Conception: the New Danish Model

    DEFF Research Database (Denmark)

    Herrmann, Janne Rothmar

    2013-01-01

    model in donor conception which offers women/couples a choice of anonymity or openness in donation.This paper is based on my talk on June 20, 2013 at London School of Economics at the conference “New Families and Genetic Identities: Developments in law, policy and research” organised by the Morgan...... bank is based in Denmark and consequently anonymous sperm is also exported abroad, even into jurisdictions where anonymity is banned illegal. This commentary traces the raison d’être of anonymity in Danish law, accounts for the legal framework for the internet sale of sperm and examines the new Danish...

  2. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... anonymous steganography, { A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), { A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  3. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... defining anonymous steganography, - A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), - A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  4. Self-tallying quantum anonymous voting

    Science.gov (United States)

    Wang, Qingle; Yu, Chaohua; Gao, Fei; Qi, Haoyu; Wen, Qiaoyan

    2016-08-01

    Anonymous voting is a voting method of hiding the link between a vote and a voter, the context of which ranges from governmental elections to decision making in small groups like councils and companies. In this paper, we propose a quantum anonymous voting protocol assisted by two kinds of entangled quantum states. Particularly, we provide a mechanism of opening and permuting the ordered votes of all the voters in an anonymous manner; any party who is interested in the voting results can acquire a permutation copy and then obtains the voting result through a simple calculation. Unlike all previous quantum works on anonymous voting, our quantum anonymous protocol possesses the properties of privacy, self-tallying, nonreusability, verifiability, and fairness at the same time. In addition, we demonstrate that the entanglement of the quantum states used in our protocol makes an attack from an outside eavesdropper and inside dishonest voters impossible. We also generalize our protocol to execute the task of anonymous multiparty computation, such as anonymous broadcast and anonymous ranking.

  5. Enhancing physicians' use of Alcoholics Anonymous: Internet-based training.

    Science.gov (United States)

    Sellers, Brealyn; Galanter, Marc; Dermatis, Helen; Nachbar, Martin

    2005-01-01

    Alcoholics Anonymous is not yet fully employed by the medical community as a means to enhance patient outcome. The purpose of this study was to evaluate visitors' use of an Internet course on Alcoholics Anonymous, and to compare how various disciplines learned about, gained access to and participated in the course. Demographic information was collected from 414 visitors to the course. 64% of the 414 respondents received their last educational degree within the last 10 years, and had an interest in the topic of addiction prior to their accessing the site. 294 (71%) of those who accessed the course completed it, and those who accessed it learned about it from various sources other than print advertisement in professional journals. Within the 230 physician respondents, 143 (62%) were psychiatrists, 82 (78%) of whom learned about the Internet course via professional journal. Given the need for further training among physicians in the use of Alcoholics Anonymous, the Internet can be utilized to make information available to a large number of people. Because it allows the user to access information outside the traditional means, the barriers to its use are minimal, and it has the potential to effectively convey useful clinical information.

  6. BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-12-01

    Full Text Available With the widespread use of Internet, Web, and mobile technologies, a new category of applications and transactions that requires anonymity is gaining increased interest and importance. Examples of such new applications are innovative payment systems, digital notaries, electronic voting, documents sharing, electronic auctions, medical applications, and many others. In addition to anonymity, these applications and transactions also require standard security services: identification, authentication, and authorization of users and protection of their transactions. Providing those services in combination with anonymity is an especially challenging issue, because all security services require explicit user identification and authentication. To solve this issue and enable applications with security and also anonymity we introduce a new type of cryptographically encapsulated objects called BIX certificates. “BIX” is an abbreviation for “Blockchain Information Exchange.” Their purpose is equivalent to X.509 certificates: to support security services for users and transactions, but also enhanced with anonymity. This paper describes the structure and attributes of BIX certificate objects and all related protocols for their creation, distribution, and use. The BIX Certification Infrastructure (BCI as a distributed public ledger is also briefly described.

  7. A Mechanism for Anonymous Credit Card Systems

    Science.gov (United States)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  8. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  9. Protecting genomic sequence anonymity with generalization lattices.

    Science.gov (United States)

    Malin, B A

    2005-01-01

    Current genomic privacy technologies assume the identity of genomic sequence data is protected if personal information, such as demographics, are obscured, removed, or encrypted. While demographic features can directly compromise an individual's identity, recent research demonstrates such protections are insufficient because sequence data itself is susceptible to re-identification. To counteract this problem, we introduce an algorithm for anonymizing a collection of person-specific DNA sequences. The technique is termed DNA lattice anonymization (DNALA), and is based upon the formal privacy protection schema of k -anonymity. Under this model, it is impossible to observe or learn features that distinguish one genetic sequence from k-1 other entries in a collection. To maximize information retained in protected sequences, we incorporate a concept generalization lattice to learn the distance between two residues in a single nucleotide region. The lattice provides the most similar generalized concept for two residues (e.g. adenine and guanine are both purines). The method is tested and evaluated with several publicly available human population datasets ranging in size from 30 to 400 sequences. Our findings imply the anonymization schema is feasible for the protection of sequences privacy. The DNALA method is the first computational disclosure control technique for general DNA sequences. Given the computational nature of the method, guarantees of anonymity can be formally proven. There is room for improvement and validation, though this research provides the groundwork from which future researchers can construct genomics anonymization schemas tailored to specific datasharing scenarios.

  10. Research on Anonymization and De-anonymization in the Bitcoin System

    OpenAIRE

    ShenTu, QingChun; Yu, JianPing

    2015-01-01

    The Bitcoin system is an anonymous, decentralized crypto-currency. There are some deanonymizating techniques to cluster Bitcoin addresses and to map them to users' identifications in the two research directions of Analysis of Transaction Chain (ATC) and Analysis of Bitcoin Protocol and Network (ABPN). Nowadays, there are also some anonymization methods such as coin-mixing and transaction remote release (TRR) to cover the relationship between Bitcoin address and the user. This paper studies an...

  11. Constraint-Muse: A Soft-Constraint Based System for Music Therapy

    Science.gov (United States)

    Hölzl, Matthias; Denker, Grit; Meier, Max; Wirsing, Martin

    Monoidal soft constraints are a versatile formalism for specifying and solving multi-criteria optimization problems with dynamically changing user preferences. We have developed a prototype tool for interactive music creation, called Constraint Muse, that uses monoidal soft constraints to ensure that a dynamically generated melody harmonizes with input from other sources. Constraint Muse provides an easy to use interface based on Nintendo Wii controllers and is intended to be used in music therapy for people with Parkinson’s disease and for children with high-functioning autism or Asperger’s syndrome.

  12. Constraint-based Word Segmentation for Chinese

    DEFF Research Database (Denmark)

    Christiansen, Henning; Bo, Li

    2014-01-01

    -hoc and statistically based methods. In this paper, we show experiments of implementing different approaches to CWSP in the framework of CHR Grammars [Christiansen, 2005] that provides a constraint solving approach to language analysis. CHR Grammars are based upon Constraint Handling Rules, CHR [Frühwirth, 1998, 2009......], which is a declarative, high-level programming language for specification and implementation of constraint solvers....

  13. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    International Nuclear Information System (INIS)

    Xie Qi; Hu Bin; Chen Ke-Fei; Liu Wen-Hao; Tan Xiao

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. (paper)

  14. Research Progress on Fe-based Amorphous Coatings

    Directory of Open Access Journals (Sweden)

    LIANG Xiu-bing

    2017-09-01

    Full Text Available The latest research progresses on Fe-based amorphous coatings were reviewed. The typical alloy system and the classification of Fe-based amorphous coatings were clarified. The status, progress and development of the Fe-based amorphous coatings prepared by thermal spray processing and laser cladding process were discussed. The main mechanical properties and potential applications of the Fe-based amorphous coatings were also described. Furthermore, based on the main problems mentioned above, the future development of the Fe-based amorphous coatings was discussed, including the exploitation preparation technologies of high amorphous content of the Fe-based coatings, the development of the low cost and high performance Fe-based coating alloys system, the broadening application of Fe-based amorphous coatings, and so on.

  15. Digital anonymity on the internet : new rules for anonymous electronic transactions? an exploration of the private law implications of digital anonymity

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.; Prins, C.

    2001-01-01

    This article sets out the most important conclusions of the first stage of a study into the dimensions of digital anonymity. It is intended to set out the problem, make people aware of the intricacies of the problem and thus stimulate the debate on useful legal structures for anonymity. The

  16. Anonymous Connections and Onion Routing

    National Research Council Canada - National Science Library

    Syverson, Paul F; Goldschlag, David M; Reed, Michael G

    1997-01-01

    .... Unmodified Internet applications can use these anonymous connections by means of proxies. The proxies may also make communication anonymous by removing identifying information from the data stream...

  17. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted

  18. Trust in Anonymity Networks

    Science.gov (United States)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  19. Silane based coating of aluminium mold

    DEFF Research Database (Denmark)

    2013-01-01

    having at least one closed cavity is provided, at least one surface of the at least one cavity being an aluminium surface coated with a silane based coating layer. The silane based anti-stiction coating improves the anti-stiction properties of the mold which may allow for molding and demolding...... of structures which would otherwise be difficult to mold. The resistance of the coated aluminium mold is significantly improved by applying a silane-based coating layer....

  20. Coverage-based constraints for IMRT optimization

    Science.gov (United States)

    Mescher, H.; Ulrich, S.; Bangert, M.

    2017-09-01

    Radiation therapy treatment planning requires an incorporation of uncertainties in order to guarantee an adequate irradiation of the tumor volumes. In current clinical practice, uncertainties are accounted for implicitly with an expansion of the target volume according to generic margin recipes. Alternatively, it is possible to account for uncertainties by explicit minimization of objectives that describe worst-case treatment scenarios, the expectation value of the treatment or the coverage probability of the target volumes during treatment planning. In this note we show that approaches relying on objectives to induce a specific coverage of the clinical target volumes are inevitably sensitive to variation of the relative weighting of the objectives. To address this issue, we introduce coverage-based constraints for intensity-modulated radiation therapy (IMRT) treatment planning. Our implementation follows the concept of coverage-optimized planning that considers explicit error scenarios to calculate and optimize patient-specific probabilities q(\\hat{d}, \\hat{v}) of covering a specific target volume fraction \\hat{v} with a certain dose \\hat{d} . Using a constraint-based reformulation of coverage-based objectives we eliminate the trade-off between coverage and competing objectives during treatment planning. In-depth convergence tests including 324 treatment plan optimizations demonstrate the reliability of coverage-based constraints for varying levels of probability, dose and volume. General clinical applicability of coverage-based constraints is demonstrated for two cases. A sensitivity analysis regarding penalty variations within this planing study based on IMRT treatment planning using (1) coverage-based constraints, (2) coverage-based objectives, (3) probabilistic optimization, (4) robust optimization and (5) conventional margins illustrates the potential benefit of coverage-based constraints that do not require tedious adjustment of target volume objectives.

  1. Fuzzy Constraint-Based Agent Negotiation

    Institute of Scientific and Technical Information of China (English)

    Menq-Wen Lin; K. Robert Lai; Ting-Jung Yu

    2005-01-01

    Conflicts between two or more parties arise for various reasons and perspectives. Thus, resolution of conflicts frequently relies on some form of negotiation. This paper presents a general problem-solving framework for modeling multi-issue multilateral negotiation using fuzzy constraints. Agent negotiation is formulated as a distributed fuzzy constraint satisfaction problem (DFCSP). Fuzzy constrains are thus used to naturally represent each agent's desires involving imprecision and human conceptualization, particularly when lexical imprecision and subjective matters are concerned. On the other hand, based on fuzzy constraint-based problem-solving, our approach enables an agent not only to systematically relax fuzzy constraints to generate a proposal, but also to employ fuzzy similarity to select the alternative that is subject to its acceptability by the opponents. This task of problem-solving is to reach an agreement that benefits all agents with a high satisfaction degree of fuzzy constraints, and move towards the deal more quickly since their search focuses only on the feasible solution space. An application to multilateral negotiation of a travel planning is provided to demonstrate the usefulness and effectiveness of our framework.

  2. Location Prediction Based on Transition Probability Matrices Constructing from Sequential Rules for Spatial-Temporal K-Anonymity Dataset

    Science.gov (United States)

    Liu, Zhao; Zhu, Yunhong; Wu, Chenxue

    2016-01-01

    Spatial-temporal k-anonymity has become a mainstream approach among techniques for protection of users’ privacy in location-based services (LBS) applications, and has been applied to several variants such as LBS snapshot queries and continuous queries. Analyzing large-scale spatial-temporal anonymity sets may benefit several LBS applications. In this paper, we propose two location prediction methods based on transition probability matrices constructing from sequential rules for spatial-temporal k-anonymity dataset. First, we define single-step sequential rules mined from sequential spatial-temporal k-anonymity datasets generated from continuous LBS queries for multiple users. We then construct transition probability matrices from mined single-step sequential rules, and normalize the transition probabilities in the transition matrices. Next, we regard a mobility model for an LBS requester as a stationary stochastic process and compute the n-step transition probability matrices by raising the normalized transition probability matrices to the power n. Furthermore, we propose two location prediction methods: rough prediction and accurate prediction. The former achieves the probabilities of arriving at target locations along simple paths those include only current locations, target locations and transition steps. By iteratively combining the probabilities for simple paths with n steps and the probabilities for detailed paths with n-1 steps, the latter method calculates transition probabilities for detailed paths with n steps from current locations to target locations. Finally, we conduct extensive experiments, and correctness and flexibility of our proposed algorithm have been verified. PMID:27508502

  3. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  4. Securing the anonymity of content providers in the World Wide Web

    Science.gov (United States)

    Demuth, Thomas; Rieke, Andreas

    1999-04-01

    Nowadays the World Wide Web (WWW) is an established service used by people all over the world. Most of them do not recognize the fact that they reveal plenty of information about themselves or their affiliation and computer equipment to the providers of web pages they connect to. As a result, a lot of services offer users to access web pages unrecognized or without risk of being backtracked, respectively. This kind of anonymity is called user or client anonymity. But on the other hand, an equivalent protection for content providers does not exist, although this feature is desirable for many situations in which the identity of a publisher or content provider shall be hidden. We call this property server anonymity. We will introduce the first system with the primary target to offer anonymity for providers of information in the WWW. Beside this property, it provides also client anonymity. Based on David Chaum's idea of mixes and in relation to the context of the WWW, we explain the term 'server anonymity' motivating the system JANUS which offers both client and server anonymity.

  5. "People Are Either Too Fake or Too Real": Opportunities and Challenges in Tie-Based Anonymity

    DEFF Research Database (Denmark)

    Ma, Xiao; Andabili, Nazanin; Barkhuus, Louise

    2017-01-01

    In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these “tie-based” anonymity services may be notably different than other social media services. We use semi-structu...... disclosure needs and social probing. Still, challenges for making such applications successful, for example the prevalence of negativity and bullying, are substantial.......In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these “tie-based” anonymity services may be notably different than other social media services. We use semi...

  6. Anonymous Transactions in Computer Networks

    Science.gov (United States)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  7. Constraint-based scheduling

    Science.gov (United States)

    Zweben, Monte

    1993-01-01

    The GERRY scheduling system developed by NASA Ames with assistance from the Lockheed Space Operations Company, and the Lockheed Artificial Intelligence Center, uses a method called constraint-based iterative repair. Using this technique, one encodes both hard rules and preference criteria into data structures called constraints. GERRY repeatedly attempts to improve schedules by seeking repairs for violated constraints. The system provides a general scheduling framework which is being tested on two NASA applications. The larger of the two is the Space Shuttle Ground Processing problem which entails the scheduling of all the inspection, repair, and maintenance tasks required to prepare the orbiter for flight. The other application involves power allocation for the NASA Ames wind tunnels. Here the system will be used to schedule wind tunnel tests with the goal of minimizing power costs. In this paper, we describe the GERRY system and its application to the Space Shuttle problem. We also speculate as to how the system would be used for manufacturing, transportation, and military problems.

  8. Anonymous voting for multi-dimensional CV quantum system

    International Nuclear Information System (INIS)

    Shi Rong-Hua; Xiao Yi; Shi Jin-Jing; Guo Ying; Lee, Moon-Ho

    2016-01-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. (paper)

  9. Laser-based coatings removal

    International Nuclear Information System (INIS)

    Freiwald, J.G.; Freiwald, D.A.

    1995-01-01

    Over the years as building and equipment surfaces became contaminated with low levels of uranium or plutonium dust, coats of paint were applied to stabilize the contaminants in place. Most of the earlier paint used was lead-based paint. More recently, various non-lead-based paints, such as two-part epoxy, are used. For D ampersand D (decontamination and decommissioning), it is desirable to remove the paints or other coatings rather than having to tear down and dispose of the entire building. This report describes the use of pulse-repetetion laser systems for the removal of paints and coatings

  10. Laser-based coatings removal

    Energy Technology Data Exchange (ETDEWEB)

    Freiwald, J.G.; Freiwald, D.A. [F2 Associates, Inc., Albuquerque, NM (United States)

    1995-10-01

    Over the years as building and equipment surfaces became contaminated with low levels of uranium or plutonium dust, coats of paint were applied to stabilize the contaminants in place. Most of the earlier paint used was lead-based paint. More recently, various non-lead-based paints, such as two-part epoxy, are used. For D&D (decontamination and decommissioning), it is desirable to remove the paints or other coatings rather than having to tear down and dispose of the entire building. This report describes the use of pulse-repetetion laser systems for the removal of paints and coatings.

  11. An improved biometrics-based remote user authentication scheme with user anonymity.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  12. Constraint-based Attribute and Interval Planning

    Science.gov (United States)

    Jonsson, Ari; Frank, Jeremy

    2013-01-01

    In this paper we describe Constraint-based Attribute and Interval Planning (CAIP), a paradigm for representing and reasoning about plans. The paradigm enables the description of planning domains with time, resources, concurrent activities, mutual exclusions among sets of activities, disjunctive preconditions and conditional effects. We provide a theoretical foundation for the paradigm, based on temporal intervals and attributes. We then show how the plans are naturally expressed by networks of constraints, and show that the process of planning maps directly to dynamic constraint reasoning. In addition, we de ne compatibilities, a compact mechanism for describing planning domains. We describe how this framework can incorporate the use of constraint reasoning technology to improve planning. Finally, we describe EUROPA, an implementation of the CAIP framework.

  13. [Anonymous birth and neonaticide in Tyrol].

    Science.gov (United States)

    Danner, C; Pacher, M; Ambach, E; Brezinka, C

    2005-10-01

    In 2001 the Austrian government provided the legal means that formally enabled "anonymous birth": a woman can now give birth in any hospital in Austria without giving her name or insurance number, the baby is taken into care by social services and placed with adoptive parents. The cost of the hospital stay is covered from public funds. These measures were put into effect after some highly publicized cases of infant abandonment and neonaticide in Austria. In the mostly rural and small-town province of Tyrol province in western Austria (687,000 inhabitants, 7000 births per year) four cases of neonaticide were discovered in the years from 1996 to 2004. One child was abandoned inside a hospital. Since 2001 two women have made use of the "anonymous birth" option. Neither had had any pregnancy controls, both showed up at or near term with contractions. They delivered healthy infants that were then taken into care by local adoption services. Both women were extensively counselled by psychologists, social workers, medical and midwifery staff and both insisted on their original decision to remain anonymous. A few weeks later one of the women found herself at the centre of a criminal investigation for infanticide after anonymous letters were sent to family members insinuating she had done away with the child. Police stopped that investigation when hospital staff confirmed that the woman had had an "anonymous" delivery. Despite the option of legal "anonymous" birth free of charge in modern hospitals there are still cases of infant abandonment and neonaticide in Austria. It is proposed that the women who opt for anonymous birth may not be the women who would otherwise kill their babies. Instead, it appears that the women opted for anonymity to escape the probably well-intentioned but overbearing attention of their families and of social services. It is doubtful that the option of anonymous birth will lead to a complete disappearance of infanticide and infant abandonment in

  14. Anonymous Boh avatud kunsti maastikul / Raivo Kelomees

    Index Scriptorium Estoniae

    Kelomees, Raivo, 1960-

    2010-01-01

    Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele

  15. Alcoholics Anonymous and nursing. Lessons in holism and spiritual care.

    Science.gov (United States)

    McGee, E M

    2000-03-01

    Alcoholic Anonymous (AA) is a worldwide, million-member organization that has assisted countless alcoholics to achieve sobriety through a spiritual program of recovery from alcoholism. Based on spiritual principles known as the "Twelve Steps" and "Twelve Traditions," AA has provided a model for other recovery programs such as Narcotics Anonymous (NA), Gamblers Anonymous (GA), and Sex and Love Addicts Anonymous (SLAA). Recovery in AA appears to involve a process of self-transcendence. In recent years, nursing scholars have increasingly explored the concepts of self-transcendence and spirituality as they apply to nursing theory and practice. This article explores the roots and spiritual dimensions of 12-step recovery programs. It further explores the ways in which theoretical and clinical knowledge about the delivery of spiritual care interventions may be gained from an understanding of AA's spiritual approach to recovery.

  16. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel; Zhao, Keliang; Papadias, Dimitris; Kalnis, Panos

    2010-01-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  17. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel

    2010-05-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  18. An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity

    Directory of Open Access Journals (Sweden)

    Muhammad Khurram Khan

    2013-01-01

    Full Text Available The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An’s scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An’s scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  19. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  20. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  1. Privacy preserving data anonymization of spontaneous ADE reporting system dataset.

    Science.gov (United States)

    Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng

    2016-07-18

    To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three

  2. Are anonymous evaluations a better assessment of faculty teaching performance? A comparative analysis of open and anonymous evaluation processes.

    Science.gov (United States)

    Afonso, Nelia M; Cardozo, Lavoisier J; Mascarenhas, Oswald A J; Aranha, Anil N F; Shah, Chirag

    2005-01-01

    We compared teaching performance of medical school faculty using anonymous evaluations and open evaluations (in which the evaluator was not anonymous) and examined barriers to open evaluation. Residents and medical students evaluated faculty using an open evaluation instrument in which their identity was indicated in the evaluation. Following this, they completed anonymous evaluation on the same faculty members. Aggregate outcomes using the two evaluation systems were compared. Outcomes by group of evaluators (residents and students) were analyzed. Trainees were also asked to rate the barriers to the open evaluation process. A statistically significant difference between the open and anonymous evaluations was noted across all items, with faculty receiving lower scores on the anonymous evaluations. The mean score for all the items on the open evaluations was 4.45 +/- 0.65, compared to mean score of 4.07 +/- 0.80 on the anonymous evaluations. There was also a statistically significant difference between open and anonymous evaluations in five clinical teaching domains that were evaluated individually. Residents perceived that the three most common barriers to optimal evaluation were an apprehension of possible encounters with the same attending physician in the future, destruction of working relationships with the attending, and a feeling of frustration with the evaluation system. The evaluation of faculty teaching performance is complex. Most academic medical centers use the open evaluation format. This study supports the case for the use of the anonymous evaluation method as a more accurate reflection of teaching performance.

  3. Anonymity and Electronics: Adapting Preparation for Radiology Resident Examination.

    Science.gov (United States)

    Chapman, Teresa; Reid, Janet R; O'Conner, Erin E

    2017-06-01

    Diagnostic radiology resident assessment has evolved from a traditional oral examination to computerized testing. Teaching faculty struggle to reconcile the differences between traditional teaching methods and residents' new preferences for computerized testing models generated by new examination styles. We aim to summarize the collective experiences of senior residents at three different teaching hospitals who participated in case review sessions using a computer-based, interactive, anonymous teaching tool, rather than the Socratic method. Feedback was collected from radiology residents following participation in a senior resident case review session using Nearpod, which allows residents to anonymously respond to the teaching material. Subjective resident feedback was uniformly enthusiastic. Ninety percent of residents favor a case-based board review incorporating multiple-choice questions, and 94% favor an anonymous response system. Nearpod allows for inclusion of multiple-choice questions while also providing direct feedback to the teaching faculty, helping to direct the instruction and clarify residents' gaps in knowledge before the Core Examination. Copyright © 2017 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.

  4. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  5. Laser-based coatings removal

    International Nuclear Information System (INIS)

    Freiwald, J.G.; Freiwald, D.

    1995-01-01

    Over the years as building and equipment surfaces became contaminated with low levels of uranium or plutonium dust, coats of paint were applied to stabilize the contaminants in place. Most of the earlier paint used was lead-based paint. More recently, various non-lead-based paints, such as two-part epoxy, are used. For D ampersand D (decontamination and decommissioning), it is desirable to remove the paints or other coatings rather than having to tear down and dispose of the entire building

  6. Simplifying Itai-Rodeh leaderelection for anonymous rings

    NARCIS (Netherlands)

    W.J. Fokkink (Wan); J. Pang

    2004-01-01

    textabstractWe present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh. In contrast to the Itai-Rodeh algorithm, our algorithms are finite-state. So they can be analyzed using explicit state space

  7. Anonymization of Court Orders

    DEFF Research Database (Denmark)

    Povlsen, Claus; Jongejan, Bart; Hansen, Dorte Haltrup

    We describe an anonymization tool that was commissioned by and specified together with Schultz, a publishing company specialized in Danish law related publications. Unavailability of training data and the need to guarantee compliance with pre-existing anonymization guidelines forced us to implement...... a tool using manually crafted rules. We used Bracmat, a programming language that is specialized in transforming tree data structures, to meet the requirement to pass the XML structure of the input document unscathed through the whole workflow. The tool attains a reassuringly good recall, makes almost...

  8. Anonymous women? Gamblers Anonymous and gender

    OpenAIRE

    Rogers, Jim

    2016-01-01

    One of the rapidly changing elements in gambling environments is the increasing participation of women in many forms of gambling, and the growing proportions of problem gamblers who are female. It is known that women who develop gambling problems differ from men in a range of ways:for example they are more likely to have co-morbidities such as anxiety and depression, and to gamble as an 'escape' from such co-occuring problems. Gamblers Anonymous (GA) has a number of meetings across New Zeala...

  9. Anonymity in P2P Systems

    Science.gov (United States)

    Manzanares-Lopez, Pilar; Muñoz-Gea, Juan Pedro; Malgosa-Sanahuja, Josemaria; Sanchez-Aarnoutse, Juan Carlos

    In the last years, the use of peer-to-peer (P2P) applications to share and exchange knowledge among people around the world has experienced an exponential growth. Therefore, it is understandable that, like in any successful communication mechanism used by a lot of humans being, the anonymity can be a desirable characteristic in this scenario. Anonymity in P2P networks can be obtained by means of different methods, although the most significant ones are broadcast protocols, dining-cryptographer (DC) nets and multiple-hop paths. Each of these methods can be tunable in order to build a real anonymity P2P application. In addition, there is a mathematical tool called entropy that can be used in some scenarios to quantify anonymity in communication networks. In some cases, it can be calculated analytically but in others it is necessary to use simulation to obtain the network entropy.

  10. Criminal offenses in gamblers anonymous and hospital treated pathological gamblers.

    Science.gov (United States)

    Blaszczynski, A P; McConaghy, N

    1994-06-01

    The purpose of this study was to compare the nature and prevalence of gambling and non-gambling related offenses in samples of pathological gamblers seeking behavioural treatment from a hospital-based program and those attending Gamblers Anonymous. A semi-structured interview schedule obtaining demographic data and details of the nature, frequency, and consequent legal action of criminal offenses committed was administered to 152 consecutive hospital treated pathological gamblers, and 154 Gamblers Anonymous attendees who volunteered to participate in the study. Of the total sample, 59% admitted a gambling-related offense, and 23% to a conviction. There was no difference in the proportion of hospital treated and Gamblers Anonymous subjects who offended. The most common gambling-related offenses were larceny, embezzlement and misappropriation. Gamblers committed a median of ten offenses over an average ten year period of pathological gambling with a median value of $ A 300(1) per offense. The median value for each non-gambling-related offense was $ A 130. Except for the significantly older mean age of Gamblers Anonymous subjects, hospital treated gamblers did not differ from Gamblers Anonymous attenders on relevant demographic features or parameters of gambling behaviour. Findings were interpreted to suggest a possible causal link between pathological gambling and the commission of non-violent property offenses.

  11. Bio-Based Coatings for Paper Applications

    Directory of Open Access Journals (Sweden)

    Vibhore Kumar Rastogi

    2015-11-01

    Full Text Available The barrier resistance and wettability of papers are commonly controlled by the application of petroleum-based derivatives such as polyethylene, waxes and/or fluor- derivatives as coating. While surface hydrophobicity is improved by employing these polymers, they have become disfavored due to limitations in fossil-oil resources, poor recyclability, and environmental concerns on generated waste with lack of biodegradation. Alternatively, biopolymers including polysaccharides, proteins, lipids and polyesters can be used to formulate new pathways for fully bio-based paper coatings. However, difficulties in processing of most biopolymers may arise due to hydrophilicity, crystallization behavior, brittleness or melt instabilities that hinder a full exploitation at industrial scale. Therefore, blending with other biopolymers, plasticizers and compatibilizers is advantageous to improve the coating performance. In this paper, an overview of barrier properties and processing of bio-based polymers and their composites as paper coating will be discussed. In particular, recent technical advances in nanotechnological routes for bio-based nano- composite coatings will be summarized, including the use of biopolymer nanoparticles, or nanofillers such as nanoclay and nanocellulose. The combination of biopolymers along with surface modification of nanofillers can be used to create hierarchical structures that enhance hydrophobicity, complete barrier protection and functionalities of coated papers.

  12. Nanocontainer-based corrosion sensing coating

    International Nuclear Information System (INIS)

    Maia, F; Tedim, J; Bastos, A C; Ferreira, M G S; Zheludkevich, M L

    2013-01-01

    The present paper reports on the development of new sensing active coating on the basis of nanocontainers containing pH-indicating agent. The coating is able to detect active corrosion processes on different metallic substrates. The corrosion detection functionality based on the local colour change in active cathodic zones results from the interaction of hydroxide ions with phenolphthalein encapsulated in mesoporous nanocontainers which function as sensing nanoreactors. The mesoporous silica nanocontainers are synthesized and loaded with pH indicator phenolphthalein in a one-stage process. The resulting system is mesoporous, which together with bulkiness of the indicator molecules limits their leaching. At the same time, penetration of water molecules and ions inside the container is still possible, allowing encapsulated phenolphthalein to be sensitive to the pH in the surrounding environment and outperforming systems when an indicator is directly dispersed in the coating layer. The performed tests demonstrate the pH sensitivity of the developed nanocontainers being dispersed in aqueous solutions. The corrosion sensing functionality of the protective coatings with nanocontainers are proven for aluminium- and magnesium-based metallic substrates. As a result, the developed nanocontainers show high potential to be used in a new generation of active protective coatings with corrosion-sensing coatings. (paper)

  13. Assessing Anonymous Communication on the Internet: Policy Deliberations.

    Science.gov (United States)

    Kling, Rob; Lee, Yaching; Frankel, Mark S.; Teich, Al

    1999-01-01

    Examines the social character of anonymous online communication and the ways that anonymous communication has played important roles for professionals such as journalists and the police. Explains some of the new technological supports for anonymous communication on the Internet. Discusses some of the nuances behind the controversies and policy…

  14. Evaluating Direct Manipulation Operations for Constraint-Based Layout

    OpenAIRE

    Zeidler , Clemens; Lutteroth , Christof; Stuerzlinger , Wolfgang; Weber , Gerald

    2013-01-01

    Part 11: Interface Layout and Data Entry; International audience; Layout managers are used to control the placement of widgets in graphical user interfaces (GUIs). Constraint-based layout managers are more powerful than other ones. However, they are also more complex and their layouts are prone to problems that usually require direct editing of constraints. Today, designers commonly use GUI builders to specify GUIs. The complexities of traditional approaches to constraint-based layouts pose c...

  15. Judgement of Design Scheme Based on Flexible Constraint in ICAD

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    The conception of flexible constraint is proposed in the paper. The solution of flexible constraint is in special range, and maybe different in different instances of same design scheme. The paper emphasis on how to evaluate and optimize a design scheme with flexible constraints based on the satisfaction degree function defined on flexible constraints. The conception of flexible constraint is used to solve constraint conflict and design optimization in complicated constraint-based assembly design by the PFM parametrization assembly design system. An instance of gear-box design is used for verifying optimization method.

  16. Can anonymous posters on medical forums be reidentified?

    Science.gov (United States)

    Bobicev, Victoria; Sokolova, Marina; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-10-03

    Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. The messages were labeled by nicknames of the forum participants. We evaluated the system's performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post anonymously about the likelihood of their identity being

  17. Mo-Si-B-Based Coatings for Ceramic Base Substrates

    Science.gov (United States)

    Perepezko, John Harry (Inventor); Sakidja, Ridwan (Inventor); Ritt, Patrick (Inventor)

    2015-01-01

    Alumina-containing coatings based on molybdenum (Mo), silicon (Si), and boron (B) ("MoSiB coatings") that form protective, oxidation-resistant scales on ceramic substrate at high temperatures are provided. The protective scales comprise an aluminoborosilicate glass, and may additionally contain molybdenum. Two-stage deposition methods for forming the coatings are also provided.

  18. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces corresponding formal rules, rule-based reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally, the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-oriented product data management (PDM) system.

  19. Carbon nanotube based functional superhydrophobic coatings

    Science.gov (United States)

    Sethi, Sunny

    The main objective of this dissertation is synthesis of carbon nanotube (CNT) based superhydrophobic materials. The materials were designed such that electrical and mechanical properties of CNTs could be combined with superhydrophobicity to create materials with unique properties, such as self-cleaning adhesives, miniature flotation devices, ice-repellant coatings, and coatings for heat transfer furnaces. The coatings were divided into two broad categories based on CNT structure: Vertically aligned CNT arrays (VA coatings) and mesh-like (non-aligned) carbon nanotube arrays (NA coatings). VA coatings were used to create self-cleaning adhesives and flexible field emission devices. Coatings with self cleaning property along with high adhesiveness were inspired from structure found on gecko foot. Gecko foot is covered with thousands of microscopic hairs called setae; these setae are further divided into hundreds of nanometer sized hairs called spatulas. When gecko presses its foot against any surface, these hairs bend and conform to the topology of the surface resulting into very large area of contact. Such large area of intimate contact allows geckos to adhere to surfaces using van der Waals (vdW) interactions alone. VA-CNTs adhere to a variety of surfaces using a similar mechanism. CNTs of suitable diameter could withstand four times higher adhesion force than gecko foot. We found that upon soiling these CNT based adhesives (gecko tape) could be cleaned using a water droplet (lotus effect) or by applying vibrations. These materials could be used for applications requiring reversible adhesion. VA coatings were also used for developing field emission devices. A single CNT can emit electrons at very low threshold voltages. Achieving efficient electron emission on large scale has a lot of challenges such as screening effect, pull-off and lower current efficiency. We have explored the use of polymer-CNT composite structures to overcome these challenges in this work. NA

  20. k-Degree Anonymity Model for Social Network Data Publishing

    Directory of Open Access Journals (Sweden)

    MACWAN, K. R.

    2017-11-01

    Full Text Available Publicly accessible platform for social networking has gained special attraction because of its easy data sharing. Data generated on such social network is analyzed for various activities like marketing, social psychology, etc. This requires preservation of sensitive attributes before it becomes easily accessible. Simply removing the personal identities of the users before publishing data is not enough to maintain the privacy of the individuals. The structure of the social network data itself reveals much information regarding its users and their connections. To resolve this problem, k-degree anonymous method is adopted. It emphasizes on the modification of the graph to provide at least k number of nodes that contain the same degree. However, this approach is not efficient on a huge amount of social data and the modification of the original data fails to maintain data usefulness. In addition to this, the current anonymization approaches focus on a degree sequence-based graph model which leads to major modification of the graph topological properties. In this paper, we have proposed an improved k-degree anonymity model that retain the social network structural properties and also to provide privacy to the individuals. Utility measurement approach for community based graph model is used to verify the performance of the proposed technique.

  1. A framework for automatically checking anonymity with μ CRL

    OpenAIRE

    Chothia, T.; Orzan, S.M.; Pang, J.; Torabi Dashti, M.; Montanari, U.; Sannella, D.; Bruni, R.

    2007-01-01

    We present a powerful and flexible method for automatically checking anonymity in a possibilistic general-purpose process algebraic verification toolset. We propose new definitions of a choice anonymity degree and a player anonymity degree, to quantify the precision with which an intruder is able to single out the true originator of a given event or to associate the right event to a given protocol participant. We show how these measures of anonymity can be automatically calculated from a prot...

  2. k-Times Anonymous Authentication

    Science.gov (United States)

    Teranishi, Isamu; Furukawa, Jun; Sako, Kazue

    We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

  3. Authority and Hierarchy within Anonymous Internet Relay Chat Networks

    Directory of Open Access Journals (Sweden)

    Stewart Kenton Bertram

    2015-09-01

    Full Text Available 'The protest group Anonymous has emerged as one of the most significant social movements of recent years, announcing their arrival as a globally recognized brand with regular disruptive cyber attacks and the leak of large volumes of sensitive data. Despite the obvious significance of Anonymous, to date, little academic research has been focused on what role hierarchy and internal authority play (if any within the group. Bespoke software was used to structure over 5000 examples of IRC log files, so that a base line descriptive statistical picture could be drawn, as well as a more granular enumeration of the privileges associated with individual users.'

  4. Simplifying Itai-Rodeh Leader Election for Anonymous Rings

    NARCIS (Netherlands)

    Fokkink, W.J.; Pang, J.

    2005-01-01

    We present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh [A. Itai and M. Rodeh. Symmetry breaking in distributive networks. In Proc. FOCS'81, pp. 150-158. IEEE Computer Society, 1981]. In contrast to the

  5. Proxies for Anonymous Routing

    National Research Council Canada - National Science Library

    Reed, Michael G; Syverson, Paul F; Goldschlag, David M

    1996-01-01

    ...), and file transfers (FTP) have been implemented. Onion routing provides application independent, real-time, and bi-directional anonymous connections that are resistant to both eavesdropping and traffic analysis...

  6. Is it OK to be an Anonymous?

    NARCIS (Netherlands)

    Serracino Inglott, P.

    2013-01-01

    Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as

  7. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far'few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces correaponding formal rules, rulebased reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally,the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-ori-ented product data management (PDM) system.

  8. Between control and hacker activism: the political actions of Anonymous Brasil.

    Science.gov (United States)

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.

  9. HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms

    Directory of Open Access Journals (Sweden)

    Campos Javier

    2011-01-01

    Full Text Available Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, some minimum performance levels must be achieved for any solution to be practical and become widely adopted. In this paper, we propose and implement HOP, a novel solution based on cryptographic Host Identity Protocol (HIP that offers security and user-level anonymity in MANET environments while maintaining good performance levels. In particular, we introduce enhancements to the authentication process to achieve Host Identity Tag (HIT relationship anonymity, along with source/destination HIT anonymity when combined with multihoming. Afterward we detail how we integrate our improved version of HIP with the OLSR routing protocol to achieve efficient support for pseudonyms. We implemented our proposal in an experimental testbed, and the results obtained show that performance levels achieved are quite good, and that the integration with OLSR is achieved with a low overhead.

  10. Development of wear-resistant coatings for cobalt-base alloys

    International Nuclear Information System (INIS)

    Cockeram, B.V.

    1999-01-01

    The costs and hazards resulting from nuclear plant radiation exposure with activated cobalt wear debris could potentially be reduced by covering the cobalt-base materials with a wear resistant coating. However, the hardnesses of many cobalt-base wear alloys are significantly lower than conventional PVD hard coatings, and mechanical support of the hard coating is a concern. Four approaches have been taken to minimize the hardness differences between the substrate and PVD hard coating: (1) use a thin Cr-nitride hard coating with layers that are graded with respect to hardness, (2) use a thicker, multilayered coating (Cr-nitride or Zr-nitride) with graded layers, (3) use nitriding to harden the alloy subsurface followed by application of a multilayered coating of Cr-nitride, and (4) use of nitriding alone. Since little work has been done on application of PVD hard coatings to cobalt-base alloys, some details on process development and characterization of the coatings is presented. Scratch testing was used to evaluate the adhesion of the different coatings. A bench-top rolling contact test was used to evaluate the wear resistance of the coatings. The test results are discussed, and the more desirable coating approaches are identified

  11. Key Durability Issues with Mullite-Based Environmental Barrier Coatings for Si-Based Ceramics

    Science.gov (United States)

    Lee, Kang N.

    2000-01-01

    Plasma-sprayed mullite (3Al2O3.2SiO2) and mullite/yttria-stabilized-zirconia (YSZ) dual layer coatings have been developed to protect silicon -based ceramics from environmental attack. Mullite-based coating systems show excellent durability in air. However, in combustion environments, corrosive species such as molten salt or water vapor penetrate through cracks in the coating and attack the Si-based ceramics along the interface. Thus the modification of the coating system for enhanced crack-resistance is necessary for long-term durability in combustion environments. Other key durability issues include interfacial contamination and coating/substrate bonding. Interfacial contamination leads to enhanced oxidation and interfacial pore formation, while a weak coating/substrate bonding leads to rapid attack of the interface by corrosive species, both of which can cause a premature failure of the coating. Interfacial contamination can be minimized by limiting impurities in coating and substrate materials. The interface may be modified to improve the coating/substrate bond.

  12. Thermal insulation coating based on water-based polymer dispersion

    Directory of Open Access Journals (Sweden)

    Panchenko Iuliia

    2018-01-01

    Full Text Available For Russia, due to its long winter period, improvement of thermal insulation properties of envelope structures by applying thermal insulation paint and varnish coating to its inner surface is considered perspective. Thermal insulation properties of such coatings are provided by adding aluminosilicate microspheres and aluminum pigment to their composition. This study was focused on defining the effect of hollow aluminosilicate microspheres and aluminum pigment on the paint thermal insulation coating based on water-based polymer dispersion and on its optimum filling ratio. The optimum filling ratio was determined using the method of critical pigment volume concentration (CPVC. The optimum filling ratio was found equal to 55%.

  13. The Effects of Perceived Anonymity on Altruistic Punishment

    Directory of Open Access Journals (Sweden)

    Jared Piazza

    2008-07-01

    Full Text Available Previous studies investigating altruistic punishment have confounded the effects of two independent variables: information transmission (or breach of privacy and personal identification (or breach of anonymity. Here we report findings from a brief study in which participants were asked to respond to a social norm violation (i.e., an anonymous actor had behaved selfishly in an economic game by deciding whether to sacrifice their own endowment to punish this person. A third of the participants were told that their economic decisions would be made known to another player but could not be identified (privacy breach condition, whereas another third were informed that their decision as well as their names would be made known (anonymity breach condition. (The decisions of control participants were completely anonymous and private. Participants also justified their economic decisions and reported their emotional experiences. The results were participants punished most in the privacy and anonymity breach conditions and least in the control condition. These findings have implications for existing evolutionary accounts of altruistic punishment.

  14. Carbon-based sputtered coatings for enhanced chitosan-based films properties

    Science.gov (United States)

    Fernandes, C.; Calderon V., S.; Ballesteros, Lina F.; Cerqueira, Miguel A.; Pastrana, L. M.; Teixeira, José A.; Ferreira, P. J.; Carvalho, S.

    2018-03-01

    In order to make bio-based packaging materials competitive in comparison to petroleum-based one, some of their properties need to be improved, among which gas permeability is of crucial importance. Thus, in this work, carbon-based coatings were applied on chitosan-based films by radiofrequency reactive magnetron sputtering aiming to improve their barrier properties. Chemical and morphological properties were evaluated in order to determine the effect of the coatings on the chemical structure, surface hydrophobicity and barrier properties of the system. Chemical analysis, performed by electron energy loss spectroscopy and Fourier transform infrared spectroscopy, suggests similar chemical characteristics among all coatings although higher incorporation of hydrogen as the acetylene flux increases was observed. On the other hand, scanning transmission electron microscopy revealed that the porosity of the carbon layer can be tailored by the acetylene flux. More importantly, the chitosan oxygen permeability showed a monotonic reduction as a function of the acetylene flux. This study opens up new opportunities to apply nanostructured coatings on bio-based polymer for enhanced oxygen barrier properties.

  15. Anonymizing patient genomic data for public sharing association studies.

    Science.gov (United States)

    Fernandez-Lozano, Carlos; Lopez-Campos, Guillermo; Seoane, Jose A; Lopez-Alonso, Victoria; Dorado, Julian; Martín-Sanchez, Fernando; Pazos, Alejandro

    2013-01-01

    The development of personalized medicine is tightly linked with the correct exploitation of molecular data, especially those associated with the genome sequence along with these use of genomic data there is an increasing demand to share these data for research purposes. Transition of clinical data to research is based in the anonymization of these data so the patient cannot be identified, the use of genomic data poses a great challenge because its nature of identifying data. In this work we have analyzed current methods for genome anonymization and propose a one way encryption method that may enable the process of genomic data sharing accessing only to certain regions of genomes for research purposes.

  16. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    OpenAIRE

    Feng Tao; Zhao Ming-Tao

    2017-01-01

    Tor (The Second Onion Router) is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was use...

  17. Data Retention and Anonymity Services

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  18. Export constraints facing Lesotho-based manufacturing enterprises

    Directory of Open Access Journals (Sweden)

    Motšelisi C. Mokhethi

    2015-07-01

    Full Text Available Orientation: Exporting is preferred by many enterprises as the mode of foreign entry as it requires less commitment of organisational resources and offers flexibility of managerial actions. However, enterprises face a number of challenges when attempting to initiate exports or expand their export operations. Research purpose: This study was undertaken to determine the characteristics and composition of export barriers constraining exporting by Lesotho-based manufacturing enterprises. Motivation for the study: Lesotho is faced with low destination diversity and low diversity in export products. Research design, approach and method: Data was collected from 162 Lesotho-based manufacturing enterprises through a self-administered questionnaire. Main findings: In its findings, the study firstly identified international constraints, distribution constraints and financial constraints as factors constraining exporting. Secondly, it was determined that three exporting constraints, all internal to the enterprise and all related to one factor (namely financial constraint hampered exporting. Lastly, the ANOVA results revealed that the perceptions of export constraints differed according to the enterprise characteristics, enterprise size, ownership and type of industry. Contribution/value-add: With the majority of enterprises in this study being identified as micro-enterprises, the government of Lesotho needs to pay particular attention to addressing the export needs of these enterprises in order to enable them to participate in exporting activities − especially considering that they can play a pivotal role in the alleviation of poverty, job creation and economic rejuvenation.

  19. LPPS: A Distributed Cache Pushing Based K-Anonymity Location Privacy Preserving Scheme

    Directory of Open Access Journals (Sweden)

    Ming Chen

    2016-01-01

    Full Text Available Recent years have witnessed the rapid growth of location-based services (LBSs for mobile social network applications. To enable location-based services, mobile users are required to report their location information to the LBS servers and receive answers of location-based queries. Location privacy leak happens when such servers are compromised, which has been a primary concern for information security. To address this issue, we propose the Location Privacy Preservation Scheme (LPPS based on distributed cache pushing. Unlike existing solutions, LPPS deploys distributed cache proxies to cover users mostly visited locations and proactively push cache content to mobile users, which can reduce the risk of leaking users’ location information. The proposed LPPS includes three major process. First, we propose an algorithm to find the optimal deployment of proxies to cover popular locations. Second, we present cache strategies for location-based queries based on the Markov chain model and propose update and replacement strategies for cache content maintenance. Third, we introduce a privacy protection scheme which is proved to achieve k-anonymity guarantee for location-based services. Extensive experiments illustrate that the proposed LPPS achieves decent service coverage ratio and cache hit ratio with lower communication overhead compared to existing solutions.

  20. Carbon nanotube-based black coatings

    Science.gov (United States)

    Lehman, J.; Yung, C.; Tomlin, N.; Conklin, D.; Stephens, M.

    2018-03-01

    Coatings comprising carbon nanotubes are very black, that is, characterized by uniformly low reflectance over a broad range of wavelengths from the visible to far infrared. Arguably, there is no other material that is comparable. This is attributable to the intrinsic properties of graphitic material as well as the morphology (density, thickness, disorder, and tube size). We briefly describe a history of other coatings such as nickel phosphorous, gold black, and carbon-based paints and the comparable structural morphology that we associate with very black coatings. The need for black coatings is persistent for a variety of applications ranging from baffles and traps to blackbodies and thermal detectors. Applications for space-based instruments are of interest and we present a review of space qualification and the results of outgassing measurements. Questions of nanoparticle safety depend on the nanotube size and aspect ratio as well as the nature and route of exposure. We describe the growth of carbon nanotube forests along with the catalyst requirements and temperature limitations. We also describe coatings derived from carbon nanotubes and applied like paint. Building the measurement apparatus and determining the optical properties of something having negligible reflectance are challenging and we summarize the methods and means for such measurements. There exists information in the literature for effective media approximations to model the dielectric function of vertically aligned arrays. We summarize this along with the refractive index of graphite from the literature that is necessary for modeling the optical properties. In our experience, the scientific questions can be overshadowed by practical matters, so we provide an appendix of recipes for making as-grown and sprayed coatings along with an example of reflectance measurements.

  1. Security Analysis of Accountable Anonymous Group Communication in Dissent

    Science.gov (United States)

    2013-01-31

    instance, group discussion forums or instant messaging. Misbehaving users may abuse this anonymity to disrupt communication, however, and existing...Abstract Users often wish to communicate anonymously on the Internet using, for instance, group discussion forums or instant messaging. Misbehaving users may...personal reprisal (Stein 2003). Yet anonymity makes it difficult to trace or exclude misbehaving participants (Davenport 2002). Online proto- cols

  2. What affects your MS? Responses to an anonymous, Internet-based epidemiological survey.

    Science.gov (United States)

    Simmons, Rex D; Ponsonby, Anne-Louise; van der Mei, Ingrid A F; Sheridan, Peter

    2004-04-01

    Evolving information technology has raised the possibility of new methods of data collection in multiple sclerosis (MS) research. An anonymous, self-report, Internet-based survey was developed, which asked people with MS their opinion on how various extrinsic factors affected their condition. From September 2001 to July 2002, a total of 2529 people completed the questionnaire. The demographic and clinical profiles of the anonymous respondents indicated that most were likely to have MS. Common factors reported as beneficial were cannabis, cold baths, meditation and dietary factors. Common adverse factors reported were high stress, exposure to high temperatures and viral infections. There was an increasing report of high temperatures as being adverse with increasing respondent age (test for trend, P < 0.001). The adverse report of high temperatures correlated significantly with the report of strong sunlight apparently making MS worse (r = 0.35, P < 0.0001). In Australia, high temperatures were more likely to be reported as adverse in warmer, lower latitude regions. The association between strong sunlight as adverse and age or region did not persist after adjustment for high temperatures. Thus, this apparent adverse factor appeared to relate to solar heat, not solar light. People with MS may risk vitamin D deficiency because of sun avoidance due to heat-related fatigue or intolerance. This is of clinical significance not only for bone health but because vitamin D may have beneficial immunomodulatory properties. The present study provides new information from people with MS on factors that may influence symptoms or clinical course. This information will now be used in the design of formal epidemiological cohort studies.

  3. An adaptive ES with a ranking based constraint handling strategy

    Directory of Open Access Journals (Sweden)

    Kusakci Ali Osman

    2014-01-01

    Full Text Available To solve a constrained optimization problem, equality constraints can be used to eliminate a problem variable. If it is not feasible, the relations imposed implicitly by the constraints can still be exploited. Most conventional constraint handling methods in Evolutionary Algorithms (EAs do not consider the correlations between problem variables imposed by the constraints. This paper relies on the idea that a proper search operator, which captures mentioned implicit correlations, can improve performance of evolutionary constrained optimization algorithms. To realize this, an Evolution Strategy (ES along with a simplified Covariance Matrix Adaptation (CMA based mutation operator is used with a ranking based constraint-handling method. The proposed algorithm is tested on 13 benchmark problems as well as on a real life design problem. The outperformance of the algorithm is significant when compared with conventional ES-based methods.

  4. The roles of constraint-based and dedication-based influences on user's continued online shopping behavior.

    Science.gov (United States)

    Chang, Su-Chao; Chou, Chi-Min

    2012-11-01

    The objective of this study was to determine empirically the role of constraint-based and dedication-based influences as drivers of the intention to continue using online shopping websites. Constraint-based influences consist of two variables: trust and perceived switching costs. Dedication-based influences consist of three variables: satisfaction, perceived usefulness, and trust. The current results indicate that both constraint-based and dedication-based influences are important drivers of the intention to continue using online shopping websites. The data also shows that trust has the strongest total effect on online shoppers' intention to continue using online shopping websites. In addition, the results indicate that the antecedents of constraint-based influences, technical bonds (e.g., perceived operational competence and perceived website interactivity) and social bonds (e.g., perceived relationship investment, community building, and intimacy) have indirect positive effects on the intention to continue using online shopping websites. Based on these findings, this research suggests that online shopping websites should build constraint-based and dedication-based influences to enhance user's continued online shopping behaviors simultaneously.

  5. Enforcement of entailment constraints in distributed service-based business processes.

    Science.gov (United States)

    Hummer, Waldemar; Gaubatz, Patrick; Strembeck, Mark; Zdun, Uwe; Dustdar, Schahram

    2013-11-01

    A distributed business process is executed in a distributed computing environment. The service-oriented architecture (SOA) paradigm is a popular option for the integration of software services and execution of distributed business processes. Entailment constraints, such as mutual exclusion and binding constraints, are important means to control process execution. Mutually exclusive tasks result from the division of powerful rights and responsibilities to prevent fraud and abuse. In contrast, binding constraints define that a subject who performed one task must also perform the corresponding bound task(s). We aim to provide a model-driven approach for the specification and enforcement of task-based entailment constraints in distributed service-based business processes. Based on a generic metamodel, we define a domain-specific language (DSL) that maps the different modeling-level artifacts to the implementation-level. The DSL integrates elements from role-based access control (RBAC) with the tasks that are performed in a business process. Process definitions are annotated using the DSL, and our software platform uses automated model transformations to produce executable WS-BPEL specifications which enforce the entailment constraints. We evaluate the impact of constraint enforcement on runtime performance for five selected service-based processes from existing literature. Our evaluation demonstrates that the approach correctly enforces task-based entailment constraints at runtime. The performance experiments illustrate that the runtime enforcement operates with an overhead that scales well up to the order of several ten thousand logged invocations. Using our DSL annotations, the user-defined process definition remains declarative and clean of security enforcement code. Our approach decouples the concerns of (non-technical) domain experts from technical details of entailment constraint enforcement. The developed framework integrates seamlessly with WS-BPEL and the Web

  6. Route constraints model based on polychromatic sets

    Science.gov (United States)

    Yin, Xianjun; Cai, Chao; Wang, Houjun; Li, Dongwu

    2018-03-01

    With the development of unmanned aerial vehicle (UAV) technology, the fields of its application are constantly expanding. The mission planning of UAV is especially important, and the planning result directly influences whether the UAV can accomplish the task. In order to make the results of mission planning for unmanned aerial vehicle more realistic, it is necessary to consider not only the physical properties of the aircraft, but also the constraints among the various equipment on the UAV. However, constraints among the equipment of UAV are complex, and the equipment has strong diversity and variability, which makes these constraints difficult to be described. In order to solve the above problem, this paper, referring to the polychromatic sets theory used in the advanced manufacturing field to describe complex systems, presents a mission constraint model of UAV based on polychromatic sets.

  7. Anonymity communication VPN and Tor: a comparative study

    Science.gov (United States)

    Ramadhani, E.

    2018-03-01

    VPN and Tor is a technology based on anonymity communication. These two technologies have their advantage and disadvantage. The objective of this paper is to find the difference between VPN and Tor technologies by comparing their security of communication on the public network based on the CIA triad concept. The comparative study in this paper is based on the survey method. At last, the result of this paper is a recommendation on when to use a VPN and Tor to secure communication

  8. Simulating non-holonomic constraints within the LCP-based simulation framework

    DEFF Research Database (Denmark)

    Ellekilde, Lars-Peter; Petersen, Henrik Gordon

    2006-01-01

    be incorporated directly, and derive formalism for how the non-holonomic contact constraints can be modelled as a combination of non-holonomic equality constraints and ordinary contacts constraints. For each of these three we are able to guarantee solvability, when using Lemke's algorithm. A number of examples......In this paper, we will extend the linear complementarity problem-based rigid-body simulation framework with non-holonomic constraints. We consider three different types of such, namely equality, inequality and contact constraints. We show how non-holonomic equality and inequality constraints can...... are included to demonstrate the non-holonomic constraints. Udgivelsesdato: Marts...

  9. Scratch induced failure of plasma sprayed alumina based coatings

    International Nuclear Information System (INIS)

    Hazra, S; Bandyopadhyay, P.P.

    2012-01-01

    Highlights: ► Scratch induced failure of alumina based coatings including nanostructured is reported. ► Ceramic is deposited on bond coat instead of steel, emulating a realistic situation. ► Lateral force data is supplemented with microscopy to observe coating failure. ► The failure mechanism during scratching has been identified. ► Critical load of failure has been calculated for each bond-top coat combination. -- Abstract: A set of plasma sprayed coatings were obtained from three alumina based top coat and two bond coat powders. Scratch test was undertaken on these coatings, under constant and linearly varying load. Test results include the lateral force data and scanning electron microscope (SEM) images. Failure occurred by large area spallation of the top coat and in most cases tensile cracks appeared on the exposed bond coat. The lateral force showed an increasing trend with an increase in normal load up to a certain point and beyond this, it assumed a steady average value. The locations of coating spallation and occurrence of maximum lateral force did not coincide. A bond coat did not show a significant role in determining the scratch adhesion strength.

  10. Corrosion performance of some titanium-based hard coatings

    International Nuclear Information System (INIS)

    Matthes, B.; Broszeit, E.; Aromaa, J.; Ronkainen, H.; Hannula, S.P.; Leyland, A.; Matthews, A.

    1991-01-01

    Tools and machine parts which could benefit from wear-resistant titanium-based hard films are often subject to corrosive environments. Physically vapour-deposited coatings frequently exhibit porosity and even small defects, which can cause rapid local corrosion of the substrate material; there is therefore a requirement for dense and chemically inert coatings. This paper presents corrosion data for titanium-based hard coatings such as TiN, (Ti, Al)N, Ti(B, N) and TiB 2 and also for multilayered structures where additional aluminium-based insulating surface layers (AlN and Al 2 O 3 ) were deposited. The corrosion resistance and porosity of the films were analysed by electrochemical techniques. The degree of metallic bonding can play a significant role in influencing the corrosion resistance of refractory transition-metal-based ceramic coatings. Here we demonstrate that, under potentiodynamic corrosion test conditions, resistance to corrosive attack was relatively poor for TiB 2 , better for (Ti, Al)N and Ti(B, N) and best for TiN. It is also shown that applying the additional protective aluminium-based insulating surface layers on the coating can further improve corrosion resistance. (orig.)

  11. Vote to link: Recovering from misbehaving anonymous users

    NARCIS (Netherlands)

    Lueks, W.; Everts, M.H.; Hoepman, J.H.

    2016-01-01

    Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation,

  12. All or Nothing: The False Promise of Anonymity

    Directory of Open Access Journals (Sweden)

    Neil Walker

    2017-05-01

    Full Text Available In early 2016, the International Committee of Medical Journal Editors (ICMJE proposed that responsible sharing of de-identified individual-level data be required for clinical trials published in their affiliated journals. There would be a delay in implementing this policy to allow for the necessary informed consents to work their way through ethical review. Meanwhile, some researchers and policy makers have conflated the notions of de-identification and anonymity. The former is a process that seeks to mitigate disclosure risk though careful application of rules and statistical analysis, while the latter is an absolute state. The consequence of confusing the process and the state is profound. Extensions to the ICMJE proposal based on the presumed anonymity of data include: sharing unconsented data; sharing data without managing access, as Open Data; and proposals to sell data. This essay aims to show that anonymity (the state cannot be guaranteed by de-identification (the process, and so these extensions to the ICMJE proposal should be rejected on governance grounds, if no other. This is not as negative a position as it might seem, as other disciplines have been aware of these limitations and concomitant responsibilities for many years. The essay concludes with an example from social science of managed access strategies that could be adopted by the medical field.

  13. Anonymous Agencies, Backstreet Businesses and Covert Collectives

    DEFF Research Database (Denmark)

    Krause Hansen, Hans; Schoeneborn, Dennis

    2015-01-01

    Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381......Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381...

  14. Adhesion between coating layers based on epoxy and silicone

    DEFF Research Database (Denmark)

    Svendsen, Jacob R.; Kontogeorgis, Georgios; Kiil, Søren

    2007-01-01

    The adhesion between a silicon tie-coat and epoxy primers, used in marine coating systems, has been studied in this work. Six epoxy coatings (with varying chain lengths of the epoxy resins), some of which have shown problems with adhesion to the tie-coat during service life, have been considered....... The experimental investigation includes measurements of the surface tension of the tie-coat and the critical surface tensions of the epoxies, topographic investigation of the surfaces of cured epoxy coatings via atomic force microscopy (AFM), and pull-off tests for investigating the strength of adhesion...... to the silicon/epoxy systems. Calculations for determining the roughness factor of the six epoxy coatings (based on the AFM topographies) and the theoretical work of adhesion have been carried out. The coating surfaces are also characterized based on the van Oss-Good theory. Previous studies on the modulus...

  15. Development of Aloe vera based edible coating for tomato

    Science.gov (United States)

    Athmaselvi, K. A.; Sumitha, P.; Revathy, B.

    2013-12-01

    The effect of formulated Aloe vera based edible coating on mass loss, colour, firmness, pH, acidity, total soluble solid, ascorbic acid and lycopene on the coated tomato was investigated. The tomato in control showed a rapid deterioration with an estimated shelf life period of 19 days, based on the mass loss, colour changes, accelerated softening and ripening. On the contrary, the coating on tomatoes delayed the ripening and extended the shelf life up to 39 days. The physiological loss in weight was 7.6 and 15.1%, firmness was 36 and 46.2 N on 20th day for control and coated tomatoes, respectively. From the results, it was concluded that the use of Aloe vera based edible coating leads to increased tomato shelf-life.

  16. Really not god: Secularization and pragmatism in Gamblers Anonymous.

    Science.gov (United States)

    Browne, B R

    1994-09-01

    The paper argues that despite maintaining the image of a twelve-step organization, the central theme of the history of Gamblers Anonymous (GA) in the United States is the increasing secularization of the program of the recovery. The paper documents the increasing secularization and pragmatism of Gamblers Anonymous, as reflected in key documents, despite the spiritual vision of its founding member. The author speculates on why Gamblers Anonymous took a secularized development path. Further research is called for.

  17. Constraint-based solver for the Military unit path finding problem

    CSIR Research Space (South Africa)

    Leenen, L

    2010-04-01

    Full Text Available -based approach because it requires flexibility in modelling. The authors formulate the MUPFP as a constraint satisfaction problem and a constraint-based extension of the search algorithm. The concept demonstrator uses a provided map, for example taken from Google...

  18. Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation

    Directory of Open Access Journals (Sweden)

    Jia Yaoqi

    2016-10-01

    Full Text Available The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai, which enables clients to cache and distribute web content on behalf of a website. Peer-assisted CDNs bring significant bandwidth savings to website operators and reduce network latency for users. In this work, we show that the current designs of peer-assisted CDNs expose clients to privacy-invasive attacks, enabling one client to infer the set of browsed resources of another client. To alleviate this, we propose an anonymous peer-assisted CDN (APAC, which employs content delivery while providing initiator anonymity (i.e., hiding who sends the resource request and responder anonymity (i.e., hiding who responds to the request for peers. APAC can be a web service, compatible with current browsers and requiring no client-side changes. Our anonymity analysis shows that our APAC design can preserve a higher level of anonymity than state-of-the-art peer-assisted CDNs. In addition, our evaluation demonstrates that APAC can achieve desired performance gains.

  19. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

    Directory of Open Access Journals (Sweden)

    Kai Chain

    2016-11-01

    Full Text Available Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user’s home agent in the authentication phase. By using this information, the attacker can mount distributed denial-of-service attacks in the roaming phase through replay attacks targeting the network’s foreign agent and mobile user’s home agent by using their corresponding session keys. Li’s method also has some shortcomings regarding anonymity that we aim to address. To overcome these issues, this study proposes an elliptic curve–based wireless roaming anonymous login method for the authentication phase. The problems faced in the roaming phase are resolved, and this approach provides balanced session key computation between senders and receivers. Burrows-Abadi-Needham logic (BAN-logic is used to verify the security of the proposed scheme. The proposed scheme affords good security, efficiency, and integrity and maintains anonymity.

  20. Model-based analysis of thermal insulation coatings

    DEFF Research Database (Denmark)

    Kiil, Søren

    2014-01-01

    Thermal insulation properties of coatings based on selected functional filler materials are investigated. The underlying physics, thermal conductivity of a heterogeneous two-component coating, and porosity and thermal conductivity of hollow spheres (HS) are quantified and a mathematical model for...

  1. An Anonymous Credit Card System

    Science.gov (United States)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  2. HOROPLAN: computer-assisted nurse scheduling using constraint-based programming.

    Science.gov (United States)

    Darmoni, S J; Fajner, A; Mahé, N; Leforestier, A; Vondracek, M; Stelian, O; Baldenweck, M

    1995-01-01

    Nurse scheduling is a difficult and time consuming task. The schedule has to determine the day to day shift assignments of each nurse for a specified period of time in a way that satisfies the given requirements as much as possible, taking into account the wishes of nurses as closely as possible. This paper presents a constraint-based, artificial intelligence approach by describing a prototype implementation developed with the Charme language and the first results of its use in the Rouen University Hospital. Horoplan implements a non-cyclical constraint-based scheduling, using some heuristics. Four levels of constraints were defined to give a maximum of flexibility: French level (e.g. number of worked hours in a year), hospital level (e.g. specific day-off), department level (e.g. specific shift) and care unit level (e.g. specific pattern for week-ends). Some constraints must always be verified and can not be overruled and some constraints can be overruled at a certain cost. Rescheduling is possible at any time specially in case of an unscheduled absence.

  3. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    Science.gov (United States)

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure.

  4. Cloud Based Data Protection in Anonymously Controlled SDN

    Directory of Open Access Journals (Sweden)

    Jian Shen

    2018-01-01

    Full Text Available Nowadays, Software Defined Network (SDN develops rapidly for its novel structure which separates the control plane and the data plane of network devices. Many researchers devoted themselves to the study of such a special network. However, some limitations restrict the development of SDN. On the one hand, the single controller in the conventional model bears all threats, and the corruption of it will result in network paralysis. On the other hand, the data will be increasing more in SDN switches in the data plane, while the storage space of these switches is limited. In order to solve the mentioned issues, we propose two corresponding protocols in this paper. Specifically, one is an anonymous protocol in the control plane, and the other is a verifiable outsourcing protocol in the data plane. The evaluation indicates that our protocol is correct, secure, and efficient.

  5. Authentic Attributes with Fine-Grained Anonymity Protection

    Science.gov (United States)

    2000-01-01

    registrations and ecommerce trans- Preprint - 2 Stuart G. Stubblebine, and Paul F. Syverson. Authentic Attributes with Fine-Grained Anonymity Protection...driver’s license and birth certi cate. When the registration process is complete, certi cates could be on a smart card that the customer is carrying. The...proof. At least initially, it might not be electronic, e.g., possession of a passport, of a driver’s license and birth certi cate, etc. Anonymous

  6. Constraints based analysis of extended cybernetic models.

    Science.gov (United States)

    Mandli, Aravinda R; Venkatesh, Kareenhalli V; Modak, Jayant M

    2015-11-01

    The cybernetic modeling framework provides an interesting approach to model the regulatory phenomena occurring in microorganisms. In the present work, we adopt a constraints based approach to analyze the nonlinear behavior of the extended equations of the cybernetic model. We first show that the cybernetic model exhibits linear growth behavior under the constraint of no resource allocation for the induction of the key enzyme. We then quantify the maximum achievable specific growth rate of microorganisms on mixtures of substitutable substrates under various kinds of regulation and show its use in gaining an understanding of the regulatory strategies of microorganisms. Finally, we show that Saccharomyces cerevisiae exhibits suboptimal dynamic growth with a long diauxic lag phase when growing on a mixture of glucose and galactose and discuss on its potential to achieve optimal growth with a significantly reduced diauxic lag period. The analysis carried out in the present study illustrates the utility of adopting a constraints based approach to understand the dynamic growth strategies of microorganisms. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  7. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    Science.gov (United States)

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace.

  8. What Does Anonymization Mean? DataSHIELD and the Need for Consensus on Anonymization Terminology.

    Science.gov (United States)

    Wallace, Susan E

    2016-06-01

    Anonymization is a recognized process by which identifiers can be removed from identifiable data to protect an individual's confidentiality and is used as a standard practice when sharing data in biomedical research. However, a plethora of terms, such as coding, pseudonymization, unlinked, and deidentified, have been and continue to be used, leading to confusion and uncertainty. This article shows that this is a historic problem and argues that such continuing uncertainty regarding the levels of protection given to data risks damaging initiatives designed to assist researchers conducting cross-national studies and sharing data internationally. DataSHIELD and the creation of a legal template are used as examples of initiatives that rely on anonymization, but where the inconsistency in terminology could hinder progress. More broadly, this article argues that there is a real possibility that there could be possible damage to the public's trust in research and the institutions that carry it out by relying on vague notions of the anonymization process. Research participants whose lack of clear understanding of the research process is compensated for by trusting those carrying out the research may have that trust damaged if the level of protection given to their data does not match their expectations. One step toward ensuring understanding between parties would be consistent use of clearly defined terminology used internationally, so that all those involved are clear on the level of identifiability of any particular set of data and, therefore, how that data can be accessed and shared.

  9. De-anonymizing Genomic Databases Using Phenotypic Traits

    Directory of Open Access Journals (Sweden)

    Humbert Mathias

    2015-06-01

    Full Text Available People increasingly have their genomes sequenced and some of them share their genomic data online. They do so for various purposes, including to find relatives and to help advance genomic research. An individual’s genome carries very sensitive, private information such as its owner’s susceptibility to diseases, which could be used for discrimination. Therefore, genomic databases are often anonymized. However, an individual’s genotype is also linked to visible phenotypic traits, such as eye or hair color, which can be used to re-identify users in anonymized public genomic databases, thus raising severe privacy issues. For instance, an adversary can identify a target’s genome using known her phenotypic traits and subsequently infer her susceptibility to Alzheimer’s disease. In this paper, we quantify, based on various phenotypic traits, the extent of this threat in several scenarios by implementing de-anonymization attacks on a genomic database of OpenSNP users sequenced by 23andMe. Our experimental results show that the proportion of correct matches reaches 23% with a supervised approach in a database of 50 participants. Our approach outperforms the baseline by a factor of four, in terms of the proportion of correct matches, in most scenarios. We also evaluate the adversary’s ability to predict individuals’ predisposition to Alzheimer’s disease, and we observe that the inference error can be halved compared to the baseline. We also analyze the effect of the number of known phenotypic traits on the success rate of the attack. As progress is made in genomic research, especially for genotype-phenotype associations, the threat presented in this paper will become more serious.

  10. A constraint-based approach to intelligent support of nuclear reactor design

    International Nuclear Information System (INIS)

    Furuta, Kazuo

    1993-01-01

    Constraint is a powerful representation to formulate and solve problems in design; a constraint-based approach to intelligent support of nuclear reactor design is proposed. We first discuss the features of the approach, and then present the architecture of a nuclear reactor design support system under development. In this design support system, the knowledge base contains constraints useful to structure the design space as object class definitions, and several types of constraint resolvers are provided as design support subsystems. The adopted method of constraint resolution are explained in detail. The usefulness of the approach is demonstrated using two design problems: Design window search and multiobjective optimization in nuclear reactor design. (orig./HP)

  11. Development of wear-resistant coatings for cobalt-base alloys

    International Nuclear Information System (INIS)

    Cockeram, B.V.

    1999-01-01

    The level of nuclear plant radiation exposure due to activated cobalt wear debris could potentially be reduced by covering the cobalt-base materials with a wear resistant coating. Laboratory pin-on-disc and rolling contact wear tests were used to evaluate the wear performance of several coatings. Based on the results of these tests, multilayer Cr-nitride coatings and ion nitriding are the most promising approaches

  12. [Comment on “Anonymous reviews: Self-serving, counterproductive, and unacceptable”] from R.E. Criss and A.M. Hofmeister

    Science.gov (United States)

    Criss, Robert E.; Hofmeister, Anne M.

    We share many of the experiences and most of the sentiments relayed by Myrl Beck in his 1 July contribution to the Eos Forum, as well as those of a similar nature expressed by Alexander McBirney in his March 2003 commentary in GSA Today. We are in fact delighted that senior scientists are speaking up about the unsatisfactory nature of anonymous reviews. However, we believe they understate the problems, partly because the situation is worsening with time. Moreover, the brunt of such problems is disproportionately felt not by emeritus professors but by young scientists, women, and minorities, and this is the crux of the issue.This year, we have, like Beck, received rejections based on comments by two anonymous reviewers and an anonymous associate editor. We have also received rejections from anonymous associate editors based on a single constructive review requesting minor revision, along with an anonymous hostile “review” that could have been written about any manuscript on any topic by any author. More common than these are rejections from identified associate editors based on one or two anonymous reviews, which more often than not err on most of the points made, and in two cases dispute work that resulted in Nobel Prizes. We have examples this year of each type where the senior authors are recent Ph.D.s, whose vulnerabilities underscore the reprehensible nature of this “process.”

  13. Is it OK to be an Anonymous?

    Directory of Open Access Journals (Sweden)

    Philip Serracino-Inglott

    2013-12-01

    Full Text Available Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition of vigilantism that includes reprobative punishment rather than violence as a key element, Anonymous are vigilantes. Many of its Ops can be justified in view of the mismatch between formal norm enforcement practice and Internet natives’ experience of it. Anons are more like eco-warriors than terrorists. While their actions are contentious, their force is framed in a vision of common good that is not unreasonable. Engaging with online deviants is shown to be a productive way of identifying the weaknesses in concepts underpinning moral evaluation of Internet-enabled phenomena.

  14. Oxidation resistance coating for niobium base structural composites

    International Nuclear Information System (INIS)

    Tabaru, T.; Shobu, K.; Kim, J.H.; Hirai, H.; Hanada, S.

    2003-01-01

    Oxidation behavior of Al-rich Mo(Si,Al) 2 base alloys, which is a candidate material for the oxidation resistance coating on Nb base structural composites, were investigated by thermogravimetry. The Mo(Si,Al) 2 base alloys containing Mo 5 (Si,Al) 3 up to about 10 vol% exhibits excellent oxidation resistance at temperatures ranging from 780 to 1580 K, particularly at 1580 K due to continuous Al 2 O 3 layer development. To evaluate the applicability of the Mo(Si,Al) 2 base coating, plasma spraying on Nb base composites were undertaken. However, interface reaction layer was found to form during the following heat treatment. Preparation of Mo(Si,Al) 2 /Al 2 O 3 /Nb layered structures via powder metallurgical process was attempted to preclude diffusion reaction between coating and substrate. (orig.)

  15. Final Technical Report CONDUCTIVE COATINGS FOR SOLAR CELLS USING CARBON NANOTUBES

    Energy Technology Data Exchange (ETDEWEB)

    Paul J Glatkowski; Jorma Peltola; Christopher Weeks; Mike Trottier; David Britz

    2007-09-30

    US Department of Energy (DOE) awarded a grant for Eikos Inc. to investigate the feasibility of developing and utilizing Transparent Conducting Coatings (TCCs) based on carbon nanotubes (CNT) for solar cell applications. Conventional solar cells today employ metal oxide based TCCs with both Electrical Resistivity (R) and Optical Transparency (T), commonly referred to as optoelectronic (RT) performance significantly higher than with those possible with CNT based TCCs available today. Transparent metal oxide based coatings are also inherently brittle requiring high temperature in vacuum processing and are thus expensive to manufacture. One such material is indium tin oxide (ITO). Global demand for indium has recently increased rapidly while supply has diminished causing substantial spikes in raw material cost and availability. In contrast, the raw material, carbon, needed for CNT fabrication is abundantly available. Transparent Conducting Coatings based on CNTs can overcome not only cost and availability constraints while also offering the ability to be applied by existing, low cost process technologies under ambient conditions. Processes thus can readily be designed both for rigid and flexible PV technology platforms based on mature spray or dip coatings for silicon based solar cells and continuous roll to roll coating processes for polymer solar applications.

  16. Optical Fiber Sensors Based on Nanoparticle-Embedded Coatings

    Directory of Open Access Journals (Sweden)

    Aitor Urrutia

    2015-01-01

    Full Text Available The use of nanoparticles (NPs in scientific applications has attracted the attention of many researchers in the last few years. The use of NPs can help researchers to tune the physical characteristics of the sensing coating (thickness, roughness, specific area, refractive index, etc. leading to enhanced sensors with response time or sensitivity better than traditional sensing coatings. Additionally, NPs also offer other special properties that depend on their nanometric size, and this is also a source of new sensing applications. This review focuses on the current status of research in the use of NPs within coatings in optical fiber sensing. Most used sensing principles in fiber optics are briefly described and classified into several groups: absorbance-based sensors, interferometric sensors, fluorescence-based sensors, fiber grating sensors, and resonance-based sensors, among others. For each sensor group, specific examples of the utilization of NP-embedded coatings in their sensing structure are reported.

  17. Correlation-based decimation in constraint satisfaction problems

    International Nuclear Information System (INIS)

    Higuchi, Saburo; Mezard, Marc

    2010-01-01

    We study hard constraint satisfaction problems using some decimation algorithms based on mean-field approximations. The message-passing approach is used to estimate, beside the usual one-variable marginals, the pair correlation functions. The identification of strongly correlated pairs allows to use a new decimation procedure, where the relative orientation of a pair of variables is fixed. We apply this novel decimation to locked occupation problems, a class of hard constraint satisfaction problems where the usual belief-propagation guided decimation performs poorly. The pair-decimation approach provides a significant improvement.

  18. Sea water Corrosion of Nickel based Plasma Spray Coating

    Science.gov (United States)

    Parida, M.; Nanda, S. P.; Bhuyan, S. K.; Mishra, S. C.

    2018-03-01

    Different types of erosion resistant coatings are applied/deposited on aero components, depending on the operating/working temperatures. Nickel based coating are applied on the air craft (compressor) components, which can sustain up to working temperature of 650°C. In the present investigation, to improve the compatibility between substrate (i.e. the machine component) and the top coat, application of bond coat is there. The application of Nickel based coating by thermal plasma spray technique has proven to be a satisfactory means of producing acceptable sealing surface with excellent abradability. Before the corrosion study, coated sample is subjected to hardness, thickness and porosity testing. Hence the result is being evaluated. The corrosion behavior of coating was studied by sea water immersion with a time period of 16 weeks. It is observed that, up to 9 weeks increase in weight of coating occurs in a sharp trend and then takes a decreasing trend. The weight gain of the samples has varied from 37.23% (with one week immersion in sea water) to a maximum of about 64.36% for six weeks immersion. Coating morphology and composition analysis of the coatings are studied using SEM and EDS. This behavior shows adsorption/deposition of the foreign particles with polygonal shape on the coating surface by sea water interaction. Foreign particles with polygonal shape deposited on the coating and with increase in immersion/treatment time, washing out of the deposited materials starts, which reflects the decreasing trend of weight gain of the specimen.

  19. Density-Based Clustering with Geographical Background Constraints Using a Semantic Expression Model

    Directory of Open Access Journals (Sweden)

    Qingyun Du

    2016-05-01

    Full Text Available A semantics-based method for density-based clustering with constraints imposed by geographical background knowledge is proposed. In this paper, we apply an ontological approach to the DBSCAN (Density-Based Geospatial Clustering of Applications with Noise algorithm in the form of knowledge representation for constraint clustering. When used in the process of clustering geographic information, semantic reasoning based on a defined ontology and its relationships is primarily intended to overcome the lack of knowledge of the relevant geospatial data. Better constraints on the geographical knowledge yield more reasonable clustering results. This article uses an ontology to describe the four types of semantic constraints for geographical backgrounds: “No Constraints”, “Constraints”, “Cannot-Link Constraints”, and “Must-Link Constraints”. This paper also reports the implementation of a prototype clustering program. Based on the proposed approach, DBSCAN can be applied with both obstacle and non-obstacle constraints as a semi-supervised clustering algorithm and the clustering results are displayed on a digital map.

  20. Traveling the Silk Road: A Measurement of a Large Anonymous Online Marketplace

    Science.gov (United States)

    2012-11-28

    Silk Road, an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather...analysis of Silk Road, an anonymous, international on- line marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We...anonymity, Silk Road needs to also preserve payment anonymity. To that effect, Silk Road only supports Bitcoin (BTC, [30]) as a trading currency

  1. A survey of anonymous peer-to-peer file-sharing

    NARCIS (Netherlands)

    Chothia, T.; Chatzikokolakis, K.; Enokido, T.; Yan, L.; Xiao, B.; Kim, D.; Dai, Y.S.; Yang, L.T.

    2005-01-01

    This paper provides a survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity. We start this survey by giving a brief description of the most popular methods of providing anonymous communication. These include the Ants protocol, Onion routing, Multicasting,

  2. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    Science.gov (United States)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  3. Cosmological constraints with clustering-based redshifts

    Science.gov (United States)

    Kovetz, Ely D.; Raccanelli, Alvise; Rahman, Mubdi

    2017-07-01

    We demonstrate that observations lacking reliable redshift information, such as photometric and radio continuum surveys, can produce robust measurements of cosmological parameters when empowered by clustering-based redshift estimation. This method infers the redshift distribution based on the spatial clustering of sources, using cross-correlation with a reference data set with known redshifts. Applying this method to the existing Sloan Digital Sky Survey (SDSS) photometric galaxies, and projecting to future radio continuum surveys, we show that sources can be efficiently divided into several redshift bins, increasing their ability to constrain cosmological parameters. We forecast constraints on the dark-energy equation of state and on local non-Gaussianity parameters. We explore several pertinent issues, including the trade-off between including more sources and minimizing the overlap between bins, the shot-noise limitations on binning and the predicted performance of the method at high redshifts, and most importantly pay special attention to possible degeneracies with the galaxy bias. Remarkably, we find that once this technique is implemented, constraints on dynamical dark energy from the SDSS imaging catalogue can be competitive with, or better than, those from the spectroscopic BOSS survey and even future planned experiments. Further, constraints on primordial non-Gaussianity from future large-sky radio-continuum surveys can outperform those from the Planck cosmic microwave background experiment and rival those from future spectroscopic galaxy surveys. The application of this method thus holds tremendous promise for cosmology.

  4. Academic freedom, public reactions, and anonymity.

    Science.gov (United States)

    Häyry, Matti

    2014-05-01

    Academic freedom can be defined as immunity against adverse reactions from the general public, designed to keep scholars unintimidated and productive even after they have published controversial ideas. Francesca Minerva claims that this notion of strict instrumental academic freedom is supported by Ronald Dworkin, and that anonymity would effectively defend the sphere of immunity implied by it. Against this, I argue that the idea defended by Minerva finds no support in the work by Dworkin referred to; that anonymity would not in most cases effectively protect the kind of immunity sought after; and that in some cases it would not even be desirable to protect scholars from public reactions to their controversial claims. © 2014 John Wiley & Sons Ltd.

  5. Our Anonymous Online Research Participants Are Not Always Anonymous: Is This a Problem?

    Science.gov (United States)

    Dawson, Phillip

    2014-01-01

    When educational research is conducted online, we sometimes promise our participants that they will be anonymous--but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical…

  6. Thermal oxidation of tungsten-based sputtered coatings

    International Nuclear Information System (INIS)

    Louro, C.; Cavaleiro, A.

    1997-01-01

    The effect of the addition of nickel, titanium, and nitrogen on the air oxidation behavior of W-based sputtered coatings in the temperature range 600 to 800 C was studied. In some cases these additions significantly improved the oxidation resistance of the tungsten coatings. As reported for bulk tungsten, all the coatings studied were oxidized by layers following a parabolic law. Besides WO 3 and WO x phases detected in all the oxidized coatings, TiO 2 and NiWO 4 were also detected for W-Ti and W-Ni films, respectively. WO x was present as an inner protective compact layer covered by the porous WO 3 oxide. The best oxidation resistance was found for W-Ti and W-N-Ni coatings which also presented the highest activation energies (E a = 234 and 218 kJ/mol, respectively, as opposed to E a ∼ 188 kJ/mol for the other coatings). These lower oxidation weight gains were attributed to the greater difficulty of the inward diffusion of oxygen ions for W-Ti films, owing to the formation of fine particles of TiO 2 , and the formation of the external, more protective layer of NiWO 4 for W-N-Ni coatings

  7. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  8. Effectiveness of Anonymization Methods in Preserving Patients' Privacy: A Systematic Literature Review.

    Science.gov (United States)

    Langarizadeh, Mostafa; Orooji, Azam; Sheikhtaheri, Abbas

    2018-01-01

    An ever growing for application of electronic health records (EHRs) has improved healthcare providers' communications, access to data for secondary use and promoted the quality of services. Patient's privacy has been changed to a great issue today since there are large loads of critical information in EHRs. Therefore, many privacy preservation techniques have been proposed and anonymization is a common one. This study aimed to investigate the effectiveness of anonymization in preserving patients' privacy. The articles published in the 2005-2016 were included. Pubmed, Cochrane, IEEE and ScienceDirect were searched with a variety of related keywords. Finally, 18 articles were included. In the present study, the relevant anonymization issues were investigated in four categories: secondary use of anonymized data, re-identification risk, anonymization effect on information extraction and inadequacy of current methods for different document types. The results revealed that though anonymization cannot reduce the risk of re-identification to zero, if implemented correctly, can manage to help preserve patient's privacy.

  9. The Incompatibility of Pareto Optimality and Dominant-Strategy Incentive Compatibility in Sufficiently-Anonymous Budget-Constrained Quasilinear Settings

    Directory of Open Access Journals (Sweden)

    Rica Gonen

    2013-11-01

    Full Text Available We analyze the space of deterministic, dominant-strategy incentive compatible, individually rational and Pareto optimal combinatorial auctions. We examine a model with multidimensional types, nonidentical items, private values and quasilinear preferences for the players with one relaxation; the players are subject to publicly-known budget constraints. We show that the space includes dictatorial mechanisms and that if dictatorial mechanisms are ruled out by a natural anonymity property, then an impossibility of design is revealed. The same impossibility naturally extends to other abstract mechanisms with an arbitrary outcome set if one maintains the original assumptions of players with quasilinear utilities, public budgets and nonnegative prices.

  10. Culture or anonymity? Differences in proposer behaviour in Korea and Germany.

    Science.gov (United States)

    Horak, Sven

    2015-10-01

    This study explores the proposer behaviour in an ultimatum game (UG) frame under anonymous and non-anonymous conditions among a Korean and German subject pool (n = 590) in comparison. Whereas the anonymous condition is represented by the standard UG, the non-anonymous condition integrates an aggregate of the Korean cultural context variables university affiliation, regional origin and seniority. The latter, a classic Confucian context variable, is measured by age differentials. The former two are impactful components of so-called Yongo networks, a unique Korean informal institution identical to Chinese Guanxi ties. Yongo networks, yet underrepresented in research, are said to be a central context variable to explain Korean social ties and decision-making behaviour. We observe significant differences between the offer behaviours of Korean and German subjects when exposing selected cultural variables. We argue that the behavioural differences observed are in fact due to culture not anonymity. © 2015 International Union of Psychological Science.

  11. Scalable and Anonymous Group Communication with MTor

    Directory of Open Access Journals (Sweden)

    Lin Dong

    2016-04-01

    Full Text Available This paper presents MTor, a low-latency anonymous group communication system. We construct MTor as an extension to Tor, allowing the construction of multi-source multicast trees on top of the existing Tor infrastructure. MTor does not depend on an external service to broker the group communication, and avoids central points of failure and trust. MTor’s substantial bandwidth savings and graceful scalability enable new classes of anonymous applications that are currently too bandwidth-intensive to be viable through traditional unicast Tor communication-e.g., group file transfer, collaborative editing, streaming video, and real-time audio conferencing.

  12. Large-Scale Constraint-Based Pattern Mining

    Science.gov (United States)

    Zhu, Feida

    2009-01-01

    We studied the problem of constraint-based pattern mining for three different data formats, item-set, sequence and graph, and focused on mining patterns of large sizes. Colossal patterns in each data formats are studied to discover pruning properties that are useful for direct mining of these patterns. For item-set data, we observed robustness of…

  13. Fouling Release Coatings Based on Polydimethylsiloxane with the Incorporation of Phenylmethylsilicone Oil

    Directory of Open Access Journals (Sweden)

    Miao Ba

    2018-04-01

    Full Text Available In this study, phenylmethylsilicone oil (PSO with different viscosity was used for research in fouling release coatings based on polydimethylsiloxane (PDMS. The surface properties and mechanical properties of the coatings were investigated, while the leaching behavior of PSO from the coatings was studied. Subsequently, the antifouling performance of the coatings was investigated by the benthic diatom adhesion test. The results showed that the coatings with high-viscosity PSO exhibited high levels of hydrophobicity and PSO leaching, while the high PSO content significantly decreased the elastic modulus of the coatings and prolonged the release time of PSO. The antifouling results indicated that the incorporation of PSO into coatings enhanced the antifouling performance of the coating by improving the coating hydrophobicity and decreasing the coating elastic modulus, while the leaching of PSO from the coatings improved the fouling removal rate of the coating. This suggests a double enhancement effect on the antifouling performance of fouling release coatings based on PDMS with PSO incorporated.

  14. Defect assessments of pipelines based on the FAD approach incorporating constraint effects

    Energy Technology Data Exchange (ETDEWEB)

    Ruggieri, Claudio; Cravero, Sebastian [Sao Paulo Univ., SP (Brazil)

    2005-07-01

    This work presents a framework for including constraint effects in the failure assessment diagram (FAD) approach. The procedure builds upon the constraint-based Q methodology to correct measured toughness values using low constraint fracture specimens which modifies the shape of the FAD curve. The approach is applied to predict the failure (burst pressure) of high pressure pipelines with planar defects having different geometries (i.e., crack depth and crack length). The FAD curves are corrected for effects of constraint based on the L{sub r}-Q trajectories for pin-loaded SE(T) specimens. The article shows that inclusion of constraint effects in the FAD approach provides better agreement between experimentally measured burst pressure and predicted values for high pressure pipelines with planar defects. (author)

  15. Epoxy-based broadband antireflection coating for millimeter-wave optics.

    Science.gov (United States)

    Rosen, Darin; Suzuki, Aritoki; Keating, Brian; Krantz, William; Lee, Adrian T; Quealy, Erin; Richards, Paul L; Siritanasak, Praween; Walker, William

    2013-11-20

    We have developed epoxy-based, broadband antireflection coatings for millimeter-wave astrophysics experiments with cryogenic optics. By using multiple-layer coatings where each layer steps in dielectric constant, we achieved low reflection over a wide bandwidth. We suppressed the reflection from an alumina disk to 10% over fractional bandwidths of 92% and 104% using two-layer and three-layer coatings, respectively. The dielectric constants of epoxies were tuned between 2.06 and 7.44 by mixing three types of epoxy and doping with strontium titanate powder required for the high dielectric mixtures. At 140 K, the band-integrated absorption loss in the coatings was suppressed to less than 1% for the two-layer coating, and below 10% for the three-layer coating.

  16. Anonymous living liver donation: donor profiles and outcomes.

    Science.gov (United States)

    Reichman, T W; Fox, A; Adcock, L; Wright, L; Abbey, S E; Levy, G; Grant, D R

    2010-09-01

    There are no published series of the assessment process, profiles and outcomes of anonymous, directed or nondirected live liver donation. The outcomes of 29 consecutive potential anonymous liver donors at our center were assessed. We used our standard live liver assessment process, augmented with the following additional acceptance criteria: a logical rationale for donation, a history of social altruism, strong social supports and a willingness to maintain confidentiality of patient information. Seventeen potential donors were rejected and 12 donors were ultimately accepted (six male, six female). All donors were strongly motivated by a desire and sense of responsibility to help others. Four donations were directed toward recipients who undertook media appeals. The donor operations included five left lateral segmentectomies and seven right hepatectomies. The overall donor morbidity was 40% with one patient having a transient Clavien level 3 complication (a pneumothorax). All donors are currently well. None expressed regret about their decision to donate, and all volunteered the opinion that donation had improved their lives. The standard live liver donor assessment process plus our additional requirements appears to provide a robust assessment process for the selection of anonymous live liver donors. Acceptance of anonymous donors enlarges the donor liver pool. © 2010 The Authors Journal compilation © 2010 The American Society of Transplantation and the American Society of Transplant Surgeons.

  17. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  18. Using anonymized reflection to teach ethics: a pilot study.

    Science.gov (United States)

    Kyle, Gaye

    2008-01-01

    Anonymized reflection was employed as an innovative way of teaching ethics in order to enhance students' ability in ethical decision making during a Care of the Dying Patient and Family' module. Both qualitative and quantitative data were collected from the first two student cohorts who experienced anonymized reflection ( n = 24). The themes identified were the richness and relevance of scenarios, small-group work and a team approach to teaching. Students indicated that they preferred this style of teaching. This finding was verified by a postal questionnaire conducted four months later. The conclusions drawn from this study suggest that using anonymized reflection is an effective method for teaching ethics to nurses and indicates that learning about ethical issues in this way reduces uncertainties.

  19. Constraint-Based Local Search for Constrained Optimum Paths Problems

    Science.gov (United States)

    Pham, Quang Dung; Deville, Yves; van Hentenryck, Pascal

    Constrained Optimum Path (COP) problems arise in many real-life applications and are ubiquitous in communication networks. They have been traditionally approached by dedicated algorithms, which are often hard to extend with side constraints and to apply widely. This paper proposes a constraint-based local search (CBLS) framework for COP applications, bringing the compositionality, reuse, and extensibility at the core of CBLS and CP systems. The modeling contribution is the ability to express compositional models for various COP applications at a high level of abstraction, while cleanly separating the model and the search procedure. The main technical contribution is a connected neighborhood based on rooted spanning trees to find high-quality solutions to COP problems. The framework, implemented in COMET, is applied to Resource Constrained Shortest Path (RCSP) problems (with and without side constraints) and to the edge-disjoint paths problem (EDP). Computational results show the potential significance of the approach.

  20. Constraint-aware interior layout exploration for pre-cast concrete-based buildings

    KAUST Repository

    Liu, Han

    2013-05-03

    Creating desirable layouts of building interiors is a complex task as designers have to manually adhere to various local and global considerations arising from competing practical and design considerations. In this work, we present an interactive design tool to create desirable floorplans by computationally conforming to such design constraints. Specifically, we support three types of constraints: (i) functional constraints such as number of rooms, connectivity among the rooms, target room areas, etc.; (ii) design considerations such as user modifications and preferences, and (iii) fabrication constraints such as cost and convenience of manufacturing. Based on user specifications, our system automatically generates multiple floor layouts with associated 3D geometry that all satisfy the design specifications and constraints, thus exposing only the desirable family of interior layouts to the user. In this work, we focus on pre-cast concrete-based constructions, which lead to interesting discrete and continuous optimization possibilities. We test our framework on a range of complex real-world specifications and demonstrate the control and expressiveness of the exposed design space relieving the users of the task of manually adhering to non-local functional and fabrication constraints. © 2013 Springer-Verlag Berlin Heidelberg.

  1. Constraint-based job shop scheduling with ILOG SCHEDULER

    NARCIS (Netherlands)

    Nuijten, W.P.M.; Le Pape, C.

    1998-01-01

    We introduce constraint-based scheduling and discuss its main principles. An approximation algorithm based on tree search is developed for the job shop scheduling problem using ILOG SCHEDULER. A new way of calculating lower bounds on the makespan of the job shop scheduling problem is presented and

  2. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  3. Flagellin based biomimetic coatings: From cell-repellent surfaces to highly adhesive coatings.

    Science.gov (United States)

    Kovacs, Boglarka; Patko, Daniel; Szekacs, Inna; Orgovan, Norbert; Kurunczi, Sandor; Sulyok, Attila; Khanh, Nguyen Quoc; Toth, Balazs; Vonderviszt, Ferenc; Horvath, Robert

    2016-09-15

    Biomimetic coatings with cell-adhesion-regulating functionalities are intensively researched today. For example, cell-based biosensing for drug development, biomedical implants, and tissue engineering require that the surface adhesion of living cells is well controlled. Recently, we have shown that the bacterial flagellar protein, flagellin, adsorbs through its terminal segments to hydrophobic surfaces, forming an oriented monolayer and exposing its variable D3 domain to the solution. Here, we hypothesized that this nanostructured layer is highly cell-repellent since it mimics the surface of the flagellar filaments. Moreover, we proposed flagellin as a carrier molecule to display the cell-adhesive RGD (Arg-Gly-Asp) peptide sequence and induce cell adhesion on the coated surface. The D3 domain of flagellin was replaced with one or more RGD motifs linked by various oligopeptides modulating flexibility and accessibility of the inserted segment. The obtained flagellin variants were applied to create surface coatings inducing cell adhesion and spreading to different levels, while wild-type flagellin was shown to form a surface layer with strong anti-adhesive properties. As reference surfaces synthetic polymers were applied which have anti-adhesive (PLL-g-PEG poly(l-lysine)-graft-poly(ethylene glycol)) or adhesion inducing properties (RGD-functionalized PLL-g-PEG). Quantitative adhesion data was obtained by employing optical biochips and microscopy. Cell-adhesion-regulating coatings can be simply formed on hydrophobic surfaces by using the developed flagellin-based constructs. The developed novel RGD-displaying flagellin variants can be easily obtained by bacterial production and can serve as alternatives to create cell-adhesion-regulating biomimetic coatings. In the present work, we show for the first time that. Copyright © 2016 Acta Materialia Inc. Published by Elsevier Ltd. All rights reserved.

  4. Enabling genomic-phenomic association discovery without sacrificing anonymity.

    Directory of Open Access Journals (Sweden)

    Raymond D Heatherly

    Full Text Available Health information technologies facilitate the collection of massive quantities of patient-level data. A growing body of research demonstrates that such information can support novel, large-scale biomedical investigations at a fraction of the cost of traditional prospective studies. While healthcare organizations are being encouraged to share these data in a de-identified form, there is hesitation over concerns that it will allow corresponding patients to be re-identified. Currently proposed technologies to anonymize clinical data may make unrealistic assumptions with respect to the capabilities of a recipient to ascertain a patients identity. We show that more pragmatic assumptions enable the design of anonymization algorithms that permit the dissemination of detailed clinical profiles with provable guarantees of protection. We demonstrate this strategy with a dataset of over one million medical records and show that 192 genotype-phenotype associations can be discovered with fidelity equivalent to non-anonymized clinical data.

  5. Coating membranes for a sorbent-based artificial liver: adsorption characteristics

    NARCIS (Netherlands)

    de Koning, H. W.; Chamuleau, R. A.; Bantjes, A.

    1982-01-01

    Techniques are described for the coating of sorbents to be used in an artificial liver support system based on mixed sorbent bed hemoperfusion. Activated charcoal has been coated with cellulose acetate (CA) by solvent evaporation. With Amberlite XAD-4, the Wurster technique was used for coating with

  6. Monocular Visual Odometry Based on Trifocal Tensor Constraint

    Science.gov (United States)

    Chen, Y. J.; Yang, G. L.; Jiang, Y. X.; Liu, X. Y.

    2018-02-01

    For the problem of real-time precise localization in the urban street, a monocular visual odometry based on Extend Kalman fusion of optical-flow tracking and trifocal tensor constraint is proposed. To diminish the influence of moving object, such as pedestrian, we estimate the motion of the camera by extracting the features on the ground, which improves the robustness of the system. The observation equation based on trifocal tensor constraint is derived, which can form the Kalman filter alone with the state transition equation. An Extend Kalman filter is employed to cope with the nonlinear system. Experimental results demonstrate that, compares with Yu’s 2-step EKF method, the algorithm is more accurate which meets the needs of real-time accurate localization in cities.

  7. Performances and reliability of WC based thermal spray coatings

    International Nuclear Information System (INIS)

    Scrivani, A.; Rosso, M.; Salvarani, L.

    2001-01-01

    Thermal spray processes are used for a lot of traditional and innovative applications and their importance is becoming higher and higher. WC/CoCr based thermal spray coatings represent one of the most important class of coatings that find application in a wide range of industrial sectors. This paper will address a review of current applications and characteristics of this kind of coating. The most important spraying processes, namely HVOF (high velocity oxygen fuel) are examined, the characterization of the coatings from the point of view of corrosion and wear resistance is considered. (author)

  8. GMI effect in CuO coated Co-based amorphous ribbons

    Energy Technology Data Exchange (ETDEWEB)

    Taysioglu, Asli Ayten [Department of Physics, Sciences and Arts Faculty, Uludag University, 16059 Gorukle, Bursa (Turkey); Peksoz, Ahmet, E-mail: peksoz@uludag.edu.t [Department of Physics, Sciences and Arts Faculty, Uludag University, 16059 Gorukle, Bursa (Turkey); Kaya, Yunus [Department of Chemistry, Sciences and Arts Faculty, Uludag University, 16059 Gorukle, Bursa (Turkey); Derebasi, Naim [Department of Physics, Sciences and Arts Faculty, Uludag University, 16059 Gorukle, Bursa (Turkey); Irez, Gazi [Department of Chemistry, Sciences and Arts Faculty, Uludag University, 16059 Gorukle, Bursa (Turkey); Kaynak, Gokay [Department of Physics, Sciences and Arts Faculty, Uludag University, 16059 Gorukle, Bursa (Turkey)

    2009-11-13

    A Copper oxide (CuO) film has been grown on a surface of Co-based amorphous ribbon using chemical successive ionic layer adsorption and reaction technique, at room temperature and atmosphere pressure. The influence of coating and width of ribbon on giant magneto impedance have been investigated over a frequency range from 0.1 to 3 MHz and under a static magnetic field between -8 and +8 kA/m. The results showed that Co-based amorphous ribbons, which are coated CuO film, have a significant effect on the magnitude and operation frequency for the giant magneto impedance effect as compared to the samples without coating. The highest giant magneto impedance effect was found to be 14.90 on 5 mm width coated ribbon, which is 60% higher than the sample without coating. A surface observation of these samples has been carried out by an atomic force microscope. The AFM images reveal the difference between surfaces of coated and as-cast sample.

  9. GMI effect in CuO coated Co-based amorphous ribbons

    International Nuclear Information System (INIS)

    Taysioglu, Asli Ayten; Peksoz, Ahmet; Kaya, Yunus; Derebasi, Naim; Irez, Gazi; Kaynak, Gokay

    2009-01-01

    A Copper oxide (CuO) film has been grown on a surface of Co-based amorphous ribbon using chemical successive ionic layer adsorption and reaction technique, at room temperature and atmosphere pressure. The influence of coating and width of ribbon on giant magneto impedance have been investigated over a frequency range from 0.1 to 3 MHz and under a static magnetic field between -8 and +8 kA/m. The results showed that Co-based amorphous ribbons, which are coated CuO film, have a significant effect on the magnitude and operation frequency for the giant magneto impedance effect as compared to the samples without coating. The highest giant magneto impedance effect was found to be 14.90 on 5 mm width coated ribbon, which is 60% higher than the sample without coating. A surface observation of these samples has been carried out by an atomic force microscope. The AFM images reveal the difference between surfaces of coated and as-cast sample.

  10. Logic-based methods for optimization combining optimization and constraint satisfaction

    CERN Document Server

    Hooker, John

    2011-01-01

    A pioneering look at the fundamental role of logic in optimization and constraint satisfaction While recent efforts to combine optimization and constraint satisfaction have received considerable attention, little has been said about using logic in optimization as the key to unifying the two fields. Logic-Based Methods for Optimization develops for the first time a comprehensive conceptual framework for integrating optimization and constraint satisfaction, then goes a step further and shows how extending logical inference to optimization allows for more powerful as well as flexible

  11. Chrome-free Samarium-based Protective Coatings for Magnesium Alloys

    Science.gov (United States)

    Hou, Legan; Cui, Xiufang; Yang, Yuyun; Lin, Lili; Xiao, Qiang; Jin, Guo

    The microstructure of chrome-free samarium-based conversion coating on magnesium alloy was investigated and the corrosion resistance was evaluated as well. The micro-morphology, transverse section, crystal structure and composition of the coating were observed by scanning electron microscopy (SEM), X-ray diffraction (XRD), energy dispersive spectroscopy (EDS) and X- ray photoelectron spectroscopy (XPS), respectively. The corrosion resistance was evaluated by potentiodynamic polarization curve and electrochemical impedance spectroscopy (EIS). The results reveal that the morphology of samarium conversion coating is of crack-mud structure. Tiny cracks distribute in the compact coating deposited by samarium oxides. XRD, EDS and XPS results characterize that the coating is made of amorphous and trivalent-samarium oxides. The potentiodynamic polarization curve, EIS and OCP indicate that the samarium conversion coating can improve the corrosion resistance of magnesium alloys.

  12. Fluorine Based Superhydrophobic Coatings

    Directory of Open Access Journals (Sweden)

    Jean-Denis Brassard

    2012-05-01

    Full Text Available Superhydrophobic coatings, inspired by nature, are an emerging technology. These water repellent coatings can be used as solutions for corrosion, biofouling and even water and air drag reduction applications. In this work, synthesis of monodispersive silica nanoparticles of ~120 nm diameter has been realized via Stöber process and further functionalized using fluoroalkylsilane (FAS-17 molecules to incorporate the fluorinated groups with the silica nanoparticles in an ethanolic solution. The synthesized fluorinated silica nanoparticles have been spin coated on flat aluminum alloy, silicon and glass substrates. Functionalization of silica nanoparticles with fluorinated groups has been confirmed by Fourier Transform Infrared spectroscopy (FTIR by showing the presence of C-F and Si-O-Si bonds. The water contact angles and surface roughness increase with the number of spin-coated thin films layers. The critical size of ~119 nm renders aluminum surface superhydrophobic with three layers of coating using as-prepared nanoparticle suspended solution. On the other hand, seven layers are required for a 50 vol.% diluted solution to achieve superhydrophobicity. In both the cases, water contact angles were more than 150°, contact angle hysteresis was less than 2° having a critical roughness value of ~0.700 µm. The fluorinated silica nanoparticle coated surfaces are also transparent and can be used as paint additives to obtain transparent coatings.

  13. Micro-compression testing: A critical discussion of experimental constraints

    International Nuclear Information System (INIS)

    Kiener, D.; Motz, C.; Dehm, G.

    2009-01-01

    Micro-compression testing is a promising technique for determining mechanical properties at small length scales since it has several benefits over nanoindentation. However, as for all new techniques, experimental constraints influencing the results of such a micro-mechanical test must be considered. Here we investigate constraints imposed by the sample geometry, the pile-up of dislocations at the sample top and base, and the lateral stiffness of the testing setup. Using a focused ion beam milling setup, single crystal Cu specimens with different geometries and crystal orientations were fabricated. Tapered samples served to investigate the influence of strain gradients, while stiff sample top coatings and undeformable substrates depict the influence of dislocation pile-ups at these interfaces. The lateral system stiffness was reduced by placing specimens on top of needles. Samples were loaded using an in situ indenter in a scanning electron microscope in load controlled or displacement controlled mode. The observed differences in the mechanical response with respect to the experimental imposed constraints are discussed and lead to the conclusion that controlling the lateral system stiffness is the most important point

  14. Alcoholics anonymous, other 12-step movements and psychotherapy in the US population, 1990.

    Science.gov (United States)

    Room, R; Greenfield, T

    1993-04-01

    Based on the 1990 US National Alcohol Survey, this note provides the first available comprehensive findings on self-reported utilization of a variety of sources of personal support and counselling for alcohol and other problems. Respondents were queried about lifetime attendance and number of times they went to identified sources of help in the prior year. Twelve-step groups included Alcoholics Anonymous, Al-Anon, Adult Children of Alcoholics, and other non-alcohol-oriented groups like Gamblers Anonymous, Narcotics Anonymous, and Overeaters Anonymous; additional questions inquired about support or therapy groups and individual counselling for non-alcohol problems. Of the US adult population, 9% have been to an AA meeting at some time, 3.6% in the prior year, only about one-third of these for problems of their own. About half these percentages, mostly women, have attended Al-Anon. Of the same population, 13.3% indicate ever attending a 12-step meeting (including non-alcohol-oriented groups), 5.3% in the last year. During the prior year a further 2.1% used other support/therapy groups and 5.5% sought individual counselling/therapy for personal problems other than alcohol. In contrast to this high reported utilization, only 4.9% (ever) and 2.3% (12-months) reported going to anyone including AA for a problem (of their own) related to drinking.

  15. (In)visible Ghosts in the Machine and the Powers that Bind: The Relational Securitization of Anonymous

    DEFF Research Database (Denmark)

    Dunn Cavelty, Myriam; Jaeger, Mark Daniel

    2015-01-01

    prerogative to secrecy, and challenging its claim to unrestrained surveillance. At the same time, the state's bases are implicated and reproduced in the way this conflict is constructed. The conflict not only (re)produces and makes visible “the state” as a social entity, but also changes or at least...... designations give rise to the visibility of political entities and agency in the first place. Applying this framework, we can better understand the movement's path from a bunch of anonymous individuals to the collectivity “Anonymous,” posing a threat to certain bases of the state's ontological existence, its...

  16. A New Heuristic Anonymization Technique for Privacy Preserved Datasets Publication on Cloud Computing

    Science.gov (United States)

    Aldeen Yousra, S.; Mazleena, Salleh

    2018-05-01

    Recent advancement in Information and Communication Technologies (ICT) demanded much of cloud services to sharing users’ private data. Data from various organizations are the vital information source for analysis and research. Generally, this sensitive or private data information involves medical, census, voter registration, social network, and customer services. Primary concern of cloud service providers in data publishing is to hide the sensitive information of individuals. One of the cloud services that fulfill the confidentiality concerns is Privacy Preserving Data Mining (PPDM). The PPDM service in Cloud Computing (CC) enables data publishing with minimized distortion and absolute privacy. In this method, datasets are anonymized via generalization to accomplish the privacy requirements. However, the well-known privacy preserving data mining technique called K-anonymity suffers from several limitations. To surmount those shortcomings, I propose a new heuristic anonymization framework for preserving the privacy of sensitive datasets when publishing on cloud. The advantages of K-anonymity, L-diversity and (α, k)-anonymity methods for efficient information utilization and privacy protection are emphasized. Experimental results revealed the superiority and outperformance of the developed technique than K-anonymity, L-diversity, and (α, k)-anonymity measure.

  17. Gamblers Anonymous as a Recovery Pathway: A Scoping Review

    OpenAIRE

    Schuler, Andr?e; Ferentzy, Peter; Turner, Nigel E.; Skinner, Wayne; McIsaac, Kathryn E.; Ziegler, Carolyn P.; Matheson, Flora I.

    2016-01-01

    Given the preponderance of Gamblers Anonymous (GA), there has been relatively little effort to explore the existing evidence base on its effectiveness as a recovery approach for problem gambling. To remedy this gap in the literature we conducted a scoping review of the literature on mutual aid for individuals experiencing problem gambling published between 2002 and 2015. We searched 13 databases and reviewed reference lists and websites of relevant organizations. We reviewed records for eligi...

  18. Reexamination of the Association between Anonymity and Self-Interested Unethical Behavior in Adults

    Science.gov (United States)

    Nogami, Tatsuya

    2009-01-01

    The well-established notion that the frequency of self-interested unethical behavior increases among anonymous people was reexamined employing a more strict definition of anonymity, voluntary unethical behavior, and adult individuals. Anonymity was defined as nonassociability of the participant's traits with respect to unethical behavior. The…

  19. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  20. Potential harms, anonymization, and the right to withdraw consent to biobank research.

    Science.gov (United States)

    Eriksson, Stefan; Helgesson, Gert

    2005-09-01

    This paper discusses the potential harms involved in biobank research and how ethical review, informed consent, withdrawals, and anonymization of samples should be handled in the light of these harms. There is less risk involved in biobank research than in human subject research; it should therefore be treated differently. In our view, anonymization should not be an automatically permissible response to requests for withdrawal. Nor should a request for withdrawal necessarily stop research on identifiable samples. Apart from not being particularly appropriate for protecting the interests of individuals, anonymization of samples has a negative impact on research. We suggest that the current view on withdrawal from research, supported by the Declaration of Helsinki and subsequent ethical guidelines, be abandoned in the context of biobank research and be replaced by an approach inspired by the Nuremberg Code. This approach requires those wishing to withdraw their samples from research to present sufficient reason for doing so. Our interpretation of 'sufficient reason' includes all those involving genuine, deeply felt concerns that are not based on misconceptions. Still, this underlines the fact that we all share a responsibility for health research and that no one should take withdrawal from biobank research lightly.

  1. Constraint Differentiation

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Basin, David; Viganò, Luca

    2010-01-01

    We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation works by eliminating certain kinds of redundancies that arise in the search space when using constraints to represent...... results show that constraint differentiation substantially reduces search and considerably improves the performance of OFMC, enabling its application to a wider class of problems....

  2. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  3. Characterization of boride-based powders and detonation gun sprayed cermet coatings

    International Nuclear Information System (INIS)

    Keraenen, J.; Stenberg, T.; Maentylae, T.

    1995-01-01

    Detonation gun sprayed (DGS) cermet coatings containing complex ternary transition metal boride as hard particles dispersed in a stainless steel or nickel based superalloy matrix have been characterized. Microstructure of the coatings, as well as powders, were studied with optical microscopy, scanning electron microscopy (SEM), X-ray diffraction (XRD) and analytical transmission electron microscopy (AEM). X-ray microanalysis of the coatings were carried out using energy dispersive X-ray spectrometer (EDS) attached to the SEM and AEM. Moreover, abrasion wear resistance of the coatings was evaluated with a rubber wheel abrasion test equipment. The general microstructure of studied coatings appeared to be heterogeneous in the terms of the distribution, size and crystallographic nature of the phases. Nonetheless, very low porosities were obtained and in the coatings the oxide phase as well as the unmelted particles and the formation of oxide phase were avoided by optimization of DGS parameters. So far the abrasive wear resistance of boride-based cermet coatings is not so good as that of the WC-12Co coatings

  4. College Students' Experiences with Anonymous Social Media: Implications for Campus Racial Climate

    Science.gov (United States)

    Armstrong, Amanda; Thomas, Jaymi; Smith, Madeline

    2017-01-01

    The purpose of this exploratory case study was to gather undergraduate students' perceptions of anonymous racist messages found on Yik Yak and to better understand the implications of anonymous platforms on campus racial climate. Given the limited research surrounding students' use of anonymous social media platforms, as well as the predominant…

  5. [Examination of the Young maladaptive schemes in a group of Gamblers Anonymous].

    Science.gov (United States)

    Katona, Zsuzsa; Körmendi, Attila

    2012-01-01

    Literature of gambling addiction has become widespread in last years. Many studies were written about the vulnerability factors helping the development of addiction, theoretical models, comorbid problems and therapy possibilities. Currently there is no integrated theoretical model that could explain sufficiently the development and maintenance of pathological gambling. The treatment issue is also unresolved. Cognitive psychology is a dynamically developing field of psychology and good results are achieved in gambling treatment with applying cognitive techniques. Jeffrey Young's schema-focused therapy is a recent theoretical and therapeutic direction within cognitive psychology which emphasizes the necessity of emotional changes beside rational ones in the interest of efficiency. The purpose of our research is to examine and analyse active maladaptive schemas among gamblers who are members of Gamblers Anonymous self-help group. 23 control persons and 23 gamblers associated with support group of Gamblers Anonymous took part in our research. The severity of gambling behaviour was measured by Gamblers Anonymous Twenty Questions. For exploring maladaptive schemas we used the shorter 114-item version of the Young Schema Questionnaire (YSQ-S3). All the examined gamblers were considered as problem gamblers based on Gamblers Anonymous Twenty Questions. In the control group there where no active schemas while in the group of gamblers several schemas (Emotional deprivation, Self-sacrifice, Recognition seeking, Emotional inhibition, Unrelenting standards, Self-punitiveness, Insufficient self-control) showed activity. Active schemas show similarity in their matter with main establishments of researches about gamblers and support the role of impulsivity, narcissistic traits, self-medicalization and emotional deprivation in the development and maintenance of pathological gambling.

  6. An outcome study of Gamblers Anonymous.

    Science.gov (United States)

    Stewart, R M; Brown, R I

    1988-02-01

    Retrospective and prospective studies of a total sample of 232 attenders at groups of Gamblers Anonymous suggest that total abstinence from gambling was maintained by 8% of all comers at one year from first attendance and by 7% at two years.

  7. Hysteresis modeling based on saturation operator without constraints

    International Nuclear Information System (INIS)

    Park, Y.W.; Seok, Y.T.; Park, H.J.; Chung, J.Y.

    2007-01-01

    This paper proposes a simple way to model complex hysteresis in a magnetostrictive actuator by employing the saturation operators without constraints. Having no constraints causes a singularity problem, i.e. the inverse matrix cannot be obtained during calculating the weights. To overcome it, a pseudoinverse concept is introduced. Simulation results are compared with the experimental data, based on a Terfenol-D actuator. It is clear that the proposed model is much closer to the experimental data than the modified PI model. The relative error is calculated as 12% and less than 1% with the modified PI Model and proposed model, respectively

  8. Study on the unified constraint parameter for characterizing in-plane and out-of-plane constraint based on the equivalent plastic strain

    International Nuclear Information System (INIS)

    Yang Jie; Wang Guozhen; Xuan Fuzhen; Tu Shandong

    2013-01-01

    Background: Constraint can significantly alter the material's fracture toughness. Purpose: In order to increase accuracy of the structural integrity assessment. It needs to consider the effect of constraint on the fracture toughness of nuclear power materials and structures. A unified measure which can reflect both in-plane and out-of-plane constraint is needed. Methods: In this paper, the finite element numerical simulation method was used, a unified measure and characterization parameter of in-plane and out-of-plane constraint based on crack-tip equivalent plastic strain have been investigated. Results: The results show that the area surrounded by ε p isoline has a good relevance with the material's fracture toughness on different constraint conditions, so it may be a suitable parameter. Based on the area A PEEQ , a unified constraint characterization parameter √A p is defined. It was found that there exists a sole linear relation between the normalized fracture toughness J IC /J re f and √A p regardless of the in-plane, out-of-plane constraint and the selection of the p isolines. The sole J IC /J re f-√A p line exists for a certain material. For different materials, the slope of J IC /J re f-√A p reference line is different. The material whose slope is larger has a higher J IC /J re f and is more sensitive to constraint at the same magnitude of normalized unified parameter. Conclusions: The unified J IC /J re f -√A p reference line may be used to assess the safety of a cracked component with any constraint levels regardless of in-plane or out-of-plane constraint or both. (authors)

  9. Progress in UCO's search for silver-based telescope mirror coatings

    Science.gov (United States)

    Phillips, Andrew C.; Miller, Joseph S.; Bolte, Michael; DuPraw, Brian; Radovan, Matthew; Cowley, David

    2012-09-01

    We report on the on-going effort at University of California Observatories Astronomical Coatings Lab to develop robust protected-silver coatings suitable for telescope mirrors. We have identified a very promising recipe based on YF3 that produces excellent reflectivity at wavelengths of 340 nm and greater, has ~1.5% emissivity in the thermal IR, and does not contain problematic materials for the Mid-IR, such as SiO2 and Al2O3. The recipe holds up extremely well to aggressive environmental testing (80C and 80% RH; high-H2S atmosphere), and currently is being evaluated under real observatory conditions. This coating may satisfy the need for telescope mirror coatings that are long-lasting (~5 years or more) and have good reflectivity into the UV. We also evaluate and compare some other silver-based coatings developed elsewhere that should be useful in the same role. In addition, we describe recent upgrades to our coating facilities allowing us to deposit ion-assisted e-beam coatings on optics up to ~1m. This novel arrangement places the e-gun and ion source on a pivoting "swing-arm", allowing the position to move radially without changing the e-gun/ion source/ substrate geometry. Large substrates can be coated with good uniformity using single-axis rotation only. This technique is scalable to arbitrarily large substrate sizes.

  10. Metal monitoring for process control of laser-based coating removal

    Science.gov (United States)

    Fraser, Mark E.; Hunter, Amy J.; Panagiotou, Thomai; Davis, Steven J.; Freiwald, David A.

    1999-12-01

    Cost-effective and environmentally-sound means of paint and coatings removal is a problem spanning many government, commercial, industrial and municipal applications. For example, the Department of Energy is currently engaged in removing paint and other coatings from concrete and structural steel as part of decommissioning former nuclear processing facilities. Laser-based coatings removal is an attractive new technology for these applications as it promises to reduce the waste volume by up to 75 percent. To function more efficiently, however, the laser-based systems require some form of process control.

  11. Teaching Database Design with Constraint-Based Tutors

    Science.gov (United States)

    Mitrovic, Antonija; Suraweera, Pramuditha

    2016-01-01

    Design tasks are difficult to teach, due to large, unstructured solution spaces, underspecified problems, non-existent problem solving algorithms and stopping criteria. In this paper, we comment on our approach to develop KERMIT, a constraint-based tutor that taught database design. In later work, we re-implemented KERMIT as EER-Tutor, and…

  12. Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2013-01-01

    Full Text Available We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP, Diffie-Hellman problem (DHP, and the one-way hash function. It can resist various attacks such as insider attack, impersonation attack, server spoofing attack, and stolen smart card attack. Moreover, the presented scheme is computationally efficient for real-life implementation.

  13. Controlled protein adsorption on PMOXA/PAA based coatings by thermally induced immobilization

    Science.gov (United States)

    Mumtaz, Fatima; Chen, Chaoshi; Zhu, Haikun; Pan, Chao; Wang, Yanmei

    2018-05-01

    In this work, poly(2-methyl-2-oxazoline-random-glycidyl methacrylate) (PMOXA-r-GMA) and poly(acrylic acid)-block-poly(glycidyl methacrylate) (PAA-b-PGMA) copolymers were synthesized via cationic ring-opening polymerization (CROP) of 2-methyl-2-oxazoline (MOXA) and reversible addition-fragmentation chain transfer (RAFT) polymerization of acrylic acid (AA) followed by their random and block copolymerization with glycidyl methacrylate (GMA), respectively, and then characterized carefully. PMOXA/PAA based coatings were then prepared by simply spin coating the mixture of PMOXA-r-GMA and PAA-b-PGMA copolymer solutions onto silicon/glass substrates followed by annealing at 110 °C. The coatings were rigorously characterized by using X-ray photoelectron spectroscopy (XPS), the static water contact angle (WCA) test, ellipsometry and atomic force microscopy (AFM). The results demonstrated that the coating based mixed PMOXA/PAA brushes with desired surface composition could be attained by simply maintaining their percentage in the mixture of PMOXA-r-GMA and PAA-b-PGMA copolymer solutions. Finally, the switchable behavior of PMOXA/PAA based coatings toward bovine serum albumin (BSA) adsorption was investigated by fluorescein isothiocyanate-labelled BSA (FITC-BSA) assay and quartz crystal microbalance with dissipation monitoring (QCM-D), which indicated that the coating based mixed PMOXA/PAA brushes could control BSA adsorption/desorption from very low to high amount (>90% desorption) through adjusting the composition of PMOXA-r-GMA and PAA-b-PGMA solution used in preparing PMOXA/PAA based coatings upon pH and ionic strength change. Furthermore, PMOXA/PAA based coatings displayed efficient repeatability of reversible BSA adsorption/desorption cycles.

  14. Model-based control strategies for systems with constraints of the program type

    Science.gov (United States)

    Jarzębowska, Elżbieta

    2006-08-01

    The paper presents a model-based tracking control strategy for constrained mechanical systems. Constraints we consider can be material and non-material ones referred to as program constraints. The program constraint equations represent tasks put upon system motions and they can be differential equations of orders higher than one or two, and be non-integrable. The tracking control strategy relies upon two dynamic models: a reference model, which is a dynamic model of a system with arbitrary order differential constraints and a dynamic control model. The reference model serves as a motion planner, which generates inputs to the dynamic control model. It is based upon a generalized program motion equations (GPME) method. The method enables to combine material and program constraints and merge them both into the motion equations. Lagrange's equations with multipliers are the peculiar case of the GPME, since they can be applied to systems with constraints of first orders. Our tracking strategy referred to as a model reference program motion tracking control strategy enables tracking of any program motion predefined by the program constraints. It extends the "trajectory tracking" to the "program motion tracking". We also demonstrate that our tracking strategy can be extended to a hybrid program motion/force tracking.

  15. Automated Generation of OCL Constraints: NL based Approach vs Pattern Based Approach

    Directory of Open Access Journals (Sweden)

    IMRAN SARWAR BAJWA

    2017-04-01

    Full Text Available This paper presents an approach used for automated generations of software constraints. In this model, the SBVR (Semantics of Business Vocabulary and Rules based semi-formal representation is obtained from the syntactic and semantic analysis of a NL (Natural Language (such as English sentence. A SBVR representation is easy to translate to other formal languages as SBVR is based on higher-order logic like other formal languages such as OCL (Object Constraint Language. The proposed model endows with a systematic and powerful system of incorporating NL knowledge on the formal languages. A prototype is constructed in Java (an Eclipse plug-in as a proof of the concept. The performance was tested for a few sample texts taken from existing research thesis reports and books

  16. Constraint-plane-based synthesis and topology variation of a class of metamorphic parallel mechanisms

    International Nuclear Information System (INIS)

    Gan, Dongming; Dias, Jorge; Seneviratne, Lakmal; Dai, Jian S.

    2014-01-01

    This paper investigates various topologies and mobility of a class of metamorphic parallel mechanisms synthesized with reconfigurable rTPS limbs. Based on the reconfigurable Hooke (rT) joint, the rTPS limb has two phases which result in parallel mechanisms having ability of mobility change. While in one phase the limb has no constraint to the platform, in the other it constrains the spherical joint center to lie on a plane which is used to demonstrate different topologies of the nrTPS metamorphic parallel mechanisms by investigating various relations (parallel or intersecting) among the n constraint planes (n = 2,3,..,6). Geometric constraint equations of the platform rotation matrix and translation vector are set up based on the point-plane constraint, which reveals mobility and redundant geometric conditions of the mechanism topologies. By altering the limbs into the non-constraint phase without constraint plane, new mechanism phases are deduced with mobility change based on each mechanism topology.

  17. Home-based Constraint Induced Movement Therapy Poststroke

    OpenAIRE

    Stephen Isbel HScD; Christine Chapparo PhD; David McConnell PhD; Judy Ranka PhD

    2014-01-01

    Background: This study examined the efficacy of a home-based Constraint Induced Movement Therapy (CI Therapy) protocol with eight poststroke survivors. Method: Eight ABA, single case experiments were conducted in the homes of poststroke survivors. The intervention comprised restraint of the intact upper limb in a mitt for 21 days combined with a home-based and self-directed daily activity regime. Motor changes were measured using The Wolf Motor Function Test (WMFT) and the Motor Activity L...

  18. Social distance and anonymity modulate fairness consideration: An ERP study

    Science.gov (United States)

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-01-01

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity. PMID:26293456

  19. Modeling of constraints and micro-slidings generated between the frictional parts of a valve

    International Nuclear Information System (INIS)

    Cachon, L.; Sudreau, F.; Denape, J.; Lelait, L.

    1995-01-01

    The aim of this modeling is to optimize the use of deposited coatings on the frictional parts of valves (lid/seat). This study is part of a tribological study and uses the CASTEM 2000 finite-elements code developed by the CEA/DMT. The numerical calculations allow to verify that the structural constraints at the contact are lower than the admissible limits of the coatings. The structural constraints field under a static load is calculated and leads to the determination of an adhesion coefficient. This coefficient allows to understand how the sliding initiates. (J.S.). 9 figs

  20. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  1. Antibacterial property of fabrics coated by magnesium-based brucites

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Ying; Sha, Lin; Zhao, Jiao; Li, Qian; Zhu, Yimin, E-mail: ntp@dlmu.edu.cn; Wang, Ninghui

    2017-04-01

    Highlights: • Magnesium-based antibacterial agents composited by brucites with different particle sizes were proposed for the first time. • The coating process for making antibacterial fabrics was easy to operate and apply in industrial application. • The materials used in the antibacterial fabrics were environmental-friendly and cost-effective. • Reduction percentage of as-prepared antibacterial fabrics against E. coli and S. aureus reached to 96.6%, 100% respectively. • The antibacterial fabrics attained excellent washing durability. - Abstract: A kind of environmental-friendly magnesium-based antibacterial agent was reported for the first time, which was composited by brucites with different particle sizes. The antibacterial fabrics were produced by coating the magnesium-based antibacterial agents on the 260T polyester pongee fabrics with waterborne polyurethane. The coating process was simple, low-cost, and harmless to human health and environment. Characteristics of the antibacterial agents and fabrics were studied by particulate size distribution analyzer (PSDA), X-ray diffraction (XRD), and scanning electron microscopy (SEM). The results demonstrated that the coating layer was covered tightly on the fabrics and compositing of different particles by a certain proportion made full filling of the coating layer. Meanwhile, compositing did not change the structure of brucites. The antibacterial fabrics presented strong antibacterial properties against Escherichia coli (E. coli) and Staphylococcus aureus (S. aureus), with the reduction percentage of 96.6% and 100%, respectively, and the antibacterial fabrics attained excellent washing durability.

  2. Super-Hydrophobic/Icephobic Coatings Based on Silica Nanoparticles Modified by Self-Assembled Monolayers

    Directory of Open Access Journals (Sweden)

    Junpeng Liu

    2016-12-01

    Full Text Available A super-hydrophobic surface has been obtained from nanocomposite materials based on silica nanoparticles and self-assembled monolayers of 1H,1H,2H,2H-perfluorooctyltriethoxysilane (POTS using spin coating and chemical vapor deposition methods. Scanning electron microscope images reveal the porous structure of the silica nanoparticles, which can trap small-scale air pockets. An average water contact angle of 163° and bouncing off of incoming water droplets suggest that a super-hydrophobic surface has been obtained based on the silica nanoparticles and POTS coating. The monitored water droplet icing test results show that icing is significantly delayed by silica-based nano-coatings compared with bare substrates and commercial icephobic products. Ice adhesion test results show that the ice adhesion strength is reduced remarkably by silica-based nano-coatings. The bouncing phenomenon of water droplets, the icing delay performance and the lower ice adhesion strength suggest that the super-hydrophobic coatings based on a combination of silica and POTS also show icephobicity. An erosion test rig based on pressurized pneumatic water impinging impact was used to evaluate the durability of the super-hydrophobic/icephobic coatings. The results show that durable coatings have been obtained, although improvement will be needed in future work aiming for applications in aerospace.

  3. Multiparameter elastic full waveform inversion with facies-based constraints

    Science.gov (United States)

    Zhang, Zhen-dong; Alkhalifah, Tariq; Naeini, Ehsan Zabihi; Sun, Bingbing

    2018-06-01

    Full waveform inversion (FWI) incorporates all the data characteristics to estimate the parameters described by the assumed physics of the subsurface. However, current efforts to utilize FWI beyond improved acoustic imaging, like in reservoir delineation, faces inherent challenges related to the limited resolution and the potential trade-off between the elastic model parameters. Some anisotropic parameters are insufficiently updated because of their minor contributions to the surface collected data. Adding rock physics constraints to the inversion helps mitigate such limited sensitivity, but current approaches to add such constraints are based on including them as a priori knowledge mostly valid around the well or as a global constraint for the whole area. Since similar rock formations inside the Earth admit consistent elastic properties and relative values of elasticity and anisotropy parameters (this enables us to define them as a seismic facies), utilizing such localized facies information in FWI can improve the resolution of inverted parameters. We propose a novel approach to use facies-based constraints in both isotropic and anisotropic elastic FWI. We invert for such facies using Bayesian theory and update them at each iteration of the inversion using both the inverted models and a priori information. We take the uncertainties of the estimated parameters (approximated by radiation patterns) into consideration and improve the quality of estimated facies maps. Four numerical examples corresponding to different acquisition, physical assumptions and model circumstances are used to verify the effectiveness of the proposed method.

  4. Multiparameter Elastic Full Waveform Inversion with Facies-based Constraints

    Science.gov (United States)

    Zhang, Zhen-dong; Alkhalifah, Tariq; Naeini, Ehsan Zabihi; Sun, Bingbing

    2018-03-01

    Full waveform inversion (FWI) incorporates all the data characteristics to estimate the parameters described by the assumed physics of the subsurface. However, current efforts to utilize full waveform inversion beyond improved acoustic imaging, like in reservoir delineation, faces inherent challenges related to the limited resolution and the potential trade-off between the elastic model parameters. Some anisotropic parameters are insufficiently updated because of their minor contributions to the surface collected data. Adding rock physics constraints to the inversion helps mitigate such limited sensitivity, but current approaches to add such constraints are based on including them as a priori knowledge mostly valid around the well or as a global constraint for the whole area. Since similar rock formations inside the Earth admit consistent elastic properties and relative values of elasticity and anisotropy parameters (this enables us to define them as a seismic facies), utilizing such localized facies information in FWI can improve the resolution of inverted parameters. We propose a novel approach to use facies-based constraints in both isotropic and anisotropic elastic FWI. We invert for such facies using Bayesian theory and update them at each iteration of the inversion using both the inverted models and a prior information. We take the uncertainties of the estimated parameters (approximated by radiation patterns) into consideration and improve the quality of estimated facies maps. Four numerical examples corresponding to different acquisition, physical assumptions and model circumstances are used to verify the effectiveness of the proposed method.

  5. Multiparameter Elastic Full Waveform Inversion with Facies-based Constraints

    KAUST Repository

    Zhang, Zhendong

    2018-03-20

    Full waveform inversion (FWI) incorporates all the data characteristics to estimate the parameters described by the assumed physics of the subsurface. However, current efforts to utilize full waveform inversion beyond improved acoustic imaging, like in reservoir delineation, faces inherent challenges related to the limited resolution and the potential trade-off between the elastic model parameters. Some anisotropic parameters are insufficiently updated because of their minor contributions to the surface collected data. Adding rock physics constraints to the inversion helps mitigate such limited sensitivity, but current approaches to add such constraints are based on including them as a priori knowledge mostly valid around the well or as a global constraint for the whole area. Since similar rock formations inside the Earth admit consistent elastic properties and relative values of elasticity and anisotropy parameters (this enables us to define them as a seismic facies), utilizing such localized facies information in FWI can improve the resolution of inverted parameters. We propose a novel approach to use facies-based constraints in both isotropic and anisotropic elastic FWI. We invert for such facies using Bayesian theory and update them at each iteration of the inversion using both the inverted models and a prior information. We take the uncertainties of the estimated parameters (approximated by radiation patterns) into consideration and improve the quality of estimated facies maps. Four numerical examples corresponding to different acquisition, physical assumptions and model circumstances are used to verify the effectiveness of the proposed method.

  6. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  7. Scratch Behaviors of Cr-Coated Zr-Based Fuel Claddings for Accident-Tolerant Fuels

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Young-Ho; Kim, Il-Hyun; Kim, Hyun-Gil; Kim, Hyung-Kyu; Koo, Yang-Hyun [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2015-10-15

    As the progression of Fukushima accident is worsened by the runaway reaction at a high temperature above 1200 .deg. C, it is essential to ensure the stabilities of coating layers on conventional Zr-based alloys during normal operations as well as severe accident conditions. This is because the failures of coating layer result in galvanic corrosion phenomenon by potential difference between coating layer and Zr alloy. Also, it is possible to damage the coating layer during handling and manufacturing process by contacting structural components of a fuel assembly. So, adhesion strength is one of the key factors determining the reliability of the coating layer on conventional Zr-based alloy. In this study, two kinds of Cr-coated Zr-based claddings were prepared using arc ion plating (AIP) and direct laser (DL) coating methods. The objective is to evaluate the scratch deformation behaviors of each coating layers on Zr alloys. Large area spallation below normal load of about 15 N appeared to be the predominant mode of failure in the AIP coating during scratch test. However, no tensile crack were found in entire stroke length. In DL coating, small plastic deformation and grooving behavior are more dominant scratching results. It was observed that the change of the slope of the COF curve did not coincide with the failure of coating layer.

  8. TECHNOLOGICAL PECULIARITIES OF THERMAL BARRIER COATINGS BASED ON ZIRCONIUM DIOXIDE

    Directory of Open Access Journals (Sweden)

    V. V. Okovity

    2016-01-01

    Full Text Available A technology for formation of thermal barrier coatings (TBC based on zirconium dioxide has been developed in the paper. The paper investigates structures of phase composition and thermal stability of such developed coatings. Investigation results pertaining to formation of an oxide system ZrO2 – Y2O3, while using plasma spraying and subsequent high-energy processing, which allows to increase resistance of a thermal barrier coating to thermal cycling heat resistance of the coating at temperature of 1100 °C. This leads to longer protection of bottom layer against high-temperature exposure. The methodology is based on complex metallographic, X-ray diffraction and electron microscopy investigations of structural elements in composite plasma coatings of the ZrO2 – Y2O system. Resistance of plasma coatings (Мe – Cr – Al – Y/ZrO2 – Y2O3-type, used as TBC to protect gas turbine engine blades under conditions of frequent thermal cyclings is limited by cleavage of an outer ceramic layer. Structural and electron microprobe investigations have shown that as a result of thermal cycling an outer atmosphere due to porous structure of the ceramic coating layer, migrates to the surface of lower metal coating, causing its oxidation. As a result, the metal-ceramic Al2O3 layer is formed at a metal-ceramic interface and it changes a stress state of the coating that causes a reduction of protective properties. Thus, a high heat resistance of thermal barrier coatings depends on processes occurring at the interface between metal and ceramic coating layers. A laser impact on samples with TBC leads to changes in the structure of the oxide layer of ZrO2 – Y2O3. In this case its initial surface characterized by considerable relief is significantly flattened due to processing and the coating is fractured and it is separated in fragments. As the oxide coating has low thermal conductivity, and the time of laser exposure is about 10–3 sec, a heat flux

  9. Persistence of oral coatings of CMC and starch-based custard desserts

    NARCIS (Netherlands)

    Wijk, de R.A.; Kapper, C.; Borsboom, P.; Prinz, J.F.

    2009-01-01

    Food coatings that remain after swallowing starch-based or CMC-based custard desserts were investigated for 19 subjects. Foods were orally processed for 5 s using a pre-defined protocol, after which the food was swallowed. The remaining food coating was assessed sensorially as well as instrumentally

  10. Characterization of Fe-based alloy coating deposited by supersonic plasma spraying

    International Nuclear Information System (INIS)

    Piao, Zhong-yu; Xu, Bin-shi; Wang, Hai-dou; Wen, Dong-hui

    2013-01-01

    Highlights: • Fe-based coating exhibited few oxides, high density and bond strength. • Amorphous/nanocrystalline phases were found in the coating. • Formation mechanism of excellent coating was investigated. -- Abstract: The objective of the present study is to characterize the Fe-based alloy coating deposited by the supersonic plasma spraying process. The condition of the melting particles was in situ monitored. The microstructure of the coating was examined by scanning electron microscope and high resolution transmission electron microscope. The phase composition was examined by X-ray diffraction. The microhardness and porosity were also measured, respectively. Results show the prepared coatings have excellent properties, such as few oxides, high microhardness and a low porosity amount. At the same time, a mass of amorphous/nanocrystalline phases was found in the coating. The mechanism of the formation of amorphous/nanocrystalline phases was investigated. The appropriate material composition of spraying material and flash set process of plasma spraying are the key factors. Moreover, the mechanism for oxidation resistance is also investigated, where the separation between melting metal and oxygen by the formation of SiO 2 films is the key factor

  11. Review of Research Work on Ti-BASED Composite Coatings

    Science.gov (United States)

    Gabbitas, Brian; Salman, Asma; Zhang, Deliang; Cao, Peng

    The service life of industrial components is limited predominantly by Chemical corrosion/mechanical wear. The project is concerned with the investigation of the capability of Ti(Al,O)/Al2O3 coatings to improve the service life of tool steel (H13) used for dies in aluminium high pressure die casting. This paper gives a general review on the research work conducted at the University of Waikato on producing and evaluating the titanium/alumina based composite coatings. The powder feedstocks for making the composite coatings were produced by high energy mechanical milling of a mixture of Al and TiO2 powders in two different molar ratios followed by a thermal reaction process. The feedstocks were then thermally sprayed using a high velocity air-fuel (HVAF) technique on H13 steel substrates to produce a Ti(Al,O)/Al2O3 composite coatings. The performance of the coating was assessed in terms of thermal shock resistance and reaction kinetics with molten aluminium. The composite powders and coatings were characterized using scanning electron microscopy (SEM), optical microscopy and X-ray diffractometry (XRD).

  12. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  13. Effect of Dipping and Vacuum Impregnation Coating Techniques with Alginate Based Coating on Physical Quality Parameters of Cantaloupe Melon.

    Science.gov (United States)

    Senturk Parreidt, Tugce; Schmid, Markus; Müller, Kajetan

    2018-04-01

    Edible coating based on sodium alginate solution was applied to fresh-cut cantaloupe melon by dipping and vacuum impregnation coating methods. One aim of this work is to produce more technical information concerning these conventional and novel coating processes. For this purpose, the effect of various coating parameters (dipping time, draining time, time length of the vacuum period, vacuum pressure, atmospheric restoration time) with several levels on physical quality parameters (percentage of weight gain, color, and texture) of noncoated and coated samples were determined in order to define adequate coating process parameters to achieve a successful coating application. Additionally, the effects of dipping and vacuum impregnation processes were compared. Both processes improved the firmness of the melon pieces. However, vacuum impregnation application had higher firmness and weight gain results, and had significant effect (P coating technique and the parameters used significantly affect the physical quality characteristics of coated food products. The work presented produced more technical information concerning dipping and vacuum impregnation coating techniques, along with evaluating the effects of various coating parameters with several levels. The results revealed that vacuum impregnation technique is a successful coating method; however the effects should be carefully assessed for each product. © 2018 Institute of Food Technologists®.

  14. Thermal barrier coatings with a double-layer bond coat on Ni{sub 3}Al based single-crystal superalloy

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Xin [State Key Laboratory of Rare Earth Resource Utilization, Changchun Institute of Applied Chemistry, Chinese Academy of Sciences, Changchun 130022 (China); University of Chinese Academy of Sciences, Beijing 100049 (China); Beijing Institute of Aeronautical Materials, Department 5, P.O. Box 81-5, Beijing 100095 (China); Xu, Zhenhua; Mu, Rende [Beijing Institute of Aeronautical Materials, Department 5, P.O. Box 81-5, Beijing 100095 (China); He, Limin, E-mail: he_limin@yahoo.com [Beijing Institute of Aeronautical Materials, Department 5, P.O. Box 81-5, Beijing 100095 (China); Huang, Guanghong [Beijing Institute of Aeronautical Materials, Department 5, P.O. Box 81-5, Beijing 100095 (China); Cao, Xueqiang, E-mail: xcao@ciac.ac.cn [State Key Laboratory of Rare Earth Resource Utilization, Changchun Institute of Applied Chemistry, Chinese Academy of Sciences, Changchun 130022 (China)

    2014-04-05

    Highlights: • Thermal barrier coatings with a double-layer bond coat of (Ni,Pt)Al and NiCrAlYSi. • Good adherence at all interfaces within TBC system. • The underlying (Ni,Pt)Al layer can supply abundant Al content for the upper NiCrAlYSi layer. • Crack nucleation, propagation and coalescence lead to the failure of coating. -- Abstract: Electron-beam physical vapor deposited thermal barrier coatings (TBCs) with a double-layer bond coat of (Ni,Pt)Al and NiCrAlYSi were prepared on a Ni{sub 3}Al based single-crystal superalloy. Phase and cross-sectional microstructure of the developed coatings were studied by using X-ray diffraction (XRD) and scanning electron microscope (SEM), respectively. The experimental results show good adherence at all interfaces within this system. Furthermore, oxidation resistance and elements interdiffusion behavior of the double-layer bond coat were also investigated. The double-layer bond coat system exhibits a better scale adherence than the single layer bond coat systems since the underlying (Ni,Pt)Al layer can supply abundant Al for the upper NiCrAlYSi layer. Finally, thermal cycling behavior of the double-layer bond coat TBC was evaluated and the failure mechanism was discussed. Crack nucleation, propagation and coalescence caused by TGO growth stress and the thermal expansion mismatch stress between TGO and bond coat can be mainly responsible for the spallation of this coating.

  15. Characteristic Model-Based Robust Model Predictive Control for Hypersonic Vehicles with Constraints

    Directory of Open Access Journals (Sweden)

    Jun Zhang

    2017-06-01

    Full Text Available Designing robust control for hypersonic vehicles in reentry is difficult, due to the features of the vehicles including strong coupling, non-linearity, and multiple constraints. This paper proposed a characteristic model-based robust model predictive control (MPC for hypersonic vehicles with reentry constraints. First, the hypersonic vehicle is modeled by a characteristic model composed of a linear time-varying system and a lumped disturbance. Then, the identification data are regenerated by the accumulative sum idea in the gray theory, which weakens effects of the random noises and strengthens regularity of the identification data. Based on the regenerated data, the time-varying parameters and the disturbance are online estimated according to the gray identification. At last, the mixed H2/H∞ robust predictive control law is proposed based on linear matrix inequalities (LMIs and receding horizon optimization techniques. Using active tackling system constraints of MPC, the input and state constraints are satisfied in the closed-loop control system. The validity of the proposed control is verified theoretically according to Lyapunov theory and illustrated by simulation results.

  16. Organic coatings silane-based for AZ91D magnesium alloy

    International Nuclear Information System (INIS)

    Hu Junying; Li Qing; Zhong Xiankang; Li Longqin; Zhang Liang

    2010-01-01

    Organic coatings silane-based containing electron withdrawing group or electron donating group have been synthesized and evaluated as prospective surface treatments for AZ91D magnesium alloy by hydrolysis and condensation reaction of the different silanes. Electrochemical tests were employed to confirm the corrosion resistance ability of the two kinds of organic coatings. The results showed that the coating with electron donating group had better corrosion protection performance. On the basis of the spatial configuration and the density of charge of those silanes molecules which was obtained through Gaussian 03 procedure based on B3LYP and density functional theory, combining experiment results, the rational explanation was provided.

  17. The Anonymization Protection Algorithm Based on Fuzzy Clustering for the Ego of Data in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Mingshan Xie

    2017-01-01

    Full Text Available In order to enhance the enthusiasm of the data provider in the process of data interaction and improve the adequacy of data interaction, we put forward the concept of the ego of data and then analyzed the characteristics of the ego of data in the Internet of Things (IOT in this paper. We implement two steps of data clustering for the Internet of things; the first step is the spatial location of adjacent fuzzy clustering, and the second step is the sampling time fuzzy clustering. Equivalent classes can be obtained through the two steps. In this way we can make the data with layout characteristics to be classified into different equivalent classes, so that the specific location information of the data can be obscured, the layout characteristics of tags are eliminated, and ultimately anonymization protection would be achieved. The experimental results show that the proposed algorithm can greatly improve the efficiency of protection of the data in the interaction with others in the incompletely open manner, without reducing the quality of anonymization and enhancing the information loss. The anonymization data set generated by this method has better data availability, and this algorithm can effectively improve the security of data exchange.

  18. Corrosion behaviour and galvanic coupling with steel of Al-based coating alternatives to electroplated cadmium

    Energy Technology Data Exchange (ETDEWEB)

    Fasuba, O.A.; Yerokhin, A., E-mail: A.Yerokhin@sheffield.ac.uk; Matthews, A.; Leyland, A.

    2013-08-15

    The galvanic corrosion behaviour of bare steel coupled to steel with an Al–Zn flake inorganic spin coating, an Al-based slurry sprayed coating, an arc sprayed Al coating and electroplated cadmium has been investigated. The sacrificial and galvanic behaviour of the coatings was studied in 3.5 wt. % NaCl solution using open-circuit potential, potentiodynamic polarisation and electrochemical noise measurements. The coatings were characterised by scanning electron microscopy, energy dispersive X-ray spectroscopy and X-ray diffraction. Experimental results showed that the Al-based slurry sprayed coating exhibited an open-circuit potential closer to the steel substrate than other coatings, as well as a low corrosion current density and a more positive corrosion potential. In terms of the galvanic suitability of the investigated coatings for the steel substrate, both the Al–Zn flake inorganic spin coating and the Al-based slurry sprayed coating show low galvanic current, in comparison with the arc sprayed Al coating and electroplated cadmium. This behaviour confirms their superior cathodic protection capability and galvanic compatibility over other coatings tested. Electrochemical noise measurements provide accurate information on the coatings' galvanic behaviour, which can be complimented by the data obtained from superposition of potentiodynamic corrosion scans of the coating and bare steel, provided that the corrosion potential difference between the two materials does not exceed 300 mV. - Highlights: • Al-based slurry coating has best galvanic compatibility with steel. • Mg, Cr, P in Al-based slurry coating reinforce its corrosion resistance. • Ennoblement of Al–Zn flake coating compromises its cathodic protection. • Poor corrosion behaviour of arc sprayed Al coating caused by rough morphology. • Electrochemical noise provides adequate estimates of galvanic behaviour.

  19. Reliability based topology optimization for continuum structures with local failure constraints

    DEFF Research Database (Denmark)

    Luo, Yangjun; Zhou, Mingdong; Wang, Michael Yu

    2014-01-01

    This paper presents an effective method for stress constrained topology optimization problems under load and material uncertainties. Based on the Performance Measure Approach (PMA), the optimization problem is formulated as to minimize the objective function under a large number of (stress......-related) target performance constraints. In order to overcome the stress singularity phenomenon caused by the combined stress and reliability constraints, a reduction strategy on target reliability index is proposed and utilized together with the ε-relaxation approach. Meanwhile, an enhanced aggregation method...... is employed to aggregate the selected active constraints using a general K–S function, which avoids expensive computational cost from the large-scale nature of local failure constraints. Several numerical examples are given to demonstrate the validity of the present method....

  20. Environmentally friendly hybrid coatings for corrosion protection: silane based pre-treatments and nanostructured waterborne coatings

    OpenAIRE

    Fedel, Michele

    2009-01-01

    This thesis considers a nanotechnology approach based on the production of metals pre-treatments and organic coatings (a complete protection system at all) designed from the nanoscale. The final aim is to develop protection systems with improved corrosion protection properties and a low environmental impact. In particular, multifunctional silane hybrid molecules were used to design sol-gel pre-treatments for metals and to modify the inner structure of UV curable waterborne organic coatings...

  1. Zirconia based ceramic coating on a metal with plasma electrolytic oxidation

    Science.gov (United States)

    Akatsu, T.; Kato, T.; Shinoda, Y.; Wakai, F.

    2011-10-01

    We challenge to fabricate a thermal barrier coating (TBC) made of ZrO2 based ceramics on a Ni based single crystal superalloy with plasma electrolytic oxidation (PEO) by incorporating metal species from electrolyte into the coating. The PEO process is carried out on the superalloy galvanized with aluminium for 15min in Na4O7P4 solution for an oxygen barrier coating (OBC) and is followed by PEO in K2[Zr(CO3)2(OH)2] solution for TBC. We obtained the following results; (1) Monoclinic-, tetragonal-, cubic-ZrO2 crystals were detected in TBC. (2) High porosity with large pores was observed near the interface between OBC and TBC. The fine grain structure with a grain size of about 300nm was typically observed. (3) The adhesion strength between PEO coatings and substrate was evaluated to be 26.8±6.6MPa. At the adhesion strength test, PEO coatings fractured around the interface between OBC and TBC. The effect of coating structure on adhesion strength is explained through the change in spark discharge during PEO process.

  2. Bayesian modeling of consumer behavior in the presence of anonymous visits

    Science.gov (United States)

    Novak, Julie Esther

    Tailoring content to consumers has become a hallmark of marketing and digital media, particularly as it has become easier to identify customers across usage or purchase occasions. However, across a wide variety of contexts, companies find that customers do not consistently identify themselves, leaving a substantial fraction of anonymous visits. We develop a Bayesian hierarchical model that allows us to probabilistically assign anonymous sessions to users. These probabilistic assignments take into account a customer's demographic information, frequency of visitation, activities taken when visiting, and times of arrival. We present two studies, one with synthetic and one with real data, where we demonstrate improved performance over two popular practices (nearest-neighbor matching and deleting the anonymous visits) due to increased efficiency and reduced bias driven by the non-ignorability of which types of events are more likely to be anonymous. Using our proposed model, we avoid potential bias in understanding the effect of a firm's marketing on its customers, improve inference about the total number of customers in the dataset, and provide more precise targeted marketing to both previously observed and unobserved customers.

  3. Similarities and differences in coatings for magnesium-based stents and orthopaedic implants

    Directory of Open Access Journals (Sweden)

    Jun Ma

    2014-07-01

    Full Text Available Magnesium (Mg-based biodegradable materials are promising candidates for the new generation of implantable medical devices, particularly cardiovascular stents and orthopaedic implants. Mg-based cardiovascular stents represent the most innovative stent technology to date. However, these products still do not fully meet clinical requirements with regards to fast degradation rates, late restenosis, and thrombosis. Thus various surface coatings have been introduced to protect Mg-based stents from rapid corrosion and to improve biocompatibility. Similarly, different coatings have been used for orthopaedic implants, e.g., plates and pins for bone fracture fixation or as an interference screw for tendon-bone or ligament-bone insertion, to improve biocompatibility and corrosion resistance. Metal coatings, nanoporous inorganic coatings and permanent polymers have been proved to enhance corrosion resistance; however, inflammation and foreign body reactions have also been reported. By contrast, biodegradable polymers are more biocompatible in general and are favoured over permanent materials. Drugs are also loaded with biodegradable polymers to improve their performance. The key similarities and differences in coatings for Mg-based stents and orthopaedic implants are summarized.

  4. A dual response surface optimization methodology for achieving uniform coating thickness in powder coating process

    Directory of Open Access Journals (Sweden)

    Boby John

    2015-09-01

    Full Text Available The powder coating is an economic, technologically superior and environment friendly painting technique compared with other conventional painting methods. However large variation in coating thickness can reduce the attractiveness of powder coated products. The coating thickness variation can also adversely affect the surface appearance and corrosion resistivity of the product. This can eventually lead to customer dissatisfaction and loss of market share. In this paper, the author discusses a dual response surface optimization methodology to minimize the thickness variation around the target value of powder coated industrial enclosures. The industrial enclosures are cabinets used for mounting the electrical and electronic equipment. The proposed methodology consists of establishing the relationship between the coating thickness & the powder coating process parameters and developing models for the mean and variance of coating thickness. Then the powder coating process is optimized by minimizing the standard deviation of coating thickness subject to the constraint that the thickness mean would be very close to the target. The study resulted in achieving a coating thickness mean of 80.0199 microns for industrial enclosures, which is very close to the target value of 80 microns. A comparison of the results of the proposed approach with that of existing methodologies showed that the suggested method is equally good or even better than the existing methodologies. The result of the study is also validated with a new batch of industrial enclosures.

  5. Compatibility of Adlerian Theory and Practice with the Philosophy and Practices of Alcoholics Anonymous.

    Science.gov (United States)

    Carroll, Jane J.

    1999-01-01

    Tenets of Adlerian theory and practice are compatible with the philosophy and practices of Alcoholics Anonymous. Counselors can expect treatment approaches based on Adlerian counseling theory to be congruent with 12-step practices of individuals who are in recovery from alcohol dependence. (Author)

  6. An Efficient Energy Constraint Based UAV Path Planning for Search and Coverage

    Directory of Open Access Journals (Sweden)

    German Gramajo

    2017-01-01

    Full Text Available A path planning strategy for a search and coverage mission for a small UAV that maximizes the area covered based on stored energy and maneuverability constraints is presented. The proposed formulation has a high level of autonomy, without requiring an exact choice of optimization parameters, and is appropriate for real-time implementation. The computed trajectory maximizes spatial coverage while closely satisfying terminal constraints on the position of the vehicle and minimizing the time of flight. Comparisons of this formulation to a path planning algorithm based on those with time constraint show equivalent coverage performance but improvement in prediction of overall mission duration and accuracy of the terminal position of the vehicle.

  7. Novel Base Metal-Palladium Catalytic Diesel Filter Coating with NO2 Reducing Properties

    DEFF Research Database (Denmark)

    Johansen, K.; Dahl, S.; Mogensen, G.

    2007-01-01

    A novel alternative base metal/palladium coat has been developed that has limited NO2 formation and which even removes NO2 in a wide temperature range.Soot combustion, HC conversion and CO conversion properties are comparable to current platinum based solutions but the coating has a more attracti...... solutions. Furthermore, durability results from base metal/Pd coated DPFs installed on operating taxis and related tests cycle data is given....

  8. Epoxy-based broadband anti-reflection coating for millimeter-wave optics

    OpenAIRE

    Rosen, Darin; Suzuki, Aritoki; Keating, Brian; Krantz, William; Lee, Adrian T.; Quealy, Erin; Richards, Paul L.; Siritanasak, Praween; Walker, William

    2013-01-01

    We have developed epoxy-based, broadband anti-reflection coatings for millimeter-wave astrophysics experiments with cryogenic optics. By using multiple-layer coatings where each layer steps in dielectric constant, we achieved low reflection over a wide bandwidth. We suppressed the reflection from an alumina disk to 10% over fractional bandwidths of 92% and 104% using two-layer and three-layer coatings, respectively. The dielectric constants of epoxies were tuned between 2.06 and 7.44 by mixin...

  9. Thermal Conductivity and Wear Behavior of HVOF-Sprayed Fe-Based Amorphous Coatings

    Directory of Open Access Journals (Sweden)

    Haihua Yao

    2017-10-01

    Full Text Available To protect aluminum parts in vehicle engines, metal-based thermal barrier coatings in the form of Fe59Cr12Nb5B20Si4 amorphous coatings were prepared by high velocity oxygen fuel (HVOF spraying under two different conditions. The microstructure, thermal transport behavior, and wear behavior of the coatings were characterized simultaneously. As a result, this alloy shows high process robustness during spraying. Both Fe-based coatings present dense, layered structure with porosities below 0.9%. Due to higher amorphous phase content, the coating H-1 exhibits a relatively low thermal conductivity, reaching 2.66 W/(m·K, two times lower than the reference stainless steel coating (5.85 W/(m·K, indicating a good thermal barrier property. Meanwhile, the thermal diffusivity of amorphous coatings display a limited increase with temperature up to 500 °C, which guarantees a steady and wide usage on aluminum alloy. Furthermore, the amorphous coating shows better wear resistance compared to high carbon martensitic GCr15 steel at different temperatures. The increased temperature accelerating the tribological reaction, leads to the friction coefficient and wear rate of coating increasing at 200 °C and decreasing at 400 °C.

  10. Silane-based coatings on the pyrite for remediation of acid mine drainage.

    Science.gov (United States)

    Diao, Zenghui; Shi, Taihong; Wang, Shizhong; Huang, Xiongfei; Zhang, Tao; Tang, Yetao; Zhang, Xiaying; Qiu, Rongliang

    2013-09-01

    Acid mine drainage (AMD) resulting from the oxidation of pyrite and other metal sulfides has caused significant environmental problems, including acidification of rivers and streams as well as leaching of toxic metals. With the goal of controlling AMD at the source, we evaluated the potential of tetraethylorthosilicate (TEOS) and n-propyltrimethoxysilane (NPS) coatings to suppress pyrite oxidation. The release of total Fe and SO4(-2) from uncoated and coated pyrite in the presence of a chemical oxidizing agent (H2O2) or iron-oxidizing bacteria (Acidithiobacillus ferrooxidans) was measured. Results showed that TEOS- and NPS-based coatings reduced chemical oxidation of pyrite by as much as 59 and 96% (based on Fe release), respectively, while biological oxidation of pyrite was reduced by 69 and 95%, respectively. These results were attributed to the formation of a dense network of Fe-O-Si and Si-O-Si bonds on the pyrite surface that limited permeation of oxygen, water, and bacteria. Compared with results for TEOS-coated pyrite, higher pH and lower concentrations of total Fe and SO4(-2) were observed for oxidation of NPS-coated pyrite, which was attributed to its crack-free morphology and the presence of hydrophobic groups on the NPS-based coating surface. The silane-based NPS coating was shown to be highly effective in suppressing pyrite oxidation, making it a promising alternative for remediation of AMD at its source. Copyright © 2013 Elsevier Ltd. All rights reserved.

  11. Browsing the Internet: good-bye anonymity!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Do you consider browsing the Internet to be your private business? When visiting random web-sites, how far do you assume you are anonymous? Would it matter to you that Google or Facebook can profile your browsing behaviour in order to better target you with advertisements? Did you notice that you already get targeted ads when you are logged on to Google or Facebook even if you are visiting completely different websites? If matters to you, note that browsing anonymously on the Internet is far from easy.   When you are connected to the Internet, you give away a variety of information: your PC’s IP address, some browser settings like language or screen size, and, probably, your login information. So how private is private? You might argue that your current IP address has been picked from a pool of addresses and therefore regularly changes, so it does not necessarily always pinpoint you. On the other hand, with the dawn of IPv6 there is no need any more for shared IP addresses as the...

  12. Microstructural Characteristics and Tribological Behavior of HVOF-Sprayed Novel Fe-Based Alloy Coatings

    Directory of Open Access Journals (Sweden)

    Andrea Milanti

    2014-01-01

    Full Text Available Thermally-sprayed Fe-based coatings have shown their potential for use in wear applications due to their good tribological properties. In addition, these kinds of coatings have other advantages, e.g., cost efficiency and positive environmental aspects. In this study, the microstructural details and tribological performances of Fe-based coatings (Fe-Cr-Ni-B-C and Fe-Cr-Ni-B-Mo-C manufactured by High Velocity Oxygen Fuel (HVOF thermal spray process are evaluated. Traditional Ni-based (Ni-Cr-Fe-Si-B-C and hard-metal (WC-CoCr coatings were chosen as references. Microstructural investigation (field-emission scanning electron microscope FESEM and X-Ray diffractometry XRD reveals a high density and low oxide content for HVOF Fe-based coatings. Particle melting and rapid solidification resulted in a metastable austenitic phase with precipitates of mixed carbides and borides of chromium and iron which lead to remarkably high nanohardness. Tribological performances were evaluated by means of the ball on-disk dry sliding wear test, the rubber-wheel dry particle abrasion test, and the cavitation erosion wear test. A higher wear resistance validates Fe-based coatings as a future alternative to the more expensive and less environmentally friendly Ni-based alloys.

  13. Anonymous Web Browsing and Hosting

    OpenAIRE

    MANOJ KUMAR; ANUJ RANI

    2013-01-01

    In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our browsing faster and secure. Web application which play important role for transferring our secret information including like email need more and more security concerns. This paper also describes that ho...

  14. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  15. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  16. Fieldale-Collinsville Middle School: Banishing Anonymity

    Science.gov (United States)

    Principal Leadership, 2010

    2010-01-01

    It is no accident that the staff at Fieldale-Collinsville Middle School adopted a central tenet of "Breaking Ranks in the Middle"--to banish anonymity by creating a personalized learning environment for all of its students. The school was created six years ago when the four middle schools in Henry County, VA, were consolidated into two…

  17. Social Media and Higher Education: The Problem of Anonymous Electronic Threats to the Campus Community

    Science.gov (United States)

    Reynolds, Cristin Lee; Platt, R. Eric; Malone Schaffer, Lenore; Foster, Holly

    2017-01-01

    This case is for use in graduate courses pertaining to student affairs and higher education administration. It presents challenges higher education professionals face concerning anonymous social media, and specifically how threats made through anonymous social media platforms such as Yik Yak affect the entire university community. The anonymity of…

  18. A robust anonymous biometric-based remote user authentication scheme using smart cards

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2015-04-01

    Full Text Available Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system. In 2012, An proposed an enhanced biometric-based remote user authentication scheme using smart cards. It was claimed that the proposed scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. In this paper, we first analyze the security of An’s scheme and we show that this scheme has three serious security flaws in the design of the scheme: (i flaw in user’s biometric verification during the login phase, (ii flaw in user’s password verification during the login and authentication phases, and (iii flaw in user’s password change locally at any time by the user. Due to these security flaws, An’s scheme cannot support mutual authentication between the user and the server. Further, we show that An’s scheme cannot prevent insider attack. In order to remedy the security weaknesses found in An’s scheme, we propose a new robust and secure anonymous biometric-based remote user authentication scheme using smart cards. Through the informal and formal security analysis, we show that our scheme is secure against all possible known attacks including the attacks found in An’s scheme. The simulation results of our scheme using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool ensure that our scheme is secure against passive and active attacks. In addition, our scheme is also comparable in terms of the communication and computational overheads with An’s scheme and other related existing schemes. As a result, our scheme is more appropriate for practical applications compared to other approaches.

  19. An intelligent anticorrosion coating based on pH-responsive supramolecular nanocontainers

    International Nuclear Information System (INIS)

    Chen Tao; Fu Jiajun

    2012-01-01

    The hollow mesoporous silica nanoparticles (HMSNs), which have been used as the nanocontainers for the corrosion inhibitor, benzotriazole, were fabricated using the hard-template method. Alkaline-responsive HMSNs based on cucurbit[6]uril (CB[6])/bisammonium supramolecular complex and acid-responsive HMSNs based on α-cyclodextrin (α-CD)/aniline supramolecular complex, which operate in water, have been achieved and characterized by solid-state NMR, thermogravimetry analysis, scanning electron microscopy, transmission electron microscopy and N 2 adsorption-desorption analysis. The two elaborately designed nanocontainers show the pH-controlled encapsulation/release behaviors for benzotriazole molecules. Equal amounts of the alkaline- and acid-responsive nanocontainers were uniformly distributed in the hybrid zirconia-silica sol–gel coating and thus formed the intelligent anticorrosion coating. The self-healing property of AA2024 alloy coated with the intelligent anticorrosion coating is evaluated by electrochemical impedance spectroscopy (EIS). The sol–gel coating doped with the pH-responsive nanocontainers clearly demonstrates long-term corrosion protection performances when compared to the undoped sol–gel coating, which is attributed to the release of corrosion inhibitor from the nanocontainers after feeling the changes of environmental pH values near the corroded areas. (paper)

  20. Executable specifications for hypothesis-based reasoning with Prolog and Constraint Handling Rules

    DEFF Research Database (Denmark)

    Christiansen, Henning

    2009-01-01

    Constraint Handling Rules (CHR) is an extension to Prolog which opens up a  spectrum of hypotheses-based reasoning in logic programs without additional interpretation overhead. Abduction with integrity constraints is one example of hypotheses-based reasoning which can be implemented directly...... in Prolog and CHR with a straightforward use of available and efficiently implemented facilities The present paper clarifies the semantic foundations for this way of doing abduction in CHR and Prolog as well as other examples  of hypotheses-based reasoning that is possible, including assumptive logic...

  1. Zr-based conversion coatings for multi-metal substrates

    NARCIS (Netherlands)

    Cerezo Palacios, J.M.

    2015-01-01

    In this PhD work, a new surface treatment based on the application of Zr-based conversion coatings by immersion in a Cu containing Zr-based conversion solution was investigated as a replacement of the traditional phosphating process for the automotive industry. Nowadays most of the cars are made of

  2. Palladium coated fibre Bragg grating based hydrogen sensor

    International Nuclear Information System (INIS)

    Kasinathan, M.; Sosamma, S.; Kishore, S.; Elumalai, V.; Krishnan, R.; Babu Rao, C.; Dash, Sitaram; Murali, N.; Jayakumar, T.

    2011-01-01

    Detection of steam generator leaks in fast nuclear reactors is carried out by monitoring hydrogen in argon cover-gas. Hydrogen released during sodium cleaning of fast reactor components is required to be monitored. Hydrogen sensors with good sensitivity, stability and response time are required for all the above applications. We report a new type of hydrogen sensor with a Fibre Bragg Grating (FBG) coated with palladium thin film which is used to detect the leak of hydrogen gas in the Steam Generator (SG) module of the Fast Breeder Reactor (FBR). If water leaks into sodium, it results in sodium-water reaction. In this reaction hydrogen and sodium hydroxide are formed. Due to the explosive risk of hydrogen system, hydrogen sensors are of great interest in this case. It is known that hydrogen forms an explosive mixture with air once its concentration exceeds beyond the explosion limit of four percent. The advantages of FBG based hydrogen sensor over the other hydrogen sensors are its inherent property of safety from sparking, immunity to ambient electromagnetic interference. The sensing mechanism in this device is based on mechanical strain that is induced in the palladium coating when it absorbs hydrogen. This process physically stretches the grating and causes the grating period and grating's refractive index, to change. The Bragg wavelength shift is directly proportional to the strain induced and can be directly related to the percentage of hydrogen exposure. The online monitoring of palladium thin film coating on FBG is carried out and recorded the wavelength change and strain induced on the FBG. A hydrogen sensor set up have been fabricated which consists of SS vessel of capacity 10 litres, provided with pressure gauge, Argon filling line with a valve, Hydrogen injection line with flange, a vent line with valve and Hydrogen sensor fixing point. The Palladium coated FBG based Hydrogen sensor is tested in this experimental facility in the exposure of hydrogen in

  3. A constraints-based approach to the acquisition of expertise in outdoor adventure sports

    NARCIS (Netherlands)

    Davids, Keith; Brymer, Eric; Seifert, Ludovic; Orth, Dominic

    2013-01-01

    A constraints-based framework enables a new understanding of expertise in outdoor adventure sports by considering performer-environment couplings through emergent and self-organizing behaviours in relation to interacting constraints. Expert adventure athletes, conceptualized as complex, dynamical

  4. A bioplastic-based seed coating improves seedling growth and reduces production of coated seed dust. Journal of Crop Improvement

    Science.gov (United States)

    Although recently introduced, film-coating of agronomic seeds is now widely accepted in modern agriculture as an effective technology for protecting germinating seeds and seedlings. These experiments explored the possibility of using a bioplastic-based formulation to film-coat corn (maize) and cano...

  5. Development of silicide coating over molybdenum based refractory alloy and its characterization

    International Nuclear Information System (INIS)

    Chakraborty, S.P.; Banerjee, S.; Sharma, I.G.; Suri, A.K.

    2010-01-01

    Molybdenum based refractory alloys are potential candidate materials for structural applications in high temperature compact nuclear reactors and fusion reactors. However, these alloys being highly susceptible to oxidation in air or oxygen at elevated temperature, undergoes severe losses from highly volatile molybdenum trioxide species. Present investigation, therefore, examines the feasibility of development of silicide type of coating over molybdenum base TZM alloy shape (Mo > 99 wt.%) using pack cementation coating technique. TZM alloy was synthesized in this laboratory from oxide intermediates of MoO 2 , TiO 2 and ZrO 2 in presence of requisite amount of carbon, by alumino-thermic reduction smelting technique. The arc melted and homogenized samples of TZM alloy substrate was then embedded in the chosen and intimately mixed pack composition consisting of inert matrix (Al 2 O 3 ), coating powder (Si) and activator (NH 4 Cl) taken in the judicious proportion. The sealed charge packs contained in an alumina crucible were heated at temperatures of 1000 o C for 8-16 h heating cycle to develop the coating. The coating phase was confirmed to be of made of MoSi 2 by XRD analysis. The morphology of the coating was studied by SEM characterization. It had revealed that the coating was diffusion bonded where Si from coating diffused inward and Mo from TZM substrate diffused outward to form the coating. The coating was found to be resistant to oxidation when tested in air up to 1200 o C. A maximum 100 μm of coating thickness was achieved on each side of the substrate.

  6. Constrained Optimization Based on Hybrid Evolutionary Algorithm and Adaptive Constraint-Handling Technique

    DEFF Research Database (Denmark)

    Wang, Yong; Cai, Zixing; Zhou, Yuren

    2009-01-01

    A novel approach to deal with numerical and engineering constrained optimization problems, which incorporates a hybrid evolutionary algorithm and an adaptive constraint-handling technique, is presented in this paper. The hybrid evolutionary algorithm simultaneously uses simplex crossover and two...... mutation operators to generate the offspring population. Additionally, the adaptive constraint-handling technique consists of three main situations. In detail, at each situation, one constraint-handling mechanism is designed based on current population state. Experiments on 13 benchmark test functions...... and four well-known constrained design problems verify the effectiveness and efficiency of the proposed method. The experimental results show that integrating the hybrid evolutionary algorithm with the adaptive constraint-handling technique is beneficial, and the proposed method achieves competitive...

  7. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    Directory of Open Access Journals (Sweden)

    Balázs Bodó

    2014-11-01

    Full Text Available This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs. Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of online political activism. Through the short summary of the ad-hoc vigilante group Anonymous, this article describes hacktivism 1.0 as electronic civil disobedience conducted by outsiders. Through the analysis of Wikileaks, the anonymous whistleblowing website, it describes how strong PETs enable the development of hacktivism 2.0, where the source of threat is shifted from outsiders to insiders. Insiders have access to documents with which power can be exposed, and who, by using PETs, can anonymously engage in political action. We also describe the emergence of a third generation of hacktivists who use PETs to disengage and create their own autonomous spaces rather than to engage with power through anonymous whistleblowing.

  8. Lab Coats or Trench Coats? Detective Sleuthing as an Alternative to Scientifically Based Research in Indigenous Educational Communities

    Science.gov (United States)

    Kaomea, Julie

    2013-01-01

    Amidst late 19th-century efforts to emphasize modern medicine's transition to a more scientific approach, physicians seeking to represent themselves as scientists began wearing white laboratory coats. Today educational researchers are likewise urged to don metaphorical white coats as scientifically based research is held up as the cure-all for our…

  9. Botnet detection and prevention in anonymous networks

    NARCIS (Netherlands)

    Kuhnert, Katharina; Steinberger, Jessica; Baier, Harald

    Botnets are a major threat to the Internet landscape and have been responsible for large scale distributed attacks on online services. To make take down measures more difficult, Botnet operators started to incorporate anonymous networks into their software to protect their users and their Botnets.

  10. Pesticidal seed coats based on azadirachtin-A: release kinetics, storage life and performance.

    Science.gov (United States)

    Nisar, Keyath; Kumar, Jitendra; Arun Kumar, M B; Walia, Suresh; Shakil, Najam A; Parsad, Rajender; Parmar, Balraj S

    2009-02-01

    Infestation of seeds by pests during storage leads to deterioration in quality. Seed coating is an effective option to overcome the menace. Unlike synthetic fungicidal seed coats, little is known of those based on botanicals. This study aims at developing azadirachtin-A-based pesticidal seed coats to maintain seed quality during storage. Polymer- and clay-based coats containing azadirachtin-A were prepared and evaluated for quality maintenance of soybean seed during storage. Gum acacia, gum tragacanth, rosin, ethyl cellulose, hydroxyethyl cellulose, polyethyl methacrylate, methyl cellulose, polyethylene glycol, polyvinyl chloride, polyvinyl acetate, polyvinyl pyrrolidone and Agrimer VA 6 polymers and the clay bentonite were used as carriers. The time for 50% release (t(1/2)) of azadirachtin-A into water from the seeds coated with the different coats ranged from 8.02 to 21.36 h. The half-life (T(1/2)) of azadirachtin-A in the coats on seed ranged from 4.37 to 11.22 months, as compared with 3.45 months in azadirachtin-A WP, showing an increase by a factor of nearly 1.3-3.3 over the latter. The coats apparently acted as a barrier to moisture to reduce azadirachtin-A degradation and prevented proliferation of storage fungi. Polyethyl methacrylate, polyvinyl acetate and polyvinyl pyrrolidone were significantly superior to the other polymers. Azadirachtin-A showed a significant positive correlation with seed germination and vigour, and negative correlation with moisture content. Effective polymeric carriers for seed coats based on azadirachtin-A are reported. These checked seed deterioration during storage by acting as a barrier to moisture and reduced the degradation of azadirachtin-A.

  11. Annotation and Anonymity: Playful Photo-Sharing by Visiting Groups of Teenagers

    OpenAIRE

    Rowland, Duncan; Appiah-Kubi, Kwamena; Shipp, Victoria; Mortier, Richard Michael; Benford, Steve

    2015-01-01

    This paper investigates the playful photo taking behaviour of teenagers during group visits to two touristic public events (an airshow and a guided tour of a museum). These studies provide the feedback for the iterative development of a smartphone based anonymous image annotation and sharing application. The resulting implications for the design of such photo systems are examined, specifically the appropriateness of opportunistic upload for social media. Playfulness in photography has many im...

  12. Active Layer Spin Coating Speed Dependence of Inverted Organic Solar Cell Based on Eosin-Y-Coated ZnO Nanorod Arrays

    Science.gov (United States)

    Ginting, R. T.; Yap, C. C.; Yahaya, M.; Fauzia, V.; Salleh, M. M.

    2013-04-01

    The active layer spin coating speed dependence of the performance of inverted organic solar cells (OSCs) based on Eosin-Y-coated ZnOnanorods has been investigated. An active layer consisted of poly(2-methoxy-5-(2'-ethyl)-hexyloxy-p-phenylenevinylene) (MEH-PPV) as donor and phenyl-c61-butyric acid methyl ester (PCBM) as acceptor was employed, whereas ZnO nanorods were utilized as electron transporting layer. The active layer was deposited on top of Eosin-Y-coated ZnO nanorods with various spin coating speeds (1000-4000 rpm). Inverted OSCs with a structure of FTO/Eosin-Y-coated ZnO nanorods/MEH-PPV:PCBM /Ag were characterized through the current density-voltage (J-V) measurement under illumination intensity of 100 mW/cm2. Based on the investigation, the short circuit current density (Jsc) and the power conversion efficiency (PCE) enhanced significantly, where as fill factor slightly increased with spin coating speed. The two-diode equivalent model was found to fit the experimental J-V curves very well. The optimum PCE of 1.18 ± 0.07% was achieved at the highest spin coating speed of 4000 rpm, as a result of the decrement of diffusion current density (Jdiff), recombination current density (Jrec), and ideality factor, thus further confirms the strong built-in electric field in thinner photoactive layer.

  13. Is cyberbullying worse than traditional bullying? Examining the differential roles of medium, publicity, and anonymity for the perceived severity of bullying.

    Science.gov (United States)

    Sticca, Fabio; Perren, Sonja

    2013-05-01

    Cyberbullying, a modern form of bullying performed using electronic forms of contact (e.g., SMS, MMS, Facebook, YouTube), has been considered as being worse than traditional bullying in its consequences for the victim. This difference was mainly attributed to some specific aspect that are believed to distinguish cyberbullying from traditional bullying: an increased potential for a large audience, an increased potential for anonymous bullying, lower levels of direct feedback, decreased time and space limits, and lower levels of supervision. The present studies investigated the relative importance of medium (traditional vs. cyber), publicity (public vs. private), and bully's anonymity (anonymous vs. not anonymous) for the perceived severity of hypothetical bullying scenarios among a sample of Swiss seventh- and eight-graders (study 1: 49% female, mean age = 13.7; study 2: 49% female, mean age = 14.2). Participants ranked a set of hypothetical bullying scenarios from the most severe one to the least severe one. The scenarios were experimentally manipulated based on the aspect of medium and publicity (study 1), and medium and anonymity (study 2). Results showed that public scenarios were perceived as worse than private ones, and that anonymous scenarios were perceived as worse than not anonymous ones. Cyber scenarios generally were perceived as worse than traditional ones, although effect sizes were found to be small. These results suggest that the role of medium is secondary to the role of publicity and anonymity when it comes to evaluating bullying severity. Therefore, cyberbullying is not a priori perceived as worse than traditional bullying. Implications of the results for cyberbullying prevention and intervention are discussed.

  14. Thermal barrier coatings issues in advanced land-based gas turbines

    Science.gov (United States)

    Parks, W. P.; Lee, W. Y.; Wright, I. G.

    1995-01-01

    The Department of Energy's Advanced Turbine System (ATS) program is aimed at forecasting the development of a new generation of land-based gas turbine systems with overall efficiencies significantly beyond those of current state-of-the-art machines, as well as greatly increased times between inspection and refurbishment, improved environmental impact, and decreased cost. The proposed duty cycle of ATS turbines will require the use of different criteria in the design of the materials for the critical hot gas path components. In particular, thermal barrier coatings will be an essential feature of the hot gas path components in these machines. While such coatings are routinely used in high-performance aircraft engines and are becoming established in land-based turbines, the requirements of the ATS turbine application are sufficiently different that significant improvements in thermal barrier coating technology will be necessary. In particular, it appears that thermal barrier coatings will have to function on all airfoil sections of the first stage vanes and blades to provide the significant temperature reduction required. In contrast, such coatings applied to the blades and vances of advanced aircraft engines are intended primarily to reduce air cooling requirements and extend component lifetime; failure of those coatings can be tolerated without jeopardizing mechanical or corrosion performance. A major difference is that in ATS turbines these components will be totally reliant on thermal barrier coatings which will, therefore, need to be highly reliable even over the leading edges of first stage blades. Obviously, the ATS program provides a very challenging opportunity for TBC's, and involves some significant opportunities to extend this technology.

  15. Interim policy on establishment and operation of internet open, anonymous information servers and services

    OpenAIRE

    Acting Dean of Computer and Information Services

    1995-01-01

    Purpose. To establish interim NPS general policy regarding establishment and operation of Open, Anonymous Information Servers and Services, such as World Wide Web (http), Gopher, Anonymous FTP, etc...

  16. Effects of V and Cr on Laser Cladded Fe-Based Coatings

    Directory of Open Access Journals (Sweden)

    Haiyang Wang

    2018-03-01

    Full Text Available Fe-based coatings with high V and Cr content were obtained by laser cladding using Fe-based powder with different Cr3C2 and FeV50 content. The results showed that Fe-based coatings were uniform and dense. The constituent phases were mainly composed of α-Fe solid solution with the increase of Cr3C2 and FeV50, γ-Fe and V8C7 phases were achieved. The microstructure of the coatings exhibited a typical dendrite structure. The concentration of C, V and Cr were saturated in dendritic areas, and the other alloying elements were mainly dissolved in the interdendritic areas. The hardness and wear resistance of Fe-based coatings were enhanced with the Cr3C2 and FeV50 addition. The specimen with 15% Cr3C2 and 16% FeV50 had the highest hardness of 66.1 ± 0.6 HRC, which was 1.05 times higher than the sample with 4.5% Cr3C2 and 5% FeV50, and the wear resistance of the former was three times greater than the latter.

  17. CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

    Directory of Open Access Journals (Sweden)

    Sowmiya Murthy

    2014-10-01

    Full Text Available We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving this goal, we propose a digital signature based authentication scheme with a decentralized architecture for distributed key management with multiple Key Distribution Centers. Homomorphic encryption scheme using Paillier public key cryptosystem is used for encrypting the data that is stored in the cloud. We incorporate a query driven approach for validating the access policies defined by an individual user for his/her data i.e. the access is granted to a requester only if his credentials matches with the hidden access policy. Further, since data is vulnerable to losses or damages due to the vagaries of the network, we propose an automatic retrieval mechanism where lost data is recovered by data replication and file replacement with string matching algorithm. We describe a prototype implementation of our proposed model.

  18. Alcoholics Anonymous and twelve-step recovery: a model based on social and cognitive neuroscience.

    Science.gov (United States)

    Galanter, Marc

    2014-01-01

    In the course of achieving abstinence from alcohol, longstanding members of Alcoholics Anonymous (AA) typically experience a change in their addiction-related attitudes and behaviors. These changes are reflective of physiologically grounded mechanisms which can be investigated within the disciplines of social and cognitive neuroscience. This article is designed to examine recent findings associated with these disciplines that may shed light on the mechanisms underlying this change. Literature review and hypothesis development. Pertinent aspects of the neural impact of drugs of abuse are summarized. After this, research regarding specific brain sites, elucidated primarily by imaging techniques, is reviewed relative to the following: Mirroring and mentalizing are described in relation to experimentally modeled studies on empathy and mutuality, which may parallel the experiences of social interaction and influence on AA members. Integration and retrieval of memories acquired in a setting like AA are described, and are related to studies on storytelling, models of self-schema development, and value formation. A model for ascription to a Higher Power is presented. The phenomena associated with AA reflect greater complexity than the empirical studies on which this article is based, and certainly require further elucidation. Despite this substantial limitation in currently available findings, there is heuristic value in considering the relationship between the brain-based and clinical phenomena described here. There are opportunities for the study of neuroscientific correlates of Twelve-Step-based recovery, and these can potentially enhance our understanding of related clinical phenomena. © American Academy of Addiction Psychiatry.

  19. Yahtzee: an anonymized group level matching procedure.

    Directory of Open Access Journals (Sweden)

    Jason J Jones

    Full Text Available Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  20. Yahtzee: an anonymized group level matching procedure.

    Science.gov (United States)

    Jones, Jason J; Bond, Robert M; Fariss, Christopher J; Settle, Jaime E; Kramer, Adam D I; Marlow, Cameron; Fowler, James H

    2013-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  1. Development of Electrochemical Processes for Aluminium-Based Coatings for Fusion Applications

    Energy Technology Data Exchange (ETDEWEB)

    Konys, J. [Karlsruhe Institute of Technology, Karlsruhe (Germany)

    2016-12-15

    Reduced activation ferritic-martensitic steels (RAFM) are envisaged in future fusion technology as structural material which will be in direct contact with a flowing liquid lead-lithium melt, serving as breeder material. Aluminium-based coatings had proven their ability to protect the structural material from corrosion attack in flowing Pb-15.7Li and to reduce tritium permeation into the coolant, significantly. Coming from scales produced by hot dipping aluminization (HDA), the development of electrochemical-based processes to produce well-defined aluminium-based coatings on RAFM steels gained increased attention in research during the last years. Two different electrochemical processes are described in this paper: The first one, referred to as ECA, is based on the electrodeposition of aluminium from volatile, metal-organic electrolytes. The other process called ECX is based on ionic liquids. All three processes exhibit specific characteristics, for example in the field of processability, control of coating thicknesses (low activation criteria) and heat treatment behavior. The aim of this article is to compare these different coating processes critically, whereby the focus is on the comparison of ECA and ECX processes. New results for ECX will be presented and occurring development needs for the future will be discussed.

  2. Development of Electrochemical Processes for Aluminium-Based Coatings for Fusion Applications

    International Nuclear Information System (INIS)

    Konys, J.

    2016-01-01

    Reduced activation ferritic-martensitic steels (RAFM) are envisaged in future fusion technology as structural material which will be in direct contact with a flowing liquid lead-lithium melt, serving as breeder material. Aluminium-based coatings had proven their ability to protect the structural material from corrosion attack in flowing Pb-15.7Li and to reduce tritium permeation into the coolant, significantly. Coming from scales produced by hot dipping aluminization (HDA), the development of electrochemical-based processes to produce well-defined aluminium-based coatings on RAFM steels gained increased attention in research during the last years. Two different electrochemical processes are described in this paper: The first one, referred to as ECA, is based on the electrodeposition of aluminium from volatile, metal-organic electrolytes. The other process called ECX is based on ionic liquids. All three processes exhibit specific characteristics, for example in the field of processability, control of coating thicknesses (low activation criteria) and heat treatment behavior. The aim of this article is to compare these different coating processes critically, whereby the focus is on the comparison of ECA and ECX processes. New results for ECX will be presented and occurring development needs for the future will be discussed.

  3. Development of tungsten coatings for the corrosion protection of alumina-based ceramics

    International Nuclear Information System (INIS)

    Arons, R.M.; Dusek, J.T.; Hafstrom, J.W.

    1979-01-01

    A means of applying tungsten coatings to an alumina based ceramic is described. A slurry of pure tungsten was prepared and applied by brush coating or slip casting on the alumina-3 wt % Yt small crucible. The composite was fired and a very dense ceramic crucible with a crack free tungsten coating was produced

  4. Bioactivity and biocompatibility of hydroxyapatite-based bioceramic coatings on zirconium by plasma electrolytic oxidation

    Energy Technology Data Exchange (ETDEWEB)

    Aktuğ, Salim Levent, E-mail: saktug@gtu.edu.tr [The Department of Materials Science and Engineering, Gebze Technical University, Gebze, Kocaeli 41400 (Turkey); Durdu, Salih, E-mail: durdusalih@gmail.com [The Department of Industrial Engineering, Giresun University, Merkez, Giresun 28200 (Turkey); Yalçın, Emine, E-mail: emine.yalcin@giresun.edu.tr [The Department of Biology, Giresun University, Merkez, Giresun 28200 (Turkey); Çavuşoğlu, Kültigin, E-mail: kultigin.cavusoglu@giresun.edu.tr [The Department of Biology, Giresun University, Merkez, Giresun 28200 (Turkey); Usta, Metin, E-mail: ustam@gtu.edu.tr [The Department of Materials Science and Engineering, Gebze Technical University, Gebze, Kocaeli 41400 (Turkey); Materials Institute, Marmara Research Center, TUBITAK, Gebze, Kocaeli 41470 (Turkey)

    2017-02-01

    In the present work, hydroxyapatite (HAP)-based plasma electrolytic oxide (PEO) coatings were produced on zirconium at different current densities in a solution containing calcium acetate and β-calcium glycerophosphate by a single step. The phase structure, surface morphology, functional groups, thickness and roughness of the coatings were characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), attenuated total reflectance-Fourier transform infrared spectroscopy (ATR-FTIR), eddy current method and surface profilometer, respectively. The phases of cubic-zirconia, calcium zirconate and HAP were detected by XRD. The amount of HAP and calcium zirconate increased with increasing current density. The surface of the coatings was very porous and rough. Moreover, bioactivity and biocompatibility of the coatings were analyzed in vitro immersion simulated body fluid (SBF) and MTT (3-(4,5-dimethyl thiazol-2yl)-2,5-diphenyl tetrazolium bromide) assay, hemolysis assay and bacterial formation. The apatite-forming ability of the coatings was evaluated after immersion in SBF up to 28 days. After immersion, the bioactivity of HAP-based coatings on zirconium was greater than the ones of uncoated zirconium and zirconium oxide-based surface. The bioactivity of PEO surface on zirconium was significantly improved under SBF conditions. The bacterial adhesion of the coatings decreased with increasing current density. The bacterial adhesion of the coating produced at 0.370 A/cm{sup 2} was minimum compared to uncoated zirconium coated at 0.260 and 0.292 A/cm{sup 2}. The hemocompatibility of HAP-based surfaces was improved by PEO. The cell attachment and proliferation of the PEO coatings were better than the one of uncoated zirconium according to MTT assay results. - Highlights: • Hydroxyapatite was formed on zirconium at different current densities by single-step plasma electrolytic oxidation. • The amount of hydroxyapatite and calcium-based phases increased with

  5. Laser cladding of Zr-based coating on AZ91D magnesium alloy for ...

    Indian Academy of Sciences (India)

    based coating made of Zr powder was fabricated on AZ91D magnesium alloy by laser cladding. The microstructure of the coating was characterized by XRD, SEM and TEM techniques. The wear resistance of the coating was evaluated under dry ...

  6. THE STRUCTURE AND PROPERTIES OF COMPOSITE LASER CLAD COATINGS WITH Ni BASED MATRIX WITH WC PARTICLES

    Directory of Open Access Journals (Sweden)

    Zita Iždinská

    2010-09-01

    Full Text Available In this work, the influence of the processing conditions on the microstructure and abrasive wear behavior of composite laser clad coatings with Ni based matrix reinforced with 50% WC particles is analyzed. Composite powder was applied in the form of coatings onto a mild steel substrate (Fe–0.17% C by different laser powers and cladding speeds. The microstructure of the coatings was analyzed by scanning electron microscopy (SEM. Tribological properties of coatings were evaluated by pin-on-disc wear test. It appeared that the hardness of the matrix of composite coatings decreases with increasing cladding speed. However, wear resistance of composite coatings with decreasing hardness of Ni based matrix increases. Significantly enhanced wear resistance of WC composite coatings in comparison with Ni based coatings is attributed to the hard phase structures in composite coatings.

  7. Synthesis and densification of Cu-coated Ni-based amorphous composite powders

    International Nuclear Information System (INIS)

    Kim, Yong-Jin; Kim, Byoung-Kee; Kim, Jin-Chun

    2007-01-01

    Spherical Ni 57 Zr 20 Ti 16 Si 2 Sn 3 (numbers indicate at.%) amorphous powders were produced by the gas atomization process, and ductile Cu phase was coated on the Ni-based amorphous powders by the spray drying process in order to increase the ductility of the consolidated amorphous alloy. The characteristics of the as-prepared powders and the consolidation behaviors of Cu-coated Ni-based amorphous composite powders were investigated. The atomization was conducted at 1450 deg. C under the vacuum of 10 -2 mbar. The Ni-based amorphous powders and Cu nitrate solution were mixed and sprayed at temperature of 130 deg. C. After spray drying and reduction treatment, the sub-micron size Cu powders were coated successfully on the surface of the atomized Ni amorphous powders. The spark plasma sintering process was applied to study the densification behavior of the Cu-coated composite powders. Thickness of the Cu layer was less than 1 μm. The compacts obtained by SPS showed high relative density of over 98% and its hardness was over 800 Hv

  8. Clinical Processes - The Killer Application for Constraint-Based Process Interactions

    DEFF Research Database (Denmark)

    Jiménez-Ramírez, Andrés; Barba, Irene; Reichert, Manfred

    2018-01-01

    . The scenario is subject to complex temporal constraints and entails the need for coordinating the constraint-based interactions among the processes related to a patient treatment process. As demonstrated in this work, the selected real process scenario can be suitably modeled through a declarative approach....... examples. However, to the best of our knowledge, they have not been used to model complex, real-world scenarios that comprise constraints going beyond control-flow. In this paper, we propose the use of a declarative language for modeling a sophisticated healthcare process scenario from the real world......For more than a decade, the interest in aligning information systems in a process-oriented way has been increasing. To enable operational support for business processes, the latter are usually specified in an imperative way. The resulting process models, however, tend to be too rigid to meet...

  9. Structure and wear behavior of AlCrSiN-based coatings

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Yun [School of Mechanical Engineering, Shanghai Jiao Tong University, Shanghai 200240 (China); Chengdu Tool Research Institute Co., Ltd., Chengdu 610500 (China); Du, Hao [School of Manufacturing Science and Engineering, Sichuan University, Chengdu 610065 (China); Chen, Ming, E-mail: mchen@sjtu.edu.cn [School of Mechanical Engineering, Shanghai Jiao Tong University, Shanghai 200240 (China); Yang, Jun [Chengdu Tool Research Institute Co., Ltd., Chengdu 610500 (China); Xiong, Ji [School of Manufacturing Science and Engineering, Sichuan University, Chengdu 610065 (China); Zhao, Haibo [The Analysis and Testing Centre, Sichuan University, Chengdu 610065 (China)

    2016-05-01

    Graphical abstract: - Highlights: • AlCrSiN based coating showed amorphous structure. • AlCrSiN/Me{sub x}N coatings obtained better wear resistance. • Molybdenum and niobium increased the coating hardness and wear resistance. - Abstract: AlCrN, AlCrSiCN, AlCrSiN/MoN, and AlCrSiN/NbN coatings have been deposited on high-polished WC–Co cemented carbide substrate and tools by mid-frequency magnetron sputtering in Ar/N{sub 2} mixtures. Al{sub 0.6}Cr{sub 0.4}, Al{sub 0.6}Cr{sub 0.3}Si{sub 0.1}, and C/Mo/Nb targets were used during the deposition. The microstructure and mechanical properties of as-deposited coatings were investigated. Investigations of the wear behaviors of coated tools were also performed. The results showed that cubic structure was formed in the coatings. Broader CrAlN (1 1 1) and (2 0 0) peaks without SiN{sub x} peak were formed in the AlCrSiN/Me{sub x}N coatings, which showed a nanocomposited structure. Meanwhile, according to SEM micrographs, AlCrN exhibited a columnar structure, while, AlCrSiCN, AlCrSiN/MoN, and AlCrSiN/NbN coatings showed nanocrystalline morphology. The nano-multilayered coatings performed higher hardness, H/E, and H{sup 3}/E{sup 2} ratios compared with AlCrN coating. Through the Rockwell adhesion test, all the coatings exhibited adhesion strength quality HF1. After turning Inconel 718 under dry condition, the nano-multilyered coatings showed better wear resistance than AlCrN coating. Due to the molybdenum and niobium in the coating, AlCrSiN/MoN and AlCrSiN/NbN coatings showed the best wear resistance.

  10. AN EFFECTIVE MULTI-CLUSTERING ANONYMIZATION APPROACH USING DISCRETE COMPONENT TASK FOR NON-BINARY HIGH DIMENSIONAL DATA SPACES

    Directory of Open Access Journals (Sweden)

    L.V. Arun Shalin

    2016-01-01

    Full Text Available Clustering is a process of grouping elements together, designed in such a way that the elements assigned to similar data points in a cluster are more comparable to each other than the remaining data points in a cluster. During clustering certain difficulties related when dealing with high dimensional data are ubiquitous and abundant. Works concentrated using anonymization method for high dimensional data spaces failed to address the problem related to dimensionality reduction during the inclusion of non-binary databases. In this work we study methods for dimensionality reduction for non-binary database. By analyzing the behavior of dimensionality reduction for non-binary database, results in performance improvement with the help of tag based feature. An effective multi-clustering anonymization approach called Discrete Component Task Specific Multi-Clustering (DCTSM is presented for dimensionality reduction on non-binary database. To start with we present the analysis of attribute in the non-binary database and cluster projection identifies the sparseness degree of dimensions. Additionally with the quantum distribution on multi-cluster dimension, the solution for relevancy of attribute and redundancy on non-binary data spaces is provided resulting in performance improvement on the basis of tag based feature. Multi-clustering tag based feature reduction extracts individual features and are correspondingly replaced by the equivalent feature clusters (i.e. tag clusters. During training, the DCTSM approach uses multi-clusters instead of individual tag features and then during decoding individual features is replaced by corresponding multi-clusters. To measure the effectiveness of the method, experiments are conducted on existing anonymization method for high dimensional data spaces and compared with the DCTSM approach using Statlog German Credit Data Set. Improved tag feature extraction and minimum error rate compared to conventional anonymization

  11. First-wall-coating candidates for ICF reactor chambers using dry-wall protection only

    International Nuclear Information System (INIS)

    Sink, D.A.

    1983-01-01

    Twenty pure metals were considered as potential candidates for first-wall coatings of ICF reactor chambers. Seven were found to merit further consideration based on the results of computer-code calculations of figures-of-merit. The seven are rhenium, iridium, molybdenum, chromium, tungsten, tantalum, and niobium (listed in order of decreasing values of figures-of-merit). The calculations are based on mechanical, thermal, and vacuum vaporization engineering constraints. A number of alloys of these seven metals are suggested as additional candidates

  12. DETERMINATION OF PHASE COMPOSITION OF SEALING COATING BASED ON APC (ALUMINOPHOSPHATE COMPOUNDS

    Directory of Open Access Journals (Sweden)

    BOLSHAKOV V. I.

    2017-02-01

    Full Text Available Summary. Goal. To investigate the phase composition of the obtained sealing coatings based on aluminophosphate compound (APC and the impact of temperature rise on it. Methods. Qualitative X-ray phase analysis (XRPA and differential thermal analysis (DTA are used as the methods of research. Roentgenograms for structural analysis were obtained on a DRON-4-07 using filtered copper radiation in the secondary beam. Registration and initial processing of diffraction patterns was performed using the software package PDOS with the output of the diffraction patterns on the screen. Using the "loupe" option allowed to identify weak interference lines, which increased the accuracy of the method of qualitative XRPA. The thermograms for DTA received on the device type Termoskan-2. The results. It is revealed that base of coating is X-ray amorphous phase. There are following crystalline phases: Al, AlPO4, Al (PO3 3, BN found in the coating. It is revealed that annealing doesn’t make a significant influence on the phase composition of the crystalline phases and the coating doesn’t lose properties after annealing during repeated thermal stress. Scientific novelty. The phase composition of the proposed sealing coatings based on APC and produced by plasma spraying, and the effect of annealing on the phase composition of the coating are investigated. The reaction of synthesis of primary material forming on the basis of APC for coating is offered. Practical significance. The results can be used in aviation technology in the development of gas turbine engines (GTE and the design of the compressors. The sealing coating may be used to improve the reliability of the compressor and to increase the efficiency ratio of turbine engine. During the operation the compressor’s blades touch the sealing coating of compressor’s stator and grooves it without causing locking and destruction of the rotor. Therefore, the development of new sealing coating compositions that

  13. Application of a Surimi-Based Coating to Improve the Quality Attributes of Shrimp during Refrigerated Storage.

    Science.gov (United States)

    Sharaf Eddin, Abdulhakim; Tahergorabi, Reza

    2017-09-05

    Shrimp is a popular seafood throughout the world. However, shrimp is highly perishable due to biochemical, microbiological, or physical changes during postmortem storage. In this study, the effect of a surimi-based coating with and without montmorillonite (MMT) nanoclay on shrimp quality was evaluated during eight days of refrigerator storage. Use of a surimi-based coating resulted in reductions of aerobic plate counts (APC) up to 2 log units. The combined effect of the MMT and coating was observed. Surimi-based coating with MMT resulted in lower APC ( p coating with MMT to the shrimp samples improved sensory quality and delayed lipid oxidation and color deterioration during storage time. In general, better texture was observed when coating was applied either with or without MMT. This study suggests that surimi-based coating may improve the quality of shrimp during refrigerated storage.

  14. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ling Xiong

    2017-11-01

    Full Text Available Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  15. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.

    Science.gov (United States)

    Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai

    2017-11-21

    Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  16. Preparation and Properties of Superamphiphobic Wear-resistance PPS-based Coating

    Directory of Open Access Journals (Sweden)

    WANG Huai-yuan

    2017-01-01

    Full Text Available Superamphiphobic wear-resistance PPS-based coatings were prepared by a simple spraying method with a pore-forming reagent of NH4HCO3 and nano-filler of carbon nanotubes (CNTs.The surface morphology and the hydrophobicity,oleophobicity of the coating were analyzed by scanning electron microscope (SEM and contact angle meter.The wear-resistance of the coating was verified by sanding method with given load.The results indicate that a rough surface is obtained after pore-forming,and the porous structures in combination with the CNTs construct the special micro/nano-scale network structures.When the mass fraction of NH4HCO3 is 5%,the contact angles of the coating for water,glycerine and ethylene glycol are 162°,158° and 152°,showing superamphiphobic property.After polished 10000 times by abrasive paper,the coating shows slight friction marks and remains high hydrophobicity,exhibiting excellent wear-resistance.

  17. Bioactivity and biocompatibility of hydroxyapatite-based bioceramic coatings on zirconium by plasma electrolytic oxidation.

    Science.gov (United States)

    Aktuğ, Salim Levent; Durdu, Salih; Yalçın, Emine; Çavuşoğlu, Kültigin; Usta, Metin

    2017-02-01

    In the present work, hydroxyapatite (HAP)-based plasma electrolytic oxide (PEO) coatings were produced on zirconium at different current densities in a solution containing calcium acetate and β-calcium glycerophosphate by a single step. The phase structure, surface morphology, functional groups, thickness and roughness of the coatings were characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), attenuated total reflectance-Fourier transform infrared spectroscopy (ATR-FTIR), eddy current method and surface profilometer, respectively. The phases of cubic-zirconia, calcium zirconate and HAP were detected by XRD. The amount of HAP and calcium zirconate increased with increasing current density. The surface of the coatings was very porous and rough. Moreover, bioactivity and biocompatibility of the coatings were analyzed in vitro immersion simulated body fluid (SBF) and MTT (3-(4,5-dimethyl thiazol-2yl)-2,5-diphenyl tetrazolium bromide) assay, hemolysis assay and bacterial formation. The apatite-forming ability of the coatings was evaluated after immersion in SBF up to 28days. After immersion, the bioactivity of HAP-based coatings on zirconium was greater than the ones of uncoated zirconium and zirconium oxide-based surface. The bioactivity of PEO surface on zirconium was significantly improved under SBF conditions. The bacterial adhesion of the coatings decreased with increasing current density. The bacterial adhesion of the coating produced at 0.370A/cm 2 was minimum compared to uncoated zirconium coated at 0.260 and 0.292A/cm 2 . The hemocompatibility of HAP-based surfaces was improved by PEO. The cell attachment and proliferation of the PEO coatings were better than the one of uncoated zirconium according to MTT assay results. Copyright © 2016 Elsevier B.V. All rights reserved.

  18. Plum coatings of lemongrass oil-incorporating carnauba wax-based nanoemulsion.

    Science.gov (United States)

    Kim, In-Hah; Lee, Hanna; Kim, Jung Eun; Song, Kyung Bin; Lee, Youn Suk; Chung, Dae Sung; Min, Sea C

    2013-10-01

    Nanoemulsions containing lemongrass oil (LO) were developed for coating plums and the effects of the nanoemulsion coatings on the microbial safety and physicochemical storage qualities of plums during storage at 4 and 25 °C were investigated. The emulsions used for coating were produced by mixing a carnauba wax-based solution (18%, w/w) with LO at various concentrations (0.5% to 4.0%, w/w) using dynamic high pressure processing at 172 MPa. The coatings were evaluated for their ability to inhibit the growth of Salmonella Typhimurium and Escherichia coli O157:H7 and their ability to preserve various physicochemical qualities of plums. Uniform and continuous coatings on plums, formed with stable emulsions, initially inhibited S. Typhimurium and E. coli O157:H7 by 0.2 to 2.8 and 0.8 to 2.7 log CFU/g, respectively, depending on the concentration of LO and the sequence of coating. The coatings did not significantly alter the flavor, fracturability, or glossiness of the plums. The antimicrobial effects of the coatings against S. Typhimurium and E. coli O157:H7 were demonstrated during storage at 4 and 25 °C. The coatings reduced weight loss and ethylene production by approximately 2 to 3 and 1.4 to 4.0 fold, respectively, and also retarded the changes in lightness and the concentration of phenolic compounds in plums during storage. The firmness of coated plums was generally higher than uncoated plums when stored at 4 °C and plum respiration rates were reduced during storage. Coatings containing nanoemulsions of LO have the potential to inhibit Salmonella and E. coli O157:H7 contamination of plums and may extend plum shelf life. Journal of Food Science © 2013 Institute of Food Technologists® No claim to original US government works.

  19. Chitosan-based coatings in the prevention of intravascular catheter-associated infections.

    Science.gov (United States)

    Mendoza, Gracia; Regiel-Futyra, Anna; Tamayo, Alejandra; Monzon, Marta; Irusta, Silvia; de Gregorio, Miguel Angel; Kyzioł, Agnieszka; Arruebo, Manuel

    2018-01-01

    Central venous access devices play an important role in patients with prolonged intravenous administration requirements. In the last years, the coating of these devices with bactericidal compounds has emerged as a potential tool to prevent bacterial colonization. Our study describes the modification of 3D-printed reservoirs and silicone-based catheters, mimicking central venous access devices, through different approaches including their coating with the well known biocompatible and bactericidal polymer chitosan, with the anionic polysaccharide alginate; also, plasma treated surfaces were included in the study to promote polymer adhesion. The evaluation of the antimicrobial action of those surface modifications compared to that exerted by a model antibiotic (ciprofloxacin) adsorbed on the surface of the devices was carried out. Surface characterization was developed by different methodologies and the bactericidal effects of the different coatings were assayed in an in vitro model of Staphylococcus aureus infection. Our results showed a significant reduction in the reservoir roughness (≤73%) after coating though no changes were observed for coated catheters which was also confirmed by scanning electron microscopy, pointing to the importance of the surface device topography for the successful attachment of the coating and for the subsequent development of bactericidal effects. Furthermore, the single presence of chitosan on the reservoirs was enough to fully inhibit bacterial growth exerting the same efficiency as that showed by the model antibiotic. Importantly, chitosan coating showed low cytotoxicity against human keratinocytes, human lung adenocarcinoma epithelial cells, and murine colon carcinoma cells displaying viability percentages in the range of the control samples (>95%). Chitosan-based coatings are proposed as an effective and promising solution in the prevention of microbial infections associated to medical devices.

  20. An Alternative Cu-Based Bond Layer for Electric Arc Coating Process

    Science.gov (United States)

    Fadragas, Carlos R.; Morales, E. V.; Muñoz, J. A.; Bott, I. S.; Lariot Sánchez, C. A.

    2011-12-01

    A Cu-Al alloy has been used as bond coat between a carbon steel substrate and a final coating deposit obtained by applying the twin wire electric arc spraying coating technique. The presence of a copper-based material in the composite system can change the overall temperature profile during deposition because copper exhibits a thermal conductivity several times higher than that of the normally recommended bond coat materials (such as nickel-aluminum alloys or nickel-chromium alloys). The microstructures of 420 and 304 stainless steels deposited by the electric arc spray process have been investigated, focusing attention on the deposit homogeneity, porosity, lamellar structure, and microhardness. The nature of the local temperature gradient during deposition can strongly influence the formation of the final coating deposit. This study presents a preliminary study, undertaken to investigate the changes in the temperature profile which occur when a Cu-Al alloy is used as bond coat, and the possible consequences of these changes on the microstructure and adhesion of the final coating deposit. The influence of the thickness of the bond layer on the top coating temperature has also been also evaluated.

  1. Corrosion study of the graphene oxide and reduced graphene oxide-based epoxy coatings

    Science.gov (United States)

    Ghauri, Faizan Ali; Raza, Mohsin Ali; Saad Baig, Muhammad; Ibrahim, Shoaib

    2017-12-01

    This work aims to determine the effect of graphene oxide (GO) and reduced graphene oxide (rGO) incorporation as filler on the corrosion protection ability of epoxy coatings in saline media. GO was derived from graphite powder following modified Hummers’ method, whereas rGO was obtained after reduction of GO with hydrazine solution. About 1 wt.% of GO or rGO were incorporated in epoxy resin by solution mixing process followed by ball milling. GO and rGO-based epoxy composite coatings were coated on mild steel substrates using film coater. The coated samples were characterized by electrochemical impedance spectroscopy (EIS) and potentiodynamic polarization tests after 1 and 24 h immersion in 3.5% NaCl. The results suggested that GO-based epoxy composite coatings showed high impedance and low corrosion rate.

  2. Effect of Protein-Based Edible Coating from Red Snapper (Lutjanus sp.) Surimi on Cooked Shrimp

    Science.gov (United States)

    Rostini, I.; Ibrahim, B.; Trilaksani, W.

    2018-02-01

    Surimi can be used as a raw material for making protein based edible coating to protect cooked shrimp color. The purpose of this study was to determine consumers preference level on cooked shrimp which coated by surimi edible coating from red snapper and to know the microscopic visualization of edible coating layer on cooked shrimp. The treatments for surimi edible coating were without and added by sappan wood (Caesalpinia sappan Linn) extract. Application of surimi edible coating on cooked shrimp was comprised methods (1) boiled then coated and (2) coated then boiled. Edible coating made from surimi with various concentrations which were 2, 6, 10 and 14% of distillated water. The analysis were done using hedonic test and microscopic observation with microscope photographs. Effect of surimi edible coating on cooked shrimp based on the hedonic and colour test results showed that the 14% surimi concentration, added by sappan wood (Caesalpinia sappan Linn) extract on edible coating was the most preferable by panellist and giving the highest shrimp colour. The edible coating surimi application on cooked shrimp which gave the best result was processed by boiling followed by coating.

  3. The influence of anonymous peers on prosocial behavior.

    Directory of Open Access Journals (Sweden)

    Soowon Park

    Full Text Available Peer influence on students' maladaptive behaviors has been well documented; however, the influence on positive development is less acknowledged.The purpose of this study was to examine anonymous peer influence on college students' prosocial behavior, specifically behavior for the improvement of society (i.e., donating money or participating in social campaigns via an experimental approach. The effects of indirect peer influence (IP and direct peer influence (DP on college students' prosocial behavior were examined.A total of 125 college students participated in an online survey and laboratory experiment. Self-reported helping behavior, social concern goals, and empathy were measured by the online survey. In the laboratory experiments, reading of a prosocial paragraph (IP and confederates' prosocial behavior (DP were manipulated. Participation in a signature campaign and money donation for illness were observed. Furthermore, 19 participants among those who donated were asked about their reasons for participating in such prosocial behavior.Prosocial behavior of anonymous peers (confederates exerts a profound influence on college students' participation in a signature campaign and money donation, whereas the reading of a prosocial paragraph has no effect. Furthermore, no participants reported peer influence as a reason for engaging in prosocial behavior.This finding supports and extends recent research examining the positive impacts of anonymous peers on prosocial behavior. Prosocial behavior is not only a foundational and consistent aspect of personality, as previous studies report, but is also highly malleable and unstable in response to immediate situations.

  4. The influence of anonymous peers on prosocial behavior

    Science.gov (United States)

    Shin, Jongho

    2017-01-01

    Background Peer influence on students’ maladaptive behaviors has been well documented; however, the influence on positive development is less acknowledged. Purpose The purpose of this study was to examine anonymous peer influence on college students’ prosocial behavior, specifically behavior for the improvement of society (i.e., donating money or participating in social campaigns) via an experimental approach. The effects of indirect peer influence (IP) and direct peer influence (DP) on college students’ prosocial behavior were examined. Methods A total of 125 college students participated in an online survey and laboratory experiment. Self-reported helping behavior, social concern goals, and empathy were measured by the online survey. In the laboratory experiments, reading of a prosocial paragraph (IP) and confederates’ prosocial behavior (DP) were manipulated. Participation in a signature campaign and money donation for illness were observed. Furthermore, 19 participants among those who donated were asked about their reasons for participating in such prosocial behavior. Results Prosocial behavior of anonymous peers (confederates) exerts a profound influence on college students’ participation in a signature campaign and money donation, whereas the reading of a prosocial paragraph has no effect. Furthermore, no participants reported peer influence as a reason for engaging in prosocial behavior. Conclusion This finding supports and extends recent research examining the positive impacts of anonymous peers on prosocial behavior. Prosocial behavior is not only a foundational and consistent aspect of personality, as previous studies report, but is also highly malleable and unstable in response to immediate situations. PMID:29016612

  5. Impact of Anonymity and Identity Deception on Social Media eWOM

    OpenAIRE

    Kapoor , Payal ,; Gunta , Srinivas

    2016-01-01

    Part 4: Information Sharing on Social Media; International audience; Brand-related consumer to consumer communication, eWOM, is taking place in many forms across the social media space. Rules that governed credibility assessment of brand-related communication, WOM, in the Face to Face context may vary on social media, specifically because of anonymity that is afforded on different social media sites. The current study looks closely on the impact of anonymity in typical eWOM behaviour context ...

  6. Hafnia-Based Nanostructured Thermal Barrier Coatings for Advanced Hydrogen Turbine Technology

    Energy Technology Data Exchange (ETDEWEB)

    Ramana, Chintalapalle; Choudhuri, Ahsan

    2013-01-31

    Thermal barrier coatings (TBCs) are critical technologies for future gas turbine engines of advanced coal based power generation systems. TBCs protect engine components and allow further increase in engine temperatures for higher efficiency. In this work, nanostructured HfO{sub 2}-based coatings, namely Y{sub 2}O{sub 3}-stabilized HfO{sub 2} (YSH), Gd{sub 2}O{sub 3}-stabilized HfO{sub 2} (GSH) and Y{sub 2}O{sub 3}-stabilized ZrO{sub 2}-HfO{sub 2} (YSZH) were investigated for potential TBC applications in hydrogen turbines. Experimental efforts are aimed at creating a fundamental understanding of these TBC materials. Nanostructured ceramic coatings of YSH, GSH and YSZH were grown by physical vapor deposition methods. The effects of processing parameters and ceramic composition on the microstructural evolution of YSH, GSH and YSZH nanostructured coatings was studied using combined X-ray diffraction (XRD) and Electron microscopy analyses. Efforts were directed to derive a detailed understanding of crystal-structure, morphology, and stability of the coatings. In addition, thermal conductivity as a function of composition in YSH, YSZH and GSH coatings was determined. Laboratory experiments using accelerated test environments were used to investigate the relative importance of various thermo-mechanical and thermo-chemical failure modes of TBCs. Effects of thermal cycling, oxidation and their complex interactions were evaluated using a syngas combustor rig.

  7. Multi-atlas Based Segmentation Editing with Interaction-Guided Constraints

    OpenAIRE

    Park, Sang Hyun; Gao, Yaozong; Shen, Dinggang

    2015-01-01

    We propose a novel multi-atlas based segmentation method to address the editing scenario, when given an incomplete segmentation along with a set of training label images. Unlike previous multi-atlas based methods, which depend solely on appearance features, we incorporate interaction-guided constraints to find appropriate training labels and derive their voting weights. Specifically, we divide user interactions, provided on erroneous parts, into multiple local interaction combinations, and th...

  8. Utility-preserving transaction data anonymization with low information loss.

    Science.gov (United States)

    Loukides, Grigorios; Gkoulalas-Divanis, Aris

    2012-08-01

    Transaction data record various information about individuals, including their purchases and diagnoses, and are increasingly published to support large-scale and low-cost studies in domains such as marketing and medicine. However, the dissemination of transaction data may lead to privacy breaches, as it allows an attacker to link an individual's record to their identity. Approaches that anonymize data by eliminating certain values in an individual's record or by replacing them with more general values have been proposed recently, but they often produce data of limited usefulness. This is because these approaches adopt value transformation strategies that do not guarantee data utility in intended applications and objective measures that may lead to excessive data distortion. In this paper, we propose a novel approach for anonymizing data in a way that satisfies data publishers' utility requirements and incurs low information loss. To achieve this, we introduce an accurate information loss measure and an effective anonymization algorithm that explores a large part of the problem space. An extensive experimental study, using click-stream and medical data, demonstrates that our approach permits many times more accurate query answering than the state-of-the-art methods, while it is comparable to them in terms of efficiency.

  9. Local and global recoding methods for anonymizing set-valued data

    KAUST Repository

    Terrovitis, Manolis

    2010-06-10

    In this paper, we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of supermarket transactions that contains detailed information about items bought together by individuals. Even after removing all personal characteristics of the buyer, which can serve as links to his identity, the publication of such data is still subject to privacy attacks from adversaries who have partial knowledge about the set. Unlike most previous works, we do not distinguish data as sensitive and non-sensitive, but we consider them both as potential quasi-identifiers and potential sensitive data, depending on the knowledge of the adversary. We define a new version of the k-anonymity guarantee, the k m-anonymity, to limit the effects of the data dimensionality, and we propose efficient algorithms to transform the database. Our anonymization model relies on generalization instead of suppression, which is the most common practice in related works on such data. We develop an algorithm that finds the optimal solution, however, at a high cost that makes it inapplicable for large, realistic problems. Then, we propose a greedy heuristic, which performs generalizations in an Apriori, level-wise fashion. The heuristic scales much better and in most of the cases finds a solution close to the optimal. Finally, we investigate the application of techniques that partition the database and perform anonymization locally, aiming at the reduction of the memory consumption and further scalability. A thorough experimental evaluation with real datasets shows that a vertical partitioning approach achieves excellent results in practice. © 2010 Springer-Verlag.

  10. Invalid-point removal based on epipolar constraint in the structured-light method

    Science.gov (United States)

    Qi, Zhaoshuai; Wang, Zhao; Huang, Junhui; Xing, Chao; Gao, Jianmin

    2018-06-01

    In structured-light measurement, there unavoidably exist many invalid points caused by shadows, image noise and ambient light. According to the property of the epipolar constraint, because the retrieved phase of the invalid point is inaccurate, the corresponding projector image coordinate (PIC) will not satisfy the epipolar constraint. Based on this fact, a new invalid-point removal method based on the epipolar constraint is proposed in this paper. First, the fundamental matrix of the measurement system is calculated, which will be used for calculating the epipolar line. Then, according to the retrieved phase map of the captured fringes, the PICs of each pixel are retrieved. Subsequently, the epipolar line in the projector image plane of each pixel is obtained using the fundamental matrix. The distance between the corresponding PIC and the epipolar line of a pixel is defined as the invalidation criterion, which quantifies the satisfaction degree of the epipolar constraint. Finally, all pixels with a distance larger than a certain threshold are removed as invalid points. Experiments verified that the method is easy to implement and demonstrates better performance than state-of-the-art measurement systems.

  11. Tablet coating by injection molding technology - Optimization of coating formulation attributes and coating process parameters.

    Science.gov (United States)

    Desai, Parind M; Puri, Vibha; Brancazio, David; Halkude, Bhakti S; Hartman, Jeremy E; Wahane, Aniket V; Martinez, Alexander R; Jensen, Keith D; Harinath, Eranda; Braatz, Richard D; Chun, Jung-Hoon; Trout, Bernhardt L

    2018-01-01

    We developed and evaluated a solvent-free injection molding (IM) coating technology that could be suitable for continuous manufacturing via incorporation with IM tableting. Coating formulations (coating polymers and plasticizers) were prepared using hot-melt extrusion and screened via stress-strain analysis employing a universal testing machine. Selected coating formulations were studied for their melt flow characteristics. Tablets were coated using a vertical injection molding unit. Process parameters like softening temperature, injection pressure, and cooling temperature played a very important role in IM coating processing. IM coating employing polyethylene oxide (PEO) based formulations required sufficient room humidity (>30% RH) to avoid immediate cracks, whereas other formulations were insensitive to the room humidity. Tested formulations based on Eudrajit E PO and Kollicoat IR had unsuitable mechanical properties. Three coating formulations based on hydroxypropyl pea starch, PEO 1,000,000 and Opadry had favorable mechanical (35% elongation, >95×10 4 J/m 3 toughness) and melt flow (>0.4g/min) characteristics, that rendered acceptable IM coats. These three formulations increased the dissolution time by 10, 15 and 35min, respectively (75% drug release), compared to the uncoated tablets (15min). Coated tablets stored in several environmental conditions remained stable to cracking for the evaluated 8-week time period. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. To Speak or Not to Speak: Developing Legal Standards for Anonymous Speech on the Internet

    Directory of Open Access Journals (Sweden)

    Tomas A. Lipinski

    2002-01-01

    Full Text Available This paper explores recent developments in the regulation of Internet speech, in specific, injurious or defamatory speech and the impact such speech has on the rights of anonymous speakers to remain anonymous as opposed to having their identity revealed to plaintiffs or other third parties. The paper proceeds in four sections.  First, a brief history of the legal attempts to regulate defamatory Internet speech in the United States is presented. As discussed below this regulation has altered the traditional legal paradigm of responsibility and as a result creates potential problems for the future of anonymous speech on the Internet.  As a result plaintiffs are no longer pursuing litigation against service providers but taking their dispute directly to the anonymous speaker. Second, several cases have arisen in the United States where plaintiffs have requested that the identity of an anonymous Internet speaker be revealed.  These cases are surveyed.  Third, the cases are analyzed in order to determine the factors that courts require to be present before the identity of an anonymous speaker will be revealed.  The release is typically accomplished by the enforcement of a discovery subpoena instigated by the party seeking the identity of the anonymous speaker. The factors courts have used are as follows: jurisdiction, good faith (both internal and external, necessity (basic and sometimes absolute, and at times proprietary interest. Finally, these factors are applied in three scenarios--e-commerce, education, and employment--to guide institutions when adopting policies that regulate when the identity of an anonymous speaker--a customer, a student or an employee--would be released as part of an internal initiative, but would nonetheless be consistent with developing legal standards.

  13. Microstructures and tribological properties of laser cladded Ti-based metallic glass composite coatings

    International Nuclear Information System (INIS)

    Lan, Xiaodong; Wu, Hong; Liu, Yong; Zhang, Weidong; Li, Ruidi; Chen, Shiqi; Zai, Xiongfei; Hu, Te

    2016-01-01

    Metallic glass composite coatings Ti 45 Cu 41 Ni 9 Zr 5 and Ti 45 Cu 41 Ni 6 Zr 5 Sn 3 (at.%) on a Ti-30Nb-5Ta-7Zr (wt.%) (TNTZ) alloy were prepared by laser cladding. The microstructures of the coatings were characterized by means of X-ray diffractometry (XRD), scanning electron microscopy (SEM) equipped with energy dispersive X-ray analyzer (EDXA), and transmission electron microscopy (TEM). Results indicated that the coatings have an amorphous structure embedded with a few nanocrystalline phases and dendrites. A partial substitution of Ni by Sn can improve the glass forming ability of Ti-base metallic glass system, and induce the formation of nano-sized Ni 2 SnTi phase during the cyclic laser heating. The tribological behavior of both the substrate and the coatings was investigated in detail. A significant improvement in both the hardness and the wear resistance of the coatings was achieved with the addition of Sn. The relationship between the wear resistance and the microstructures of the coatings was discussed. - Highlights: •Ti-based metallic glass composite coatings were prepared by laser cladding. •The wear resistance is greatly improved by laser cladding of composite coatings. •Substitution of Ni by Sn increases GFA and wear resistance of the coatings. •A good balance of crystalline/amorphous phases improves the wear resistance. •Adhesive wear serves as the dominant wear mechanism of the composite coatings.

  14. Tribological properties of copper-based composites with copper coated NbSe2 and CNT

    International Nuclear Information System (INIS)

    Chen, Beibei; Yang, Jin; Zhang, Qing; Huang, Hong; Li, Hongping; Tang, Hua; Li, Changsheng

    2015-01-01

    Graphical abstract: Morphology of copper coated NbSe 2 and CNT; friction coefficient and wear rate of copper-based composites. - Highlights: • NbSe 2 and CNT were coated with copper layers by the means of electroless plating. • The mechanical and tribological properties of copper composites were studied. • The enhancement mechanisms of copper coated NbSe 2 and CNT were proposed. • Copper–copper coated (12 wt.%NbSe 2 –3 wt.%CNT) composite had the best wear resistance. - Abstract: Copper-based composites with copper coated NbSe 2 and/or CNT were fabricated by the powder metallurgy technique. The morphology and phase composition of copper coated NbSe 2 and carbon nanotube (CNT) were observed using high solution transmission electronic microscope (HRTEM), scanning electronic microscope (SEM equipped with EDS) and X-ray diffraction (XRD). The density, hardness, and bending strength of as-prepared copper-based composites were measured, and their tribological properties were investigated using UMT-2 tester. Results indicated that all copper-based composites showed decreased density and bending strength, but increased hardness in comparison with copper matrix. Besides, the incorporation of copper coated NbSe 2 improved the friction-reducing and anti-wear properties of copper matrix. Addition of copper coated CNT greatly enhanced the mechanical and tribological properties. In particular, when the content of copper coated CNT was 3 wt.%, the corresponding composite exhibited the best tribological properties. This was because NbSe 2 was distributed chaotically in matrix, which greatly improved the friction-reducing property of copper, while CNT with superior mechanical strength enhanced the wear resistance by increasing the load-carrying capacity. More importantly, copper layers coated on NbSe 2 and CNT favored the good interfacial combination between fillers and copper matrix showing beneficial effect for the stresses transferring from matrix to fillers

  15. Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference.

    Science.gov (United States)

    Teich, Al; Frankel, Mark S.; Kling, Rob; Lee, Yaching

    1999-01-01

    Reports the results of a conference on the Internet and anonymous communication organized by the American Association for the Advancement of Science (AAAS). Discusses how anonymous communications can be shaped by the law, education, and public awareness, and highlights the importance of involving all affected interests in policy development.…

  16. Anonymous sex and HIV risk practices among men using the Internet specifically to find male partners for unprotected sex.

    Science.gov (United States)

    Klein, H

    2012-06-01

    To examine the popularity of anonymous sex practices among men using the Internet to find male partners for unprotected sex, and how anonymous sex relates to involvement in other HIV-related risk behaviours, and to investigate the factors associated with engaging in anonymous sex. Structured telephone interviews were conducted with men who used the Internet specifically to find male partners for unprotected sex. Random sampling from 16 websites was used to obtain a national sample. The data reported in this paper were based on quantitative interviews collected with a cross-sectional study design. Between January 2008 and May 2009, confidential telephone interviews lasting approximately 1-2 h were completed with 332 men. Participants were paid $35 for their participation. Most of the men (67.4%) liked anonymous sex, and slightly more than half (51.2%) had engaged in the behaviour during the month prior to interview. Involvement in anonymous sex was associated with greater involvement in a variety of human immunodeficiency virus (HIV)-related risk practices, such as illegal drug use, number of sex partners, and amount of unprotected sex. Four factors were associated with having vs not having anonymous sex: (1) being HIV positive; (2) answering all of the HIV-related knowledge questions correctly; (3) deriving greater enjoyment from having sex in public places, such as parks, public toilets, or adult book shops; and (4) greater impulsivity. Seven factors were associated with greater vs lesser involvement in anonymous sex among those practising the behaviour: (1) being involved in a relationship with a long-term partner; (2) liking to have sex in public places; (3) using bareback-oriented websites to identify sex partners; (4) greater impulsivity; (5) low level of condom use self-efficacy; (6) greater knowledge about HIV/acquired immunodeficiency syndrome; and either (7a) severe childhood maltreatment or (7b) Caucasian race. Men in this population often sought

  17. A review of hydroxyapatite-based coating techniques: Sol-gel and electrochemical depositions on biocompatible metals.

    Science.gov (United States)

    Asri, R I M; Harun, W S W; Hassan, M A; Ghani, S A C; Buyong, Z

    2016-04-01

    New promising techniques for depositing biocompatible hydroxyapatite-based coatings on biocompatible metal substrates for biomedical applications have continuously been exploited for more than two decades. Currently, various experimental deposition processes have been employed. In this review, the two most frequently used deposition processes will be discussed: a sol-gel dip coating and an electrochemical deposition. This study deliberates the surface morphologies and chemical composition, mechanical performance and biological responses of sol-gel dip coating as well as the electrochemical deposition for two different sample conditions, with and without coating. The review shows that sol-gel dip coatings and electrochemical deposition were able to obtain the uniform and homogeneous coating thickness and high adherent biocompatible coatings even in complex shapes. It has been accepted that both coating techniques improve bone strength and initial osseointegration rate. The main advantages and limitations of those techniques of hydroxyapatite-based coatings are presented. Furthermore, the most significant challenges and critical issues are also highlighted. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Experimental evaluation of chromium-carbide-based solid lubricant coatings for use to 760 C

    Science.gov (United States)

    Dellacorte, Christopher

    1987-01-01

    A research program is described which further developed and investigated chromium carbide based self-lubricating coatings for use to 760 C. A bonded chromium carbide was used as the base stock because of the known excellent wear resistance and the chemical stability of chromium carbide. Additives were silver and barium fluoride/calcium fluoride eutectic. The three coating components were blended in powder form, applied to stainless steel substrates by plasma spraying and then diamond ground to the desired coating thickness. A variety of coating compositions was tested to determine the coating composition which gave optimum tribological results. Coatings were tested in air, helium, and hydrogen at temperatures from 25 to 760 C. Several counterface materials were evaluated with the objective of discovering a satisfactory metal/coating sliding combination for potential applications, such as piston ring/cylinder liner couples for Stirling engines. In general, silver and fluoride additions to chromium carbide reduced the friction coefficient and increased the wear resistance relative to the unmodified coating. The lubricant additives acted synergistically in reducing friction and wear.

  19. Characterization of zeolite-based coatings for adsorption heat pumps

    CERN Document Server

    Freni, Angelo; Bonaccorsi, Lucio; Chmielewski, Stefanie; Frazzica, Andrea; Calabrese, Luigi; Restuccia, Giovanni

    2015-01-01

    This book proposes a radically new approach for characterizing thermophysical and mechanical properties of zeolite-based adsorbent coatings for Adsorptive Heat Transformers (AHT). It presents a developed standard protocol for the complete characterization of advanced coated adsorbers. Providing an in-depth analysis of the different procedures necessary for evaluating the performance of adsorbers, it also presents an analysis of their stability under the hydrothermal and mechanical stresses during their entire life cycle. Adsorptive Heat Transformers (AHT), especially adsorption chillers and

  20. Lignin based controlled release coatings

    NARCIS (Netherlands)

    Mulder, W.J.; Gosselink, R.J.A.; Vingerhoeds, M.H.; Harmsen, P.F.H.; Eastham, D.

    2011-01-01

    Urea is a commonly used fertilizer. Due to its high water-solubility, misuse easily leads to excess nitrogen levels in the soil. The aim of this research was to develop an economically feasible and biodegradable slow-release coating for urea. For this purpose, lignin was selected as coating

  1. 7YSZ coating prepared by PS-PVD based on heterogeneous nucleation

    Directory of Open Access Journals (Sweden)

    Ziqian DENG

    2018-04-01

    Full Text Available Plasma spray-physical vapor deposition (PS-PVD as a novel coating process based on low-pressure plasma spray (LPPS has been significantly used for thermal barrier coatings (TBCs. A coating can be deposited from liquid splats, nano-sized clusters, and the vapor phase forming different structured coatings, which shows obvious advantages in contrast to conventional technologies like atmospheric plasma spray (APS and electron beam-physical vapor deposition (EB-PVD. In addition, it can be used to produce thin, dense, and porous ceramic coatings for special applications because of its special characteristics, such as high power, very low pressure, etc. These provide new opportunities to obtain different advanced microstructures, thus to meet the growing requirements of modern functional coatings. In this work, focusing on exploiting the potential of gas-phase deposition from PS-PVD, a series of 7YSZ coating experiments with various process conditions was performed in order to better understand the deposition process in PS-PVD, where coatings were deposited on different substrates including graphite and zirconia. Meanwhile, various substrate temperatures were investigated for the same substrate. As a result, a deposition mechanism of heterogeneous nucleation has been presented showing that surface energy is an important influencing factor for coating structures. Besides, undercooling of the interface between substrate and vapor phase plays an important role in coating structures. Keywords: 7YSZ, Deposition mechanism, Heterogeneous nucleation, PS-PVD, TBC

  2. The Influence of the Coating Deposition Process on the Interdiffusion Behavior Between Nickel-Based Superalloys and MCrAlY Bond Coats

    Science.gov (United States)

    Elsaß, M.; Frommherz, M.; Oechsner, M.

    2018-02-01

    In this work, interdiffusion between two nickel-based superalloys and two MCrAlY bond coats is investigated. The MCrAlY bond coats were applied using two different spraying processes, high velocity oxygen fuel spraying (HVOF) and low-pressure plasma spraying. Of primary interest is the evolution of Kirkendall porosity, which can form at the interface between substrate and bond coat and depends largely on the chemical compositions of the coating and substrate. Experimental evidence further suggested that the formation of Kirkendall porosity depends on the coating deposition process. Formation of porosity at the interface causes a degradation of the bonding strength between substrate and coating. After coating deposition, the samples were annealed at 1050 °C for up to 2000 h. Microstructural and compositional analyses were performed to determine and evaluate the Kirkendall porosity. The results reveal a strong influence of both the coating deposition process and the chemical compositions. The amount of Kirkendall porosity formed, as well as the location of appearance, is largely influenced by the coating deposition process. In general, samples with bond coats applied by means of HVOF show accelerated element diffusion. It is hypothesized that recrystallization of the substrate material is a main root cause for these observations.

  3. Polarized BRDF for coatings based on three-component assumption

    Science.gov (United States)

    Liu, Hong; Zhu, Jingping; Wang, Kai; Xu, Rong

    2017-02-01

    A pBRDF(polarized bidirectional reflection distribution function) model for coatings is given based on three-component reflection assumption in order to improve the polarized scattering simulation capability for space objects. In this model, the specular reflection is given based on microfacet theory, the multiple reflection and volume scattering are given separately according to experimental results. The polarization of specular reflection is considered from Fresnel's law, and both multiple reflection and volume scattering are assumed depolarized. Simulation and measurement results of two satellite coating samples SR107 and S781 are given to validate that the pBRDF modeling accuracy can be significantly improved by the three-component model given in this paper.

  4. Thermoset coatings from epoxidized sucrose soyate and blocked, bio-based dicarboxylic acids.

    Science.gov (United States)

    Kovash, Curtiss S; Pavlacky, Erin; Selvakumar, Sermadurai; Sibi, Mukund P; Webster, Dean C

    2014-08-01

    A new 100% bio-based thermosetting coating system was developed from epoxidized sucrose soyate crosslinked with blocked bio-based dicarboxylic acids. A solvent-free, green method was used to block the carboxylic acid groups and render the acids miscible with the epoxy resin. The thermal reversibility of this blocking allowed for the formulation of epoxy-acid thermoset coatings that are 100% bio-based. This was possible due to the volatility of the vinyl ethers under curing conditions. These systems have good adhesion to metal substrates and perform well under chemical and physical stress. Additionally, the hardness of the coating system is dependent on the chain length of the diacid used, making it tunable. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  5. Method of coating an iron-based article

    Science.gov (United States)

    Magdefrau, Neal; Beals, James T.; Sun, Ellen Y.; Yamanis, Jean

    2016-11-29

    A method of coating an iron-based article includes a first heating step of heating a substrate that includes an iron-based material in the presence of an aluminum source material and halide diffusion activator. The heating is conducted in a substantially non-oxidizing environment, to cause the formation of an aluminum-rich layer in the iron-based material. In a second heating step, the substrate that has the aluminum-rich layer is heated in an oxidizing environment to oxidize the aluminum in the aluminum-rich layer.

  6. Evaluation of Surface Characteristics of Denture Base Using Organic-Inorganic Hybrid Coating: An SEM Study.

    Science.gov (United States)

    Aa, Jafari; Mh, Lotfi-Kamran; M, Ghafoorzadeh; Sm, Shaddel

    2017-06-01

    Despite the numerous positive features of acrylic denture base, there are a number of undeniable associated disadvantages. The properties of denture base have been improved through various interventions including application of different types of filler and coatings. This study aimed to evaluate the surface roughness, thickness and coating quality of organic-inorganic coating on the denture base through scanning electron microscopy. Moreover, the colour change was evaluated visually. The organic-inorganic hybrid coatings were prepared. Acrylic discs of 10×10 mm were fabricated. The test discs were dipped in the hybrid coating and cured. In order to evaluate the surface roughness and coating thickness, the surface and cross-section of the samples in both coated and control groups were subjected to scanning electron microscopy. The colour change and transparency were visually evaluated with naked eyes. The data were statistically analyzed by student's t test. The hybrid materials perfectly covered all the surfaces of acrylic resin and established proper thickness. The coated group seemed smoother and flatter than the control group; however, the difference was not statistically significant ( for all parameters p > 0.05). It was quite a thin coating and no perceptible colour change was observed. The hybrid coating maintained good binding, caused no noticeable discoloration, and thoroughly covered the acrylic resin surface with uniform delicate thickness. It also slightly improved the acrylic resin surface roughness.

  7. Quantitative analysis of silica aerogel-based thermal insulation coatings

    DEFF Research Database (Denmark)

    Kiil, Søren

    2015-01-01

    containing intact hollow glass or polymer spheres showed that silica aerogel particles are more efficient in an insulation coating than hollow spheres. In a practical (non-ideal) comparison, the ranking most likely cannot be generalized. A parameter study demonstrates how the model can be used, qualitatively......A mathematical heat transfer model for a silica aerogel-based thermal insulation coating was developed. The model can estimate the thermal conductivity of a two-component (binder-aerogel) coating with potential binder intrusion into the nano-porous aerogel structure. The latter is modelled using...... a so-called core–shell structure representation. Data from several previous experimental investigations with silica aerogels in various binder matrices were used for model validation. For some relevant cases with binder intrusion, it was possible to obtain a very good agreement between simulations...

  8. A Constraint programming-based genetic algorithm for capacity output optimization

    Directory of Open Access Journals (Sweden)

    Kate Ean Nee Goh

    2014-10-01

    Full Text Available Purpose: The manuscript presents an investigation into a constraint programming-based genetic algorithm for capacity output optimization in a back-end semiconductor manufacturing company.Design/methodology/approach: In the first stage, constraint programming defining the relationships between variables was formulated into the objective function. A genetic algorithm model was created in the second stage to optimize capacity output. Three demand scenarios were applied to test the robustness of the proposed algorithm.Findings: CPGA improved both the machine utilization and capacity output once the minimum requirements of a demand scenario were fulfilled. Capacity outputs of the three scenarios were improved by 157%, 7%, and 69%, respectively.Research limitations/implications: The work relates to aggregate planning of machine capacity in a single case study. The constraints and constructed scenarios were therefore industry-specific.Practical implications: Capacity planning in a semiconductor manufacturing facility need to consider multiple mutually influenced constraints in resource availability, process flow and product demand. The findings prove that CPGA is a practical and an efficient alternative to optimize the capacity output and to allow the company to review its capacity with quick feedback.Originality/value: The work integrates two contemporary computational methods for a real industry application conventionally reliant on human judgement.

  9. Montreal Accord on Patient-Reported Outcomes (PROs) use series - Paper 9: anonymization and ethics considerations for capturing and sharing patient reported outcomes.

    Science.gov (United States)

    Arbuckle, Luk; Moher, Ester; Bartlett, Susan J; Ahmed, Sara; El Emam, Khaled

    2017-09-01

    Patient-reported outcomes (PROs) are collected with consent for care; however, using the data for any other purpose requires consent for that additional purpose, or the anonymization of the data. Collecting explicit consent to use this data for secondary purposes, before the patient completes a PRO, can also bias the responses. We consider the ethical and security issues related to the collection of data at the point of care or in the population and the aggregation and integration of PRO data with administrative databases to facilitate decision making and comparative effectiveness research. In this article, we describe risk-based anonymization, taking the context of the data release into account, so that we may consider the degree by which the release is considered anonymized. We also consider the ethical use of anonymized data, the anonymization of free-form text, and the secure linking data sets without sharing any personal information. Many good standards and best practices exist for the sharing of health data and could be used as a baseline in the development of a national PRO initiative. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Stabilizing lead bullets in shooting range soil by phosphate-based surface coating

    Directory of Open Access Journals (Sweden)

    Bin Hua

    2016-08-01

    Full Text Available Soil lead (Pb is well known as a threat to human health and ecosystem. Although relatively insoluble, lead bullets in shooting range soil can be readily released into soluble forms through natural weathering processes and thus pose significant human and environmental risks. In this study, laboratory experiments were conducted to investigate if the Pb bullets in shooting range soil can be stabilized through surface coating of phosphate-based materials. Results indicated that FePO4 or AlPO4 coatings, insoluble metal phosphates, have been successfully formed on the surface of the Pb bullets. The EPA Toxicity Characteristic Leaching Procedure (TCLP test showed that FePO4 or AlPO4 surface coating would effectively reduce the Pb solubility or leachability of the bullets. The surface coating under pH of <5.5 for 7 days could achieve 92–100% reduction, with 85–98% by FePO4 coating and 77–98% by AlPO4 coating as compared with the non-coating. Leachable Pb concentration in the contaminated shooting range soil was reduced by 85–98% or 77–98% as a result of the FePO4 or AlPO4 solution treatment. This study demonstrated that the FePO4 or AlPO4–based surface coating on lead bullets can effectively inhibit the Pb weathering and significantly reduce the Pb release from soil through in situ chemical stabilization, which could be potentially applicable as a cost-effective and environmental-sound technology for the remediation of Pb-contaminated shooting range soil.

  11. Microstructures and tribological properties of laser cladded Ti-based metallic glass composite coatings

    Energy Technology Data Exchange (ETDEWEB)

    Lan, Xiaodong; Wu, Hong, E-mail: wuhong927@126.com; Liu, Yong, E-mail: yonliu@csu.edu.cn; Zhang, Weidong; Li, Ruidi; Chen, Shiqi; Zai, Xiongfei; Hu, Te

    2016-10-15

    Metallic glass composite coatings Ti{sub 45}Cu{sub 41}Ni{sub 9}Zr{sub 5} and Ti{sub 45}Cu{sub 41}Ni{sub 6}Zr{sub 5}Sn{sub 3} (at.%) on a Ti-30Nb-5Ta-7Zr (wt.%) (TNTZ) alloy were prepared by laser cladding. The microstructures of the coatings were characterized by means of X-ray diffractometry (XRD), scanning electron microscopy (SEM) equipped with energy dispersive X-ray analyzer (EDXA), and transmission electron microscopy (TEM). Results indicated that the coatings have an amorphous structure embedded with a few nanocrystalline phases and dendrites. A partial substitution of Ni by Sn can improve the glass forming ability of Ti-base metallic glass system, and induce the formation of nano-sized Ni{sub 2}SnTi phase during the cyclic laser heating. The tribological behavior of both the substrate and the coatings was investigated in detail. A significant improvement in both the hardness and the wear resistance of the coatings was achieved with the addition of Sn. The relationship between the wear resistance and the microstructures of the coatings was discussed. - Highlights: •Ti-based metallic glass composite coatings were prepared by laser cladding. •The wear resistance is greatly improved by laser cladding of composite coatings. •Substitution of Ni by Sn increases GFA and wear resistance of the coatings. •A good balance of crystalline/amorphous phases improves the wear resistance. •Adhesive wear serves as the dominant wear mechanism of the composite coatings.

  12. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  13. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  14. An agent-based analysis of the German electricity market with transmission capacity constraints

    International Nuclear Information System (INIS)

    Veit, Daniel J.; Weidlich, Anke; Krafft, Jacob A.

    2009-01-01

    While some agent-based models have been developed for analyzing the German electricity market, there has been little research done on the emerging issue of intra-German congestion and its effects on the bidding behavior of generator agents. Yet, studies of other markets have shown that transmission grid constraints considerably affect strategic behavior in electricity markets. In this paper, the implications of transmission constraints on power markets are analyzed for the case of Germany. Market splitting is applied in the case of congestion in the grid. For this purpose, the agent-based modeling of electricity systems (AMES) market package developed by Sun and Tesfatsion is modified to fit the German context, including a detailed representation of the German high-voltage grid and its interconnections. Implications of transmission constraints on prices and social welfare are analyzed for scenarios that include strategic behavior of market participants and high wind power generation. It can be shown that strategic behavior and transmission constraints are inter-related and may pose severe problems in the future German electricity market.

  15. An agent-based analysis of the German electricity market with transmission capacity constraints

    Energy Technology Data Exchange (ETDEWEB)

    Veit, Daniel J.; Weidlich, Anke; Krafft, Jacob A. [University of Mannheim, Dieter Schwarz Chair of Business Administration, E-Business and E-Government, 68131 Mannheim (Germany)

    2009-10-15

    While some agent-based models have been developed for analyzing the German electricity market, there has been little research done on the emerging issue of intra-German congestion and its effects on the bidding behavior of generator agents. Yet, studies of other markets have shown that transmission grid constraints considerably affect strategic behavior in electricity markets. In this paper, the implications of transmission constraints on power markets are analyzed for the case of Germany. Market splitting is applied in the case of congestion in the grid. For this purpose, the agent-based modeling of electricity systems (AMES) market package developed by Sun and Tesfatsion is modified to fit the German context, including a detailed representation of the German high-voltage grid and its interconnections. Implications of transmission constraints on prices and social welfare are analyzed for scenarios that include strategic behavior of market participants and high wind power generation. It can be shown that strategic behavior and transmission constraints are inter-related and may pose severe problems in the future German electricity market. (author)

  16. Corrosion Behavior of Titanium Based Ceramic Coatings Deposited on Steels

    OpenAIRE

    Ali, Rania

    2016-01-01

    Titanium based ceramic films are increasingly used as coating materials because of their high hardness, excellent wear resistance and superior corrosion resistance. Using electrochemical and spectroscopic techniques, the electrochemical properties of different coatings deposited on different steels under different conditions were examined in this study. Thin films of titanium nitride (TiN), titanium diboride (TiB2), and titanium boronitride with different boron concentrations (TiBN-1&2) w...

  17. Development of iridium coated x-ray mirrors for astronomical applications

    Science.gov (United States)

    Döhring, Thorsten; Probst, Anne-Catherine; Emmerich, Florian; Stollenwerk, Manfred; Stehlíková, Veronika; Friedrich, Peter; Damm, Christine

    2017-08-01

    Future space-based X-ray observatories need to be very lightweight for launcher mass constraints. Therefore they will use a reduced mirror thickness, which results in the additional requirement of low coating stress to avoid deformation of the initial precisely shaped mirror substrates. Due to their excellent reflection properties iridium coatings are sometimes applied for grazing incidence mirrors in astronomical X-ray telescopes. At Aschaffenburg University of Applied Sciences the coating of thin iridium films by an RF-magnetron sputtering technique is under development. The work is embedded in collaborations with the Max-Planck-Institute for Extraterrestrial Physics in Germany, the Czech Technical University in Prague, the Osservatorio Astronomico di Brera in Italy, the German Leibniz Institute for Solid State and Materials Research in Dresden, and the French Institute Fresnel. Sputtering with different parameters leads to iridium films with different properties. The current work is focused on the microstructure of the iridium coatings to study the influence of the substrate and of the argon gas pressure on the thin film growing process. Correlations between coating density, surface micro-roughness, the crystalline structure of the iridium layers, and the expected reflectivity of the X-ray mirror as well as coating stress effects are presented and discussed. The final goal of the project is to integrate the produced prototype mirrors into an X-ray telescope module. On a longer timescale measurements of the mirror modules optical performance are planned at the X-ray test facility PANTER.

  18. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  19. Development of aluminide coatings on vanadium-base alloys in liquid lithium

    International Nuclear Information System (INIS)

    Park, J.H.; Dragel, D.

    1993-01-01

    Aluminide coatings were produced on vanadium and vanadium-base alloys by exposure of the materials to liquid lithium that contained 3/5 at.% dissolved aluminum in sealed V and V-20 wt.% Ti capsules at temperatures between 775 and 880 degrees C. After each test, the capsules were opened and the samples were examined by optical microscopy and scanning electron microscopy (SEM), and analyzed by electron-energy-dispersive spectroscopy (EDS) and X-ray diffraction. Hardness of the coating layers and bulk alloys was determined by microidentation techniques. The nature of the coatings, i.e., surface coverage, thickness, and composition, varied with exposure time and temperature, solute concentration in lithium, and alloy composition. Solute elements that yielded adherent coatings on various substrates can provide a means of developing in-situ electrical insulator coatings by reaction of the reactive layers with dissolved nitrogen in liquid lithium

  20. Quem controla a política de ninguém? Anonymous Brasil e o ativismo hacker nas redes de comunicação (Who control the politics of no one? Anonymous Brazil and hacktivism in communication networks Doi: 10.5212/Emancipacao.v.15i2.0008

    Directory of Open Access Journals (Sweden)

    Bárbara Maria Farias Mota

    2016-08-01

    Full Text Available Resumo: Esse artigo analisa a atuação política dos hackers a partir de um estudo de caso da rede Anonymous Brasil, uma das vertentes do hacktivismo no contexto brasileiro. Para tanto, utiliza as postagens de um dos diferentes perfis Anonymous no Twitter, no período da Operação Hacking Cup (#OpHackingCup, que consistiu em uma série de protestos virtuais contra a Copa do Mundo de 2014. Metodologicamente, o desenho de pesquisa adota uma abordagem multimétodo, unindo análise de conteúdo e estatística descritiva. Os resultados evidenciam que por meio da utilização de ferramentas digitais transgressivas e do anonimato, esses atores não estatais evidenciam táticas estratégicas de ação diante do controle/vigilância presentes na sociedade contemporânea. Palavras-chave: Anonymous Brasil. Ativismo hacker. Redes informacionais. Abstract: This article analyses the political actuation of hackers from a study case of the Anonymous Brazil network, one of the faces of hacktivism in the Brazilian context. For such, this paper utilises tweets from one Anonymous profile in Twitter, during the period of the Operation Hacking Cup (#OpHackingCup, which entailed several digital protests against the 2014 World Cup. Methodologically, this paper adopts a research design based on a multi-method approach, uniting content analysis and descriptive statistics. The results show that, by the means of transgressive digital tools and anonymity, those actors spotlight strategical tactics as a countermeasure to the control/surveillance that is present in the contemporary society. Keywords: Anonymous Brazil. Hacktivism. Informational networks.

  1. CBDS: Constraint-based diagnostic system for malfunction identification in the nuclear power plant

    International Nuclear Information System (INIS)

    Ha, J.

    1992-01-01

    Traditional rule-based diagnostic expert systems use the experience of experts in the form of rules that associate symptoms with underlying faults. A commonly recognized failing of such systems is their narrow range of expertise and their inability to recognize problems outside this range of expertise. A model base diagnostic system isolating malfunctioning components-CBDS, the Constraint based Diagnostic System-has been developed. Since the intended behavior of a device is more predictable than unintended behaviors (faults), a model based system using the intended behavior has a potential to diagnose unexpected malfunctions by considering faults as open-quotes anything other than the intended behavior.close quotes As a knowledge base, the CBDS generates and decomposes a constraint network based on the structure and behavior model, which are represented symbolically in algebraic equations. Behaviors of generic components are organized in a component model library. Once the library is available, actual domain knowledge can be represented by declaring component types and their connections. To capture various plant knowledge, the mixed model was developed which allow the use of different parameter types in one equation by defining various operators. The CBDS uses the general idea of model based diagnosis. It detects a discrepancy between observation and prediction using constraint propagation, which carriers and accumulates the assumptions when parameter values are deduced. When measured plant parameters are asserted into a constraint network and are propagated through the network, a discrepancy will be detected if there exists any malfunctioning component. The CBDS was tested in the Recirculation Flow Control System of a BWR, and has been shown to be able to diagnose unexpected events

  2. Influence of coating quality on the service life of land-based gas turbine blades

    Energy Technology Data Exchange (ETDEWEB)

    Cheruvu, N.S. [Southwest Research Institute, San Antonio (United States)

    2007-06-15

    The land-based gas turbine blades operate at severe operating conditions: higher metal temperatures and stresses, and severe duty cycles. Metallic coatings with or without a top ceramic coating have been used to protect the turbine blades. The durability of the coating system is one of the prime life-limiting factors of modem gas turbine blades. The quality of the coating plays a critical role on the coating life. This paper discusses the failure mechanisms of the coatings and describes how the quality of the coating affects the service life of a gas turbine blade. A few case studies are presented in the paper. (orig.)

  3. Use of WhatsApp in Higher Education: What's Up with Assessing Peers Anonymously?

    Science.gov (United States)

    Güler, Çetin

    2017-01-01

    The aim of this study is to investigate the use of WhatsApp application in anonymous peer assessment in higher education. The mobile phone application WhatsApp was used as both an anonymous and nonanonymous peer assessment tool in a classroom environment. The participants of the study were the students of two classes (sophomores and juniors), half…

  4. Visualization of the distribution of surface-active block copolymers in PDMS-based coatings

    DEFF Research Database (Denmark)

    Noguer, A. Camós; Latipov, R.; Madsen, F. B.

    2018-01-01

    the distribution and release of these block copolymers from PDMS-based coatings has been previously reported. However, the distribution and behaviour of these compounds in the bulk of the PDMS coating are not fully understood. A novel fluorescent-labelled triblock PEG-b-PDMS-b-PEG copolymer was synthesized...... results in non-specific protein adsorption and wettability issues. Poly(ethylene glycol)-based surface-active block copolymers and surfactants have been added to PDMS coatings and films to impart biofouling resistance and hydrophilicity to the PDMS surface with successful results. Information regarding...

  5. New non-stick expoxy-silicone water-based coatings part 1: Physical and surface properties

    Energy Technology Data Exchange (ETDEWEB)

    Garti, N. [Hebrew Univ. of Jerusalem (Israel); Smith, J. [Decora Manufacturing, Fort Edward, NY (United States)

    1995-06-01

    In search for tomorrow`s technology for water-based coating, Decora Manufacturing and The Hebrew University of Jerusalem, have initiated an intensive research program for designing, developing and manufacturing new coatings based on cross-linked, room temperature-cured silicone-expoxy resins. The new water-borne coatings have most exciting characteristics such as: non-stick properties, effective release, high lubricity, corrosion protection and abrasion resistance. The coatings are environmentally-friendly and easy to use. These coatings are ideal for marine, agricultural, industrial and maintenance applications. This paper brings quantitative measurements related to the dispersion technology (particle size, stability, shelf-life), to the non-stick properties (deicing, low surface energy, easy-release and non-stick), lubricity, adhesion to substrates, viscosity, dynamic and static friction coefficients and environmental impact (low VOC, non-toxicity, low-leaching). The coating was tested in various industrial coating systems and was found to exhibit excellent non-stick and release properties. Special attention was given to Zebra Mussels, Quagga Mussels and other bacterial and algeal bioforms. The coating proved to be efficient as foul-release coating with very low biofouling adhesion. The low adhesion applied to many other substances in which foul-release means easy-clean and low-wear.

  6. Effect of concentration of Curcuma longa L. on chitosan-starch based edible coating

    Science.gov (United States)

    Yusof, N. M.; Jai, J.; Hamzah, F.; Yahya, A.; Pinijsuwan, S.

    2017-08-01

    The ability of chitosan-starch based coating to extend shelf life of strawberry were studied. The main objectives of this paper is to study the effects of different concentrations (20, 15, 10 and 5 µL) of Curcuma longa L. (CUR) essential oil into chitosan-based edible coating on surface tension in order to increase the effectiveness of the coating. CUR or turmeric is one of the commercially planted herbs in Malaysia for its phytochemical benefits. Application of edible coating using dipping technique has been analysed and evaluated for their effectiveness in extending shelf life of fruits. Surface tension was analysed to investigate the adhesion properties. The best CUR concentration was 15 µL with the optimum surface tension was found to be 31.92 dynes/cm.

  7. Risk constraint measures developed for the outcome-based strategy for tank waste management

    International Nuclear Information System (INIS)

    Harper, B.L.; Gajewski, S.J.; Glantz, C.L.

    1996-09-01

    This report is one of a series of supporting documents for the outcome-based characterization strategy developed by PNNL. This report presents a set of proposed risk measures with risk constraint (acceptance) levels for use in the Value of Information process used in the NCS. The characterization strategy has developed a risk-based Value of Information (VOI) approach for comparing the cost-effectiveness of characterizing versus mitigating particular waste tanks or tank clusters. The preference between characterizing or mitigating in order to prevent an accident depends on the cost of those activities relative to the cost of the consequences of the accident. The consequences are defined as adverse impacts measured across a broad set of risk categories such as worker dose, public cancers, ecological harm, and sociocultural impacts. Within each risk measure, various open-quotes constraint levelsclose quotes have been identified that reflect regulatory standards or conventionally negotiated thresholds of harm to Hanford resources and values. The cost of consequences includes the open-quotes costs close-quote of exceeding those constraint levels as well as a strictly linear costing per unit of impact within each of the risk measures. In actual application, VOI based-decision making is an iterative process, with a preliminary low-precision screen of potential technical options against the major risk constraints, followed by VOI analysis to determine the cost-effectiveness of gathering additional information and to select a preferred technical option, and finally a posterior screen to determine whether the preferred option meets all relevant risk constraints and acceptability criteria

  8. Life assessment of PVD based hard coatings by linear sweep voltammetry for high performance industrial application

    International Nuclear Information System (INIS)

    Malik, M.; Alam, S.; Irfan, M.; Hassan, Z.

    2006-01-01

    PVD based hard coatings have remarkable achievements in order to improve Tribological and surface properties of coating tools and dies. As PVD based hard coatings have a wide range of industrial applications especially in aerospace and automobile parts where they met different chemical attacks and in order to improve industrial performance these coatings must provide an excellent resistance against corrosion, high temperature oxidation and chemical reaction. This paper focuses on study of behaviour of PVD based hard coatings under different corrosive environments like as H/sub 2/SO/sub 4/, HCl, NaCl, KCl, NaOH etc. Corrosion rate was calculate under linear sweep voltammetry method where the Tafel extrapolation curves used for continuously monitoring the corrosion rate. The results show that these coatings have an excellent resistance against chemical attack. (author)

  9. Study the effect of nitrogen flow rate on tribological properties of tantalum nitride based coatings

    Science.gov (United States)

    Chauhan, Dharmesh B.; Chauhan, Kamlesh V.; Sonera, Akshay L.; Makwana, Nishant S.; Dave, Divyeshkumar P.; Rawal, Sushant K.

    2018-05-01

    Tantalum Nitride (TaN) based coatings are well-known for their high temperature stability and chemical inertness. We have studied the effect of nitrogen flow rate variation on the structural and tribological properties of TaN based coating deposited by RF magnetron sputtering process. The nitrogen flow rate was varied from 5 to 30 sccm. X-ray diffractometer (XRD) and Atomic Force Microscopy (AFM) were used to determine structure and surface topography of coating. Pin on disc tribometer was used to determine tribological properties of coating. TaN coated brass and mild steel substrates shows higher wear resistance compared to uncoated substrates of brass and mild steel.

  10. An Efficient Energy Constraint Based UAV Path Planning for Search and Coverage

    OpenAIRE

    Gramajo, German; Shankar, Praveen

    2017-01-01

    A path planning strategy for a search and coverage mission for a small UAV that maximizes the area covered based on stored energy and maneuverability constraints is presented. The proposed formulation has a high level of autonomy, without requiring an exact choice of optimization parameters, and is appropriate for real-time implementation. The computed trajectory maximizes spatial coverage while closely satisfying terminal constraints on the position of the vehicle and minimizing the time of ...

  11. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  12. Detection of Common Problems in Real-Time and Multicore Systems Using Model-Based Constraints

    Directory of Open Access Journals (Sweden)

    Raphaël Beamonte

    2016-01-01

    Full Text Available Multicore systems are complex in that multiple processes are running concurrently and can interfere with each other. Real-time systems add on top of that time constraints, making results invalid as soon as a deadline has been missed. Tracing is often the most reliable and accurate tool available to study and understand those systems. However, tracing requires that users understand the kernel events and their meaning. It is therefore not very accessible. Using modeling to generate source code or represent applications’ workflow is handy for developers and has emerged as part of the model-driven development methodology. In this paper, we propose a new approach to system analysis using model-based constraints, on top of userspace and kernel traces. We introduce the constraints representation and how traces can be used to follow the application’s workflow and check the constraints we set on the model. We then present a number of common problems that we encountered in real-time and multicore systems and describe how our model-based constraints could have helped to save time by automatically identifying the unwanted behavior.

  13. Preference for anonymity in sperm donation for artificial insemination: an experience from low-resource settings in Nigeria

    Science.gov (United States)

    Ezugwu, Euzebus Chinonye; Eleje, George U; Iyoke, Chukwuemeka A; Mba, Sunday G; Nnaji, Henry C; Enechukwu, Chukwunonso I; Nkwo, Peter O

    2018-01-01

    Objective Anonymous sperm donation is a common practice in Nigeria with its associated legal and ethical challenges. This study aimed to investigate infertile couples’ opinions about issues of sperm donor anonymity and to determine factors that might influence their preferences. Methods A cross-sectional, multicentered, questionnaire-based study was conducted among infertile couples attending infertility clinics in three tertiary hospitals in the south-eastern region of Nigeria over a period of 6 months. Results A total of 450 infertile couples were recruited consecutively from the three study centers. However, 450 females and 352 males (total=802) participated in the study. The level of awareness of artificial insemination using donor sperm for the management of male infertility among the respondents was 69.2%, while its acceptability rate was 62.7%. The majority of the respondents indicated their preference for secrecy and anonymity in sperm donation. Approximately 84% of the respondents indicated that the mode of conception should never be disclosed to the donor-conceived child, and ~92% of them indicated that the identity of the sperm donor should never be revealed to the donor-conceived child. Fear of adverse effect of such disclosure on the child and the possible of rejection of the father in order to seek for the donor were the major reasons for their preference for anonymity. Conclusion Although it has been argued that every child has a right to know their genetic parents, the reasons proffered by the respondents for their preference for anonymity cannot be totally ignored. Establishing a regulatory body and enacting laws that will address both the ethical and legal issues associated with gamete donation in the developing world will go a long way in promoting openness and honest communication with donor-conceived children. PMID:29670338

  14. LARGE AREA FILTERED ARC DEPOSITION OF CARBON AND BORON BASED HARD COATINGS

    Energy Technology Data Exchange (ETDEWEB)

    Bhattacharya, Rabi S.

    2003-12-05

    This document is a final report covering work performed under Contract No. DE-FG02-99ER82911 from the Department of Energy under a SBIR Phase II Program. Wear resistant, hard coatings can play a vital role in many engineering applications. The primary goal of this project was to develop coatings containing boron and carbon with hardness greater than 30 GPa and evaluate these coatings for machining applications. UES has developed a number of carbon and boron containing coatings with hardness in the range of 34 to 65 GPa using a combination of filtered cathodic arc and magnetron sputtering. The boron containing coatings were based on TiB2, TiBN, and TiBCN, while the carbon containing coatings ere TiC+C and hydrogen free diamond-like-carbon. Machining tests were performed with single and multilayer coated tools. The turning and milling tests were run at TechSolve Inc., under a subcontract at Ohio State University. Significant increases in tool lives were realized in end milling of H-13 die steel (8X) and titanium alloy (80%) using the TiBN coating. A multilayer TiBN/TiN performed the best in end-milling of highly abrasive Al-Si alloys. A 40% increase in life over the TiAlN benchmark coating was found. Further evaluations of these coatings with commercialization partners are currently in progress.

  15. Towards anti-corrosion coatings from surfactant-free latexes based on maleic anhydride containing polymers

    NARCIS (Netherlands)

    Soer, W.J.; Ming, W.; Koning, C.E.; Benthem, van R.A.T.M.

    2008-01-01

    We report on the film formation of surfactant-free, artificial latexes based on copolymers containing maleic anhydride. Different metallic substrates, such as aluminum, steel and magnesium alloys, were coated with three different latexes. A commercial polyester based coating was used as a

  16. Isothermal and dynamic oxidation behaviour of Mo-W doped carbon-based coating

    Science.gov (United States)

    Mandal, Paranjayee; Ehiasarian, Arutiun P.; Hovsepian, Papken Eh.

    2015-10-01

    The oxidation behaviour of Mo-W doped carbon-based coating (Mo-W-C) is investigated in elevated temperature (400-1000 °C). Strong metallurgical bond between Mo-W-C coating and substrate prevents any sort of delamination during heat-treatment. Isothermal oxidation tests show initial growth of metal oxides at 500 °C, however graphitic nature of the as-deposited coating is preserved. The oxidation progresses with further rise in temperature and the substrate is eventually exposed at 700 °C. The performance of Mo-W-C coating is compared with a state-of-the-art DLC(Cr/Cr-WC/W:C-H/a:C-H) coating, which shows preliminary oxidation at 400 °C and local delamination of the coating at 500 °C leading to substrate exposure. The graphitisation starts at 400 °C and the diamond-like structure is completely converted into the graphite-like structure at 500 °C. Dynamic oxidation behaviour of both the coatings is investigated using Thermo-gravimetric analysis carried out with a slow heating rate of 1 °C/min from ambient temperature to 1000 °C. Mo-W-C coating resists oxidation up to ˜800 °C whereas delamination of DLC(Cr/Cr-WC/W:C-H/a:C-H) coating is observed beyond ˜380 °C. In summary, Mo-W-C coating provides improved oxidation resistance at elevated temperature compared to DLC(Cr/Cr-WC/W:C-H/a:C-H) coating.

  17. Durability of Bricks Coated with Red mud Based Geopolymer Paste

    Science.gov (United States)

    Singh, Smita; Basavanagowda, S. N.; Aswath, M. U.; Ranganath, R. V.

    2016-09-01

    The present study is undertaken to assess the durability of concrete blocks coated with red mud - fly ash based geopolymer paste. Concrete blocks of size 200 x 200 x 100mm were coated with geopolymer paste synthesized by varying the percentages of red mud and fly ash. Uncoated concrete blocks were also tested for the durability for comparison. In thermal resistance test, the blocks were subjected to 600°C for an hour whereas in acid resistance test, they were kept in 5% sulphuric acid solution for 4 weeks. The specimens were thereafter studied for surface degradation, strength loss and weight loss. Pastes with red mud percentage greater than 50% developed lot of shrinkage cracks. The blocks coated with 30% and 50% red mud paste showed better durability than the other blocks. The use of blocks coated with red mud - fly ash geopolymer paste improves the aesthetics, eliminates the use of plaster and improves the durability of the structure.

  18. Adhesive coatings based on melanin-like nanoparticles for surgical membranes.

    Science.gov (United States)

    Scognamiglio, Francesca; Travan, Andrea; Turco, Gianluca; Borgogna, Massimiliano; Marsich, Eleonora; Pasqua, Mattia; Paoletti, Sergio; Donati, Ivan

    2017-07-01

    Adhesive coatings for implantable biomaterials can be designed to prevent material displacement from the site of implant. In this paper, a strategy based on the use of melanin-like nanoparticles (MNPs) for the development of adhesive coatings for polysaccharidic membranes was devised. MNPs were synthesized in vitro and characterized in terms of dimensions and surface potential, as a function of pH and ionic strength. The in vitro biocompatibility of MNPs was investigated on fibroblast cells, while the antimicrobial properties of MNPs in suspension were evaluated on E. coli and S. aureus cultures. The manufacturing of the adhesive coatings was carried out by spreading MNPs over the surface of polysaccharidic membranes; the adhesive properties of the nano-engineered coating to the target tissue (intestinal serosa) were studied in simulated physiological conditions. Overall, this study opens for novel approaches in the design of naturally inspired nanostructured adhesive systems. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    van Drie, A.; Ganzevoort, R.R.; Spiering, M.

    2014-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria

  20. Optically transparent, superhydrophobic methyltrimethoxysilane based silica coatings without silylating reagent

    International Nuclear Information System (INIS)

    Kavale, Mahendra S.; Mahadik, D.B.; Parale, V.G.; Wagh, P.B.; Gupta, Satish C.; Rao, A.Venkateswara; Barshilia, Harish C.

    2011-01-01

    The superhydrophobic surfaces have drawn lot of interest, in both academic and industries because of optically transparent, adherent and self-cleaning behavior. Surface chemical composition and morphology plays an important role in determining the superhydrophobic nature of coating surface. Such concert of non-wettability can be achieved, using surface modifying reagents or co-precursor method in sol-gel process. Attempts have been made to increase the hydrophobicity and optical transparency of methyltrimethoxysilane (MTMS) based silica coatings using polymethylmethacrylate (PMMA) instead of formal routes like surface modification using silylating reagents. The optically transparent, superhydrophobic uniform coatings were obtained by simple dip coating method. The molar ratio of MTMS:MeOH:H 2 O was kept constant at 1:5.63:1.58, respectively with 0.5 M NH 4 F as a catalyst and the weight percent of PMMA varied from 1 to 8. The hydrophobicity of silica coatings was analyzed by FTIR and contact angle measurements. These substrates exhibited 91% optical transmittance as compared to glass and water drop contact angle as high as 171 ± 1 deg. The effect of humidity on hydrophobic nature of coating has been studied by exposing these films at relative humidity of 90% at constant temperature of 30 deg. C for a period of 45 days. The micro-structural studies carried out by transmission electron microscopy (TEM).

  1. Verbal Venting in the Social Web: Effects of Anonymity and Group Norms on Aggressive Language Use in Online Comments

    Directory of Open Access Journals (Sweden)

    Leonie Rösner

    2016-08-01

    Full Text Available Scholars often blame the occurrence of aggressive behavior in online discussions on the anonymity of the Internet; however, even on today’s less anonymous platforms, such as social networking sites, users write plenty of aggressive comments, which can elicit a whole wave of negative remarks. Drawing on the social identity and deindividuation effects (SIDE model, this research conducts a laboratory experiment with a 2 (anonymity vs. no anonymity × 2 (aggressive norm vs. non-aggressive norm between-subjects design in order to disentangle the effects of anonymity, social group norms, and their interactions on aggressive language use in online comments. Results reveal that participants used more aggressive expressions in their comments when peer comments on a blog included aggressive wording (i.e., the social group norm was aggressive. Anonymity had no direct effect; however, we found a tendency that users’ conformity to an aggressive social norm of commenting is stronger in an anonymous environment.

  2. Effects of acid and alkaline based surface preparations on spray deposited cerium based conversion coatings on Al 2024-T3

    Energy Technology Data Exchange (ETDEWEB)

    Pinc, W. [Department of Materials Science Engineering, Materials Research Center, Missouri University of Science and Technology, Rolla, MO 65409 (United States)], E-mail: wrphw5@mst.edu; Geng, S.; O' Keefe, M.; Fahrenholtz, W.; O' Keefe, T. [Department of Materials Science Engineering, Materials Research Center, Missouri University of Science and Technology, Rolla, MO 65409 (United States)

    2009-01-15

    Cerium based conversion coatings were spray deposited on Al 2024-T3 and characterized to determine the effect of surface preparation on the deposition rate and surface morphology. It was found that activation of the panel using a 1-wt.% sulfuric acid solution increased the coating deposition rate compared to alkaline cleaning alone. Analysis of the surface morphology of the coatings showed that the coatings deposited on the acid treated panels exhibited fewer visible cracks compared to coatings on alkaline cleaned panels. Auger electron spectroscopy depth profiling showed that the acid activation decreased the thickness of the aluminum oxide layer and the concentration of magnesium on the surface of the panels compared to the alkaline treatment. Additionally, acid activation increased the copper concentration at the surface of the aluminum substrate. Based on the results, the acid based surface treatment appeared to expose copper rich intermetallics, thus increasing the number of cathodic sites on the surface, which led to an overall increase in the deposition rate.

  3. Chitosan-Based Coating with Antimicrobial Agents: Preparation, Property, Mechanism, and Application Effectiveness on Fruits and Vegetables

    Directory of Open Access Journals (Sweden)

    Yage Xing

    2016-01-01

    Full Text Available Chitosan coating is beneficial to maintaining the storage quality and prolonging the shelf life of postharvest fruits and vegetables, which is always used as the carrier film for the antimicrobial agents. This review focuses on the preparation, property, mechanism, and application effectiveness on the fruits and vegetables of chitosan-based coating with antimicrobial agents. Chitosan, derived by deacetylation of chitin, is a modified and natural biopolymer as the coating material. In this article, the safety and biocompatible and antimicrobial properties of chitosan were introduced because these attributes are very important for its application. The methods to prepare the chitosan-based coating with antimicrobial agents, such as essential oils, acid, and nanoparticles, were developed by other researchers. Meanwhile, the application of chitosan-based coating is mainly due to its antimicrobial activity and other functional properties, which were investigated, introduced, and analyzed in this review. Furthermore, the surface and mechanical properties were also investigated by researchers and concluded in this article. Finally, the effects of chitosan-based coating on the storage quality, microbial safety, and shelf life of fruits and vegetables were introduced. Their results indicated that chitosan-based coating with different antimicrobial agents would probably have wide prospect in the preservation of fruits and vegetables in the future.

  4. Confidentiality, anonymity and amnesty for midwives in distress seeking online support - Ethical?

    Science.gov (United States)

    Pezaro, Sally; Clyne, Wendy; Gerada, Clare

    2018-06-01

    Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this

  5. Tie Points Extraction for SAR Images Based on Differential Constraints

    Science.gov (United States)

    Xiong, X.; Jin, G.; Xu, Q.; Zhang, H.

    2018-04-01

    Automatically extracting tie points (TPs) on large-size synthetic aperture radar (SAR) images is still challenging because the efficiency and correct ratio of the image matching need to be improved. This paper proposes an automatic TPs extraction method based on differential constraints for large-size SAR images obtained from approximately parallel tracks, between which the relative geometric distortions are small in azimuth direction and large in range direction. Image pyramids are built firstly, and then corresponding layers of pyramids are matched from the top to the bottom. In the process, the similarity is measured by the normalized cross correlation (NCC) algorithm, which is calculated from a rectangular window with the long side parallel to the azimuth direction. False matches are removed by the differential constrained random sample consensus (DC-RANSAC) algorithm, which appends strong constraints in azimuth direction and weak constraints in range direction. Matching points in the lower pyramid images are predicted with the local bilinear transformation model in range direction. Experiments performed on ENVISAT ASAR and Chinese airborne SAR images validated the efficiency, correct ratio and accuracy of the proposed method.

  6. CrN-based wear resistant hard coatings for machining and forming tools

    Energy Technology Data Exchange (ETDEWEB)

    Yang, S; Cooke, K E; Teer, D G [Teer Coatings Ltd, West Stone House, Berry Hill Industrial Estate, Droitwich, Worcestershire WR9 9AS (United Kingdom); Li, X [School of Metallurgy and Materials, University of Birmingham, Birmingham B15 2TT (United Kingdom); McIntosh, F [Rolls-Royce plc, Inchinnan, Renfrewshire PA4 9AF, Scotland (United Kingdom)

    2009-05-21

    Highly wear resistant multicomponent or multilayer hard coatings, based on CrN but incorporating other metals, have been developed using closed field unbalanced magnetron sputter ion plating technology. They are exploited in coated machining and forming tools cutting and forming of a wide range of materials in various application environments. These coatings are characterized by desirable properties including good adhesion, high hardness, high toughness, high wear resistance, high thermal stability and high machining capability for steel. The coatings appear to show almost universal working characteristics under operating conditions of low and high temperature, low and high machining speed, machining of ordinary materials and difficult to machine materials, and machining under lubricated and under minimum lubricant quantity or even dry conditions. These coatings can be used for cutting and for forming tools, for conventional (macro-) machining tools as well as for micromachining tools, either as a single coating or in combination with an advanced, self-lubricating topcoat.

  7. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

    Science.gov (United States)

    Majeed, Abdul; Ullah, Farman; Lee, Sungchang

    2017-01-01

    Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims. PMID:28481298

  8. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

    Directory of Open Access Journals (Sweden)

    Abdul Majeed

    2017-05-01

    Full Text Available Personally identifiable information (PII affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims.

  9. A Hybrid Autonomic Computing-Based Approach to Distributed Constraint Satisfaction Problems

    Directory of Open Access Journals (Sweden)

    Abhishek Bhatia

    2015-03-01

    Full Text Available Distributed constraint satisfaction problems (DisCSPs are among the widely endeavored problems using agent-based simulation. Fernandez et al. formulated sensor and mobile tracking problem as a DisCSP, known as SensorDCSP In this paper, we adopt a customized ERE (environment, reactive rules and entities algorithm for the SensorDCSP, which is otherwise proven as a computationally intractable problem. An amalgamation of the autonomy-oriented computing (AOC-based algorithm (ERE and genetic algorithm (GA provides an early solution of the modeled DisCSP. Incorporation of GA into ERE facilitates auto-tuning of the simulation parameters, thereby leading to an early solution of constraint satisfaction. This study further contributes towards a model, built up in the NetLogo simulation environment, to infer the efficacy of the proposed approach.

  10. In Situ Synthesis and Characterization of Fe-Based Metallic Glass Coatings by Electrospark Deposition Technique

    Science.gov (United States)

    Burkov, Alexander A.; Pyachin, S. A.; Ermakov, M. A.; Syuy, A. V.

    2017-02-01

    Crystalline FeWMoCrBC electrode materials were prepared by conventional powder metallurgy. Metallic glass (MG) coatings were produced by electrospark deposition onto AISI 1035 steel in argon atmosphere. X-ray diffraction and scanning electron microscopy verified the amorphous structure of the as-deposited coatings. The coatings have a thickness of about 40 microns and a uniform structure. The results of dry sliding wear tests against high-speed steel demonstrated that Fe-based MG coatings had a lower friction coefficient and more than twice the wear resistance for 20 km sliding distance with respect to AISI 1035 steel. High-temperature oxidation treatment of the metal glass coatings at 1073 K in air for 12 h revealed that the oxidation resistance of the best coating was 36 times higher than that for bare AISI 1035 steel. These findings are expected to broaden the applications of electrospark Fe-based MG as highly protective and anticorrosive coatings for mild steel.

  11. Applications of antireflection coatings in sonic crystal-based acoustic devices

    International Nuclear Information System (INIS)

    Wang Yun; Deng Ke; Xu Shengjun; Qiu Chunyin; Yang Hai; Liu Zhengyou

    2011-01-01

    The unwanted reflection seriously baffles the practical applications of sonic crystals, such as for various acoustic lenses designed by utilizing the in-band properties of sonic crystals. Herein we introduce the concept of the antireflection coating into the sonic crystal-based devices. The efficiency of such accessorial structures is demonstrated well by an originally high reflection system. Promising perspectives can be anticipated in extending the antireflection coating layers into more general acoustic applications through a flexible design process.

  12. The modulation of stem cell behaviors by functionalized nanoceramic coatings on Ti-based implants

    Directory of Open Access Journals (Sweden)

    Xiangmei Liu

    2016-09-01

    Full Text Available Nanoceramic coating on the surface of Ti-based metallic implants is a clinical potential option in orthopedic surgery. Stem cells have been found to have osteogenic capabilities. It is necessary to study the influences of functionalized nanoceramic coatings on the differentiation and proliferation of stem cells in vitro or in vivo. In this paper, we summarized the recent advance on the modulation of stem cells behaviors through controlling the properties of nanoceramic coatings, including surface chemistry, surface roughness and microporosity. In addition, mechanotransduction pathways have also been discussed to reveal the interaction mechanisms between the stem cells and ceramic coatings on Ti-based metals. In the final part, the osteoinduction and osteoconduction of ceramic coating have been also presented when it was used as carrier of BMPs in new bone formation.

  13. Design and Performance of Property Gradient Ternary Nitride Coating Based on Process Control.

    Science.gov (United States)

    Yan, Pei; Chen, Kaijie; Wang, Yubin; Zhou, Han; Peng, Zeyu; Jiao, Li; Wang, Xibin

    2018-05-09

    Surface coating is an effective approach to improve cutting tool performance, and multiple or gradient coating structures have become a common development strategy. However, composition mutations at the interfaces decrease the performance of multi-layered coatings. The key mitigation technique has been to reduce the interface effect at the boundaries. This study proposes a structure design method for property-component gradient coatings based on process control. The method produces coatings with high internal cohesion and high external hardness, which could reduce the composition and performance mutations at the interface. A ZrTiN property gradient ternary nitride coating was deposited on cemented carbide by multi-arc ion plating with separated Ti and Zr targets. The mechanical properties, friction behaviors, and cutting performances were systematically investigated, compared with a single-layer coating. The results indicated that the gradient coating had better friction and wear performance with lower wear rate and higher resistance to peeling off during sliding friction. The gradient coating had better wear and damage resistance in cutting processes, with lower machined surface roughness Ra. Gradient-structured coatings could effectively inhibit micro crack initiation and growth under alternating force and temperature load. This method could be extended to similar ternary nitride coatings.

  14. Crosslinked basement membrane-based coatings enhance glucose sensor function and continuous glucose monitoring in vivo.

    Science.gov (United States)

    Klueh, Ulrike; Ludzinska, Izabela; Czajkowski, Caroline; Qiao, Yi; Kreutzer, Donald L

    2018-01-01

    Overcoming sensor-induced tissue reactions is an essential element of achieving successful continuous glucose monitoring (CGM) in the management of diabetes, particularly when used in closed loop technology. Recently, we demonstrated that basement membrane (BM)-based glucose sensor coatings significantly reduced tissue reactions at sites of device implantation. However, the biocompatible BM-based biohydrogel sensor coating rapidly degraded over a less than a 3-week period, which effectively eliminated the protective sensor coating. In an effort to increase the stability and effectiveness of the BM coating, we evaluated the impact of crosslinking BM utilizing glutaraldehyde as a crosslinking agent, designated as X-Cultrex. Sensor performance (nonrecalibrated) was evaluated for the impact of these X-Cultrex coatings in vitro and in vivo. Sensor performance was assessed over a 28-day time period in a murine CGM model and expressed as mean absolute relative difference (MARD) values. Tissue reactivity of Cultrex-coated, X-Cultrex-coated, and uncoated glucose sensors was evaluated over a 28-day time period in vivo using standard histological techniques. These studies demonstrated that X-Cultrex-based sensor coatings had no effect on glucose sensor function in vitro. In vivo, glucose sensor performance was significantly enhanced following X-Cultrex coating throughout the 28-day study. Histological evaluations of X-Cultrex-treated sensors demonstrated significantly less tissue reactivity when compared to uncoated sensors. © 2017 Wiley Periodicals, Inc. J Biomed Mater Res Part A: 106A: 7-16, 2018. © 2017 Wiley Periodicals, Inc.

  15. Bio-based self-healing coatings based on thermo-reversible Diels-Alder reaction

    NARCIS (Netherlands)

    Turkenburg, D.H.; Durant, Y.; Fischer, H.R.

    2017-01-01

    Stimulated by the growing demand for greener and more sustainable polymer systems we have studied thermoreversible polymer networks composed largely (> 83% w/w) of diethylitaconate of bio-based origin. A series of coating materials has been synthesized consisting of linear chains of diethylitaconate

  16. Selection of boron based tribological hard coatings using multi-criteria decision making methods

    International Nuclear Information System (INIS)

    Çalışkan, Halil

    2013-01-01

    Highlights: • Boron based coating selection problem for cutting tools was solved. • EXPROM2, TOPSIS and VIKOR methods were used for ranking the alternative materials. • The best coatings for cutting tool were selected as TiBN and TiSiBN. • The ranking results are in good agreement with cutting test results in literature. - Abstract: Mechanical and tribological properties of hard coatings can be enhanced using boron as alloying element. Therefore, multicomponent nanostructured boron based hard coatings are deposited on cutting tools by different methods at different parameters. Different mechanical and tribological properties are obtained after deposition, and it is a difficult task to select the best coating material. In this paper, therefore, a systematic evaluation model was proposed to tackle the difficulty of the material selection with specific properties among a set of available alternatives. The alternatives consist of multicomponent nanostructured TiBN, TiCrBN, TiSiBN and TiAlSiBN coatings deposited by magnetron sputtering and ion implantation assisted magnetron sputtering at different parameters. The alternative coating materials were ranked by using three multi-criteria decision-making (MCDM) methods, i.e. EXPROM2 (preference ranking organization method for enrichment evaluation), TOPSIS (technique for order performance by similarity to ideal solution) and VIKOR (VIšekriterijumsko KOmpromisno Rangiranje), in order to determine the best coating material for cutting tools. Hardness (H), Young’s modulus (E), elastic recovery, friction coefficient, critical load, H/E and H 3 /E 2 ratios were considered as material selection criteria. In order to determine the importance weights of the evaluation criteria, a compromised weighting method, which composes of the analytic hierarchy process and Entropy methods, were used. The ranking results showed that TiBN and TiSiBN coatings deposited at given parameters are the best coatings for cutting tools

  17. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    Science.gov (United States)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-10-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  18. A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment

    Directory of Open Access Journals (Sweden)

    Chenyu Wang

    2018-01-01

    Full Text Available With the great development of network technology, the multiserver system gets widely used in providing various of services. And the two-factor authentication protocols in multiserver system attract more and more attention. Recently, there are two new schemes for multiserver environment which claimed to be secure against the known attacks. However, after a scrutinization of these two schemes, we found that (1 their description of the adversary’s abilities is inaccurate; (2 their schemes suffer from many attacks. Thus, firstly, we corrected their description on the adversary capacities to introduce a widely accepted adversary model and then summarized fourteen security requirements of multiserver based on the works of pioneer contributors. Secondly, we revealed that one of the two schemes fails to preserve forward secrecy and user anonymity and cannot resist stolen-verifier attack and off-line dictionary attack and so forth and also demonstrated that another scheme fails to preserve forward secrecy and user anonymity and is not secure to insider attack and off-line dictionary attack, and so forth. Finally, we designed an enhanced scheme to overcome these identified weaknesses, proved its security via BAN logic and heuristic analysis, and then compared it with other relevant schemes. The comparison results showed the superiority of our scheme.

  19. Constraint-based query distribution framework for an integrated global schema

    DEFF Research Database (Denmark)

    Malik, Ahmad Kamran; Qadir, Muhammad Abdul; Iftikhar, Nadeem

    2009-01-01

    and replicated data sources. The provided system is all XML-based which poses query in XML form, transforms, and integrates local results in an XML document. Contributions include the use of constraints in our existing global schema which help in source selection and query optimization, and a global query...

  20. Wear Resistant Thermal Sprayed Composite Coatings Based on Iron Self-Fluxing Alloy and Recycled Cermet Powders

    Directory of Open Access Journals (Sweden)

    Heikki SARJAS

    2012-03-01

    Full Text Available Thermal spray and WC-Co based coatings are widely used in areas subjected to abrasive wear. Commercial  cermet thermal spray powders for HVOF are relatively expensive. Therefore applying these powders in cost-sensitive areas like mining and agriculture are hindered. Nowadays, the use of cheap iron based self-fluxing alloy powders for thermal spray is limited. The aim of this research was to study properties of composite powders based on self-fluxing alloys and recycled cermets and to examine the properties of thermally sprayed (HVOF coatings from composite powders based on iron self-fluxing alloy and recycled cermet powders (Cr3C2-Ni and WC-Co. To estimate the properties of  recycled cermet powders, the sieving analysis, laser granulometry and morphology were conducted. For deposition of coatings High Velocity Oxy-Fuel spray was used. The structure and composition of powders and coatings were estimated by SEM and XRD methods. Abrasive wear performance of coatings was determined and compared with wear resistance of coatings from commercial powders. The wear resistance of thermal sprayed coatings from self-fluxing alloy and recycled cermet powders at abrasion is comparable with wear resistance of coatings from commercial expensive spray powders and may be an alternative in tribological applications in cost-sensitive areas.DOI: http://dx.doi.org/10.5755/j01.ms.18.1.1338

  1. Plasma-Sprayed Hydroxylapatite-Based Coatings: Chemical, Mechanical, Microstructural, and Biomedical Properties

    Science.gov (United States)

    Heimann, Robert B.

    2016-06-01

    This contribution discusses salient properties and functions of hydroxylapatite (HA)-based plasma-sprayed coatings, including the effect on biomedical efficacy of coating thickness, phase composition and distribution, amorphicity and crystallinity, porosity and surface roughness, cohesion and adhesion, micro- and nano-structured surface morphology, and residual coating stresses. In addition, it will provide details of the thermal alteration that HA particles undergo in the extremely hot plasma jet that leads to dehydroxylated phases such as oxyhydroxylapatite (OHA) and oxyapatite (OA) as well as thermal decomposition products such as tri-(TCP) and tetracalcium phosphates (TTCP), and quenched phases such as amorphous calcium phosphate (ACP). The contribution will further explain the role of ACP during the in vitro interaction of the as-deposited coatings with simulated body fluid resembling the composition of extracellular fluid (ECF) as well as the in vivo responses of coatings to the ECF and the host tissue, respectively. Finally, it will briefly describe performance profiles required to fulfill biological functions of osteoconductive bioceramic coatings designed to improve osseointegration of hip endoprostheses and dental root implants. In large parts, the content of this contribution is a targeted review of work done by the author and his students and coworkers over the last two decades. In addition, it is considered a stepping stone toward a standard operation procedure aimed at depositing plasma-sprayed bioceramic implant coatings with optimum properties.

  2. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    Directory of Open Access Journals (Sweden)

    Salma Umme

    2011-04-01

    Full Text Available Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004/23/EC. To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225 in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004/23/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  3. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    LENUS (Irish Health Repository)

    Walsh, Anthony PH

    2011-04-20

    Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004\\/23\\/EC). To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225) in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD) age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer) in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat) testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004\\/23\\/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  4. A Comparative Study of the Microstructure, Mechanical Properties and Corrosion Resistance of Ni- or Fe- Based Composite Coatings by Laser Cladding

    Science.gov (United States)

    Wan, M. Q.; Shi, J.; Lei, L.; Cui, Z. Y.; Wang, H. L.; Wang, X.

    2018-04-01

    Ni- and Fe-based composite coatings were laser cladded on 40Cr steel to improve the surface mechanical property and corrosion resistance, respectively. The microstructure and phase composition were analyzed by x-ray diffraction (XRD) and field emission scanning electron microscope (FESEM) equipped with an energy-dispersive spectrometer (EDS). The micro-hardness, tribological properties and electrochemical corrosion behavior of the coatings were evaluated. The results show that the thickness of both the coatings is around 0.7 mm, the Ni-based coating is mainly composed of γ-(Ni, Fe), FeNi3, Ni31Si12, Ni3B, CrB and Cr7C3, and the Fe-based coating is mainly composed of austenite and (Fe, Cr)7C3. Micro-hardness of the Ni-based composite coating is about 960 HV0.3, much higher than that of Fe-based coating (357.4 HV0.3) and the 40Cr substrate (251 HV0.3). Meanwhile, the Ni-based composite coating possesses better wear resistance than the Fe-based coating validated by the worn appearance and the wear loss. Electrochemical results suggested that Ni-based coating exhibited better corrosion resistance than the Fe-based coating. The 40Cr substrate could be well protected by the Ni-based coating.

  5. The Role of the Anonymous Voice in Post-Publication Peer Review Versus Traditional Peer Review

    Directory of Open Access Journals (Sweden)

    Jaime A. Teixeira da Silva

    2015-12-01

    Full Text Available Traditional peer review (TPR has several limitations and weaknesses. Post-publication peer review is one practical way to repair the ills of TPR and reinforce it. A literature that is marked by errors is unhealthy and should, if given the opportunity, be corrected or further improved. The anonymous voice is one source of critique and differs from the blind peer review in TPR in which the reviewer remains anonymous to the authors and/or vice versa, but the identity is known to the editor. If unregulated, the anonymous voice can pose a threat to established editorial norms in TPR, to one of the most important criteria of science publishing, i.e., transparency, and to worthwhile discussion. Yet, if the anonymous voice is not heard, then a vast and potentially valuable pool of untapped opinions may be lost, opinions that may provide valuable solutions to improving TPR.

  6. Microwave sintering of poly-ether-ether-ketone (PEEK) based coatings deposited on metallic substrate

    International Nuclear Information System (INIS)

    Zhang, G.; Leparoux, S.; Liao, H.; Coddet, C.

    2006-01-01

    In this paper, the feasibility of microwave (MW) sintering PEEK (poly-ether-ether-ketone) based coatings was investigated. Three coatings were studied: pure PEEK, micron-SiC and nano-SiC particles filled (wt.10%) PEEK coatings. The results indicate that, for the two composite coatings, the SiC particles distributed in the polymer matrix, as a good MW susceptor, could be heated preferentially by MW radiation. Consequently, the polymer matrix was heated by these particles

  7. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually

  8. Ply-based Optimization of Laminated Composite Shell Structures under Manufacturing Constraints

    DEFF Research Database (Denmark)

    Sørensen, Rene; Lund, Erik

    2012-01-01

    This work concerns a new ply-based parameterization for performing simultaneous material selection and topology optimization of fiber reinforced laminated composite structures while ensuring that a series of different manufacturing constraints are fulfilled. The material selection can either...

  9. Robust Superhydrophobic Graphene-Based Composite Coatings with Self-Cleaning and Corrosion Barrier Properties.

    Science.gov (United States)

    Nine, Md J; Cole, Martin A; Johnson, Lucas; Tran, Diana N H; Losic, Dusan

    2015-12-30

    Superhydrophobic surfaces for self-cleaning applications often suffer from mechanical instability and do not function well after abrasion/scratching. To address this problem, we present a method to prepare graphene-based superhydrophobic composite coatings with robust mechanical strength, self-cleaning, and barrier properties. A suspension has been formulated that contains a mixture of reduced graphene oxide (rGO) and diatomaceous earth (DE) modified with polydimethylsiloxane (PDMS) that can be applied on any surface using common coating methods such as spraying, brush painting, and dip coating. Inclusion of TiO2 nanoparticles to the formulation shows further increase in water contact angle (WCA) from 159 ± 2° to 170 ± 2° due to the structural improvement with hierarchical surface roughness. Mechanical stability and durability of the coatings has been achieved by using a commercial adhesive to bond the superhydrophobic "paint" to various substrates. Excellent retention of superhydrophobicity was observed even after sandpaper abrasion and crosscut scratching. A potentiodynamic polarization study revealed excellent corrosion resistance (96.78%) properties, and an acid was used to provide further insight into coating barrier properties. The ease of application and remarkable properties of this graphene-based composite coating show considerable potential for broad application as a self-cleaning and protective layer.

  10. Constraint-based modeling and kinetic analysis of the Smad dependent TGF-beta signaling pathway.

    Directory of Open Access Journals (Sweden)

    Zhike Zi

    Full Text Available BACKGROUND: Investigation of dynamics and regulation of the TGF-beta signaling pathway is central to the understanding of complex cellular processes such as growth, apoptosis, and differentiation. In this study, we aim at using systems biology approach to provide dynamic analysis on this pathway. METHODOLOGY/PRINCIPAL FINDINGS: We proposed a constraint-based modeling method to build a comprehensive mathematical model for the Smad dependent TGF-beta signaling pathway by fitting the experimental data and incorporating the qualitative constraints from the experimental analysis. The performance of the model generated by constraint-based modeling method is significantly improved compared to the model obtained by only fitting the quantitative data. The model agrees well with the experimental analysis of TGF-beta pathway, such as the time course of nuclear phosphorylated Smad, the subcellular location of Smad and signal response of Smad phosphorylation to different doses of TGF-beta. CONCLUSIONS/SIGNIFICANCE: The simulation results indicate that the signal response to TGF-beta is regulated by the balance between clathrin dependent endocytosis and non-clathrin mediated endocytosis. This model is useful to be built upon as new precise experimental data are emerging. The constraint-based modeling method can also be applied to quantitative modeling of other signaling pathways.

  11. Efficient constraint-based Sequential Pattern Mining (SPM algorithm to understand customers’ buying behaviour from time stamp-based sequence dataset

    Directory of Open Access Journals (Sweden)

    Niti Ashish Kumar Desai

    2015-12-01

    Full Text Available Business Strategies are formulated based on an understanding of customer needs. This requires development of a strategy to understand customer behaviour and buying patterns, both current and future. This involves understanding, first how an organization currently understands customer needs and second predicting future trends to drive growth. This article focuses on purchase trend of customer, where timing of purchase is more important than association of item to be purchased, and which can be found out with Sequential Pattern Mining (SPM methods. Conventional SPM algorithms worked purely on frequency identifying patterns that were more frequent but suffering from challenges like generation of huge number of uninteresting patterns, lack of user’s interested patterns, rare item problem, etc. Article attempts a solution through development of a SPM algorithm based on various constraints like Gap, Compactness, Item, Recency, Profitability and Length along with Frequency constraint. Incorporation of six additional constraints is as well to ensure that all patterns are recently active (Recency, active for certain time span (Compactness, profitable and indicative of next timeline for purchase (Length―Item―Gap. The article also attempts to throw light on how proposed Constraint-based Prefix Span algorithm is helpful to understand buying behaviour of customer which is in formative stage.

  12. Use of anonymous Web communities and websites by medical consumers in Japan to research drug information.

    Science.gov (United States)

    Kishimoto, Keiko; Fukushima, Noriko

    2011-01-01

    In this study, we investigated the status of researching drug information online, and the type of Internet user who uses anonymous Web communities and websites. A Web-based cross-sectional survey of 10875 male and female Internet users aged 16 and over was conducted in March 2010. Of 10282 analyzed respondents, excluding medical professionals, about 47% reported that they had previously searched the Internet for drug information and had used online resources ranging from drug information search engines and pharmaceutical industry websites to social networking sites and Twitter. Respondents who had researched drug information online (n=4861) were analyzed by two multivariable logistic regressions. In Model 1, the use of anonymous websites associated with age (OR, 0.778; 95% CI, 0.742-0.816), referring to the reputation and the narrative of other Internet users on shopping (OR, 1.640; 95% CI, 1.450-1.855), taking a prescription drug (OR, 0.806; 95% CI, 0.705-0.922), and frequent consulting with non-professionals about medical care and health (OR, 1.613; 95% CI, 1.396-1.865). In Model 2, use of only anonymous websites was associated with age (OR, 0.753; 95% CI, 0.705-0.805), using the Internet daily (OR, 0.611; 95% CI, 0.462-0.808), taking a prescription drug (OR, 0.614; 95% CI, 0.505-0.747), and experience a side effect (OR, 0.526; 95% CI, 0.421-0.658). The analysis revealed the profiles of Internet users who researched drug information on social media sites where the information providers are anonymous and do not necessarily have adequate knowledge of medicine and online information literacy.

  13. The Efficacy of Non-Anonymous Measures of Bullying

    Science.gov (United States)

    Chan, John H. F.; Myron, Rowan; Crawshaw, Martin

    2005-01-01

    The Olweus checklist, along with most of the questionnaires commonly used in bullying research, is anonymous. The respondent is not required to put down his/her name. This has been accepted as the "best suited" method of assessing bullying. However, this assumption has not been adequately tested, and there is contrary evidence that this…

  14. Application of the Theory of Constraints in Project Based Structures

    OpenAIRE

    Martynas Sarapinas; Vytautas Pranas Sūdžius

    2011-01-01

    The article deals with the application of the Theory of Constraints (TOC) in project management. This article involves a short introduction to TOC as a project management method and deep analysis of project management specialties using the TOC: TOC based project planning, timetable management, tasks synchronization, project control and “relay runner work ethic”. Moreover, the article describes traditional and TOC based project management theories in their comparison, and emphasize the main be...

  15. Electrochemical Study of Polymer and Ceramic-Based Nanocomposite Coatings for Corrosion Protection of Cast Iron Pipeline

    Directory of Open Access Journals (Sweden)

    Ameen Uddin Ammar

    2018-02-01

    Full Text Available Coating is one of the most effective measures to protect metallic materials from corrosion. Various types of coatings such as metallic, ceramic and polymer coatings have been investigated in a quest to find durable coatings to resist electrochemical decay of metals in industrial applications. Many polymeric composite coatings have proved to be resistant against aggressive environments. Two major applications of ferrous materials are in marine environments and in the oil and gas industry. Knowing the corroding behavior of ferrous-based materials during exposure to these aggressive applications, an effort has been made to protect the material by using polymeric and ceramic-based coatings reinforced with nano materials. Uncoated and coated cast iron pipeline material was investigated during corrosion resistance by employing EIS (electrochemical impedance spectroscopy and electrochemical DC corrosion testing using the “three electrode system”. Cast iron pipeline samples were coated with Polyvinyl Alcohol/Polyaniline/FLG (Few Layers Graphene and TiO2/GO (graphene oxide nanocomposite by dip-coating. The EIS data indicated better capacitance and higher impedance values for coated samples compared with the bare metal, depicting enhanced corrosion resistance against seawater and “produce water” of a crude oil sample from a local oil rig; Tafel scans confirmed a significant decrease in corrosion rate of coated samples.

  16. Improved Plasticity of Ti-Based Bulk Metallic Glass at Room Temperature by Electroless Thin Nickel Coating

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2017-12-01

    Full Text Available By restricting the dilated deformation, surface modification can stimulate multiple shear banding and improve the plasticity of bulk metallic glasses (BMGs. Aimed at modifying the surface of BMGs by thin layers, a crystalline Ni coating with ultrafine grains was coated on the surface of a Ti-based BMG by electroless plating. With a thickness of about 10 μm, the prepared thin coating could effectively limit the fast propagation of primary shear bands and stimulate the nucleation of multiple shear bands. As a result, the compression plasticity of the coated Ti-based BMG was improved to about 3.7% from near 0% of the non-coated BMG. Except for a small amount of Ni coating was adhered to the BMG substrate after fracture, most of the coatings were peeled off from the surface. It can be attributed to the abnormal growth of some coarse grains/particles in local region of the coating, which induces a large tensile stress at the interface between the coating and the BMG substrate. It is suggested that, for electroless nickel plating, improving the adhesive bonding strength between the coating and the substrate has a better geometric restriction effect than simply increasing the thickness of the coating.

  17. Impacts of Base-Case and Post-Contingency Constraint Relaxations on Static and Dynamic Operational Security

    Science.gov (United States)

    Salloum, Ahmed

    Constraint relaxation by definition means that certain security, operational, or financial constraints are allowed to be violated in the energy market model for a predetermined penalty price. System operators utilize this mechanism in an effort to impose a price-cap on shadow prices throughout the market. In addition, constraint relaxations can serve as corrective approximations that help in reducing the occurrence of infeasible or extreme solutions in the day-ahead markets. This work aims to capture the impact constraint relaxations have on system operational security. Moreover, this analysis also provides a better understanding of the correlation between DC market models and AC real-time systems and analyzes how relaxations in market models propagate to real-time systems. This information can be used not only to assess the criticality of constraint relaxations, but also as a basis for determining penalty prices more accurately. Constraint relaxations practice was replicated in this work using a test case and a real-life large-scale system, while capturing both energy market aspects and AC real-time system performance. System performance investigation included static and dynamic security analysis for base-case and post-contingency operating conditions. PJM peak hour loads were dynamically modeled in order to capture delayed voltage recovery and sustained depressed voltage profiles as a result of reactive power deficiency caused by constraint relaxations. Moreover, impacts of constraint relaxations on operational system security were investigated when risk based penalty prices are used. Transmission lines in the PJM system were categorized according to their risk index and each category was as-signed a different penalty price accordingly in order to avoid real-time overloads on high risk lines. This work also extends the investigation of constraint relaxations to post-contingency relaxations, where emergency limits are allowed to be relaxed in energy market models

  18. Home-based Constraint Induced Movement Therapy Poststroke

    Directory of Open Access Journals (Sweden)

    Stephen Isbel HScD

    2014-10-01

    Full Text Available Background: This study examined the efficacy of a home-based Constraint Induced Movement Therapy (CI Therapy protocol with eight poststroke survivors. Method: Eight ABA, single case experiments were conducted in the homes of poststroke survivors. The intervention comprised restraint of the intact upper limb in a mitt for 21 days combined with a home-based and self-directed daily activity regime. Motor changes were measured using The Wolf Motor Function Test (WMFT and the Motor Activity Log (MAL. Results: Grouped results showed statistically and clinically significant differences on the WMFT (WMFT [timed items]: Mean 7.28 seconds, SEM 1.41, 95% CI 4.40 – 10.18, p = 0.000; WMFT (Functional Ability: z = -4.63, p = 0.000. Seven out of the eight participants exceeded the minimal detectable change on both subscales of the MAL. Conclusion: This study offers positive preliminary data regarding the feasibility of a home-based CI Therapy protocol. This requires further study through an appropriately powered control trial.

  19. Performance Comparison of Steam-Based and Chromate Conversion Coatings on Aluminum Alloy 6060

    DEFF Research Database (Denmark)

    Din, Rameez Ud; Jellesen, Morten Stendahl; Ambat, Rajan

    2015-01-01

    In this study, oxide layers generated on aluminum alloy 6060(UNS A96060) using a steam-based process were compared with conventional chromate and chromate-phosphate conversion coatings. Chemical composition and microstructure of the conversion coatings were investigated and their corrosion perfor...

  20. Fabrication of robust and thermally stable superhydrophobic nanocomposite coatings based on thermoplastic polyurethane and silica nanoparticles

    Science.gov (United States)

    Seyfi, Javad; Jafari, Seyed Hassan; Khonakdar, Hossein Ali; Sadeghi, Gity Mir Mohamad; Zohuri, Gholamhossein; Hejazi, Iman; Simon, Frank

    2015-08-01

    In this paper, superhydrophobic nanocomposite coatings based on thermoplastic polyurethane (TPU) and modified nanosilica were fabricated using a simple solution-based method. The main challenge was to impart superhydrophobicity to an intrinsically hydrophilic polymer substrate. The prepared nanocomposite coatings were characterized by means of scanning electron microscopy, confocal microscopy and X-ray photoelectron spectroscopy. Based on the obtained results, it was proved that in order to achieve superhydrophobicity, no TPU macromolecule should be present on the coating's top layer, thus a complete coverage of coating's top layer by nanosilica particles was necessary for achieving ultra water repellent coatings. Mechanical and thermal resistance of the coatings, which are the main challenges in commercializing superhydrophobic surfaces, were also studied by drop impact and thermal annealing tests, respectively. It was proved that using TPU as a sublayer results in improving mechanical resistance of the coatings as compared with the pure silica nanocoating. Moreover, the samples showed an excellent resistance against elevated temperatures (150 °C) and remained superhydrophobic; however, further increment of the annealing temperatures to 200 °C caused the TPU macromolecules to migrate onto the top layer of the coatings significantly reducing the water repellency, which was visually proved by SEM.

  1. Microstructure and interfacial evaluation of Co-based alloy coating on copper by pulsed Nd:YAG multilayer laser cladding

    International Nuclear Information System (INIS)

    Yan Hua; Wang Aihua; Xu Kaidong; Wang Wenyan; Huang Zaowen

    2010-01-01

    Laser cladding defect-free coatings on copper is rather difficult. The purpose of this study is to fabricate high quality Co-based alloy coating on copper substrate by laser cladding. Powder preplacement with a thickness of 0.7 mm improves the absorptivity of copper substrate to laser effectively and generates defect-free coating. Microstructures, phase constitutions and wear properties are investigated by means of scanning electronic microscopy (SEM) with X-ray energy dispersive microanalysis (EDX), transmission electron microscopy (TEM) and X-ray diffraction (XRD), as well as dry sliding wear test. Experimental results show that α-Co solution, Cr 23 C 6 , Ni 17 W 3 and Cr 4 Ni 15 W are the main phases in the Co-based coating. The Ni-based solid solutions (α-Co, Ni) and (Ni, Cu) are formed at interface, which generate metallurgical bonding by diffusion between Co-based coating and copper substrate. The average microhardness of the coating is 478HV 0.1 . Wear resistance of copper is significantly improved by laser cladding Co-based alloy multilayer coating.

  2. TIE POINTS EXTRACTION FOR SAR IMAGES BASED ON DIFFERENTIAL CONSTRAINTS

    Directory of Open Access Journals (Sweden)

    X. Xiong

    2018-04-01

    Full Text Available Automatically extracting tie points (TPs on large-size synthetic aperture radar (SAR images is still challenging because the efficiency and correct ratio of the image matching need to be improved. This paper proposes an automatic TPs extraction method based on differential constraints for large-size SAR images obtained from approximately parallel tracks, between which the relative geometric distortions are small in azimuth direction and large in range direction. Image pyramids are built firstly, and then corresponding layers of pyramids are matched from the top to the bottom. In the process, the similarity is measured by the normalized cross correlation (NCC algorithm, which is calculated from a rectangular window with the long side parallel to the azimuth direction. False matches are removed by the differential constrained random sample consensus (DC-RANSAC algorithm, which appends strong constraints in azimuth direction and weak constraints in range direction. Matching points in the lower pyramid images are predicted with the local bilinear transformation model in range direction. Experiments performed on ENVISAT ASAR and Chinese airborne SAR images validated the efficiency, correct ratio and accuracy of the proposed method.

  3. Layer-by-Layer Alginate and Fungal Chitosan Based Edible Coatings Applied to Fruit Bars.

    Science.gov (United States)

    Bilbao-Sainz, Cristina; Chiou, Bor-Sen; Punotai, Kaylin; Olson, Donald; Williams, Tina; Wood, Delilah; Rodov, Victor; Poverenov, Elena; McHugh, Tara

    2018-05-30

    Food waste is currently being generated at an increasing rate. One proposed solution would be to convert it to biopolymers for industrial applications. We recovered chitin from mushroom waste and converted it to chitosan to produce edible coatings. We then used layer-by-layer (LbL) electrostatic deposition of the polycation chitosan and the polyanion alginate to coat fruit bars enriched with ascorbic acid. The performance of the LbL coatings was compared with those containing single layers of fungal chitosan, animal origin chitosan and alginate. Bars containing alginate-chitosan LbL coatings showed increased ascorbic acid content, antioxidant capacity, firmness and fungal growth prevention during storage. Also, the origin of the chitosan did not affect the properties of the coatings. Mushroom stalk bases could be an alternative source for isolating chitosan with similar properties to animal-based chitosan. Also, layer-by-layer assembly is a cheap, simple method that can improve the quality and safety of fruit bars. © 2018 Institute of Food Technologists®.

  4. Lotus Dust Mitigation Coating and Molecular Adsorber Coating

    Science.gov (United States)

    O'Connor, Kenneth M.; Abraham, Nithin S.

    2015-01-01

    NASA Goddard Space Flight Center has developed two unique coating formulations that will keep surfaces clean and sanitary and contain contaminants.The Lotus Dust Mitigation Coating, modeled after the self-cleaning, water-repellant lotus leaf, disallows buildup of dust, dirt, water, and more on surfaces. This coating, has been successfully tested on painted, aluminum, glass, silica, and some composite surfaces, could aid in keeping medical assets clean.The Molecular Adsorber Coating is a zeolite-based, sprayable molecular adsorber coating, designed to prevent outgassing in materials in vacuums. The coating works well to adsorb volatiles and contaminates in manufacturing and processing, such as in pharmaceutical production. The addition of a biocide would also aid in controlling bacteria levels.

  5. For the Lulz: Anonymous, Aesthetics and Affect

    Directory of Open Access Journals (Sweden)

    Rodrigo Ferrada Stoehrel

    2014-03-01

    Full Text Available The focus of this paper is on different but connected areas of power – relating to things such as economic globalisation, surveillance, censorship/freedom, ‘terrorism’ and/or specific military activity – visually represented through online media, and intentionally produced to inform a wide spectrum of individuals and interest groups about global and local social injustices. Or, more importantly, produced and distributed with the purpose of providing users with possibilities to engage, bodily and emotionally, in diverse ways: may it be through physical antiwar/anti-wall street protests or hacktivist tactics (e.g. DDoS attacks. We examine a sample of videos, photographs and propaganda posters produced, and digitally distributed (2008-2013, by the fragmented body of activists united globally under the generic name of Anonymous. Analytically, we will draw upon Mouffe’s thoughts on ‘antagonism’ and ‘passion,’ Foucault’s ideas on international citizenship and the (ethical ‘right to intervene’ (beyond governmentality, together with Sontag’s notion of institutional political inertia and the Deleuzian/Spinozian perspective on affect as a capacity for action. The goal is to analyse the ways in which Anonymous systematically inspire (not only the radical and social imaginary but also other direct forms of action that have potential societal effects.

  6. Development of palm oil-based UV-curable epoxy acrylate and urethane acrylate resins for wood coating application

    International Nuclear Information System (INIS)

    Rida Tajau; Nurulhuda Mohd Yunus; Mohd Hilmi Mahmood; Mek Zah Salleh; Nik Ghazali Nik Salleh

    2013-01-01

    Full-text: The trend of using renewable sources such as palm oil as raw material in radiation curing is growing due to the demand from the market to produce a more environmental friendly product. In this study, the radiation curable process was done using epoxy acrylate and urethane acrylate resins which are known as epoxidized palm olein acrylate (EPOLA) and palm oil based urethane acrylate (POBUA), respectively. The purpose of the study was to investigate curing properties and the application of this UV-curable palm oil resins for wood coating. Furthermore, the properties of palm oil based coatings are compared with the petrochemical-based compound such as ebecryl (EB) for example EB264 and EB830. From the experiment done, the resins from petrochemical-based compounds resulted higher degree of crosslinking (up to 80 %) than the palm oil based compounds (up to 70 %), where the different is around 10-15 %. The hardness property from this two type coatings can reached until 50 % at the lower percentage of the oligomer. However, the coatings from petrochemical-based have a high scratch resistance as it can withstand at least up to 3.0 Newton's (N) compared to the palm oil-based compounds which are difficult to withstand the load up to 1.0 N. Finally, the test on the rubber wood substrate showed that the coatings containing benzophenone photo initiator give higher adhesion property and their also showed a higher glossiness property on the glass substrate compared to the coatings containing irgacure-819 photo initiator. This study showed that the palm oil coatings can be a suitable for the replacement of petrochemicals compound for wood coating. The palm oil coatings can be more competitive in the market if the problems of using high percentage palm oil oligomer can be overcome as the palm oil price is cheap enough. (author)

  7. Development of palm oil-based UV-curable epoxy acrylate and urethane acrylate resins for wood coating application

    International Nuclear Information System (INIS)

    Tajau, Rida; Mahmood, Mohd Hilmi; Salleh, Mek Zah; Salleh, Nik Ghazali Nik; Ibrahim, Mohammad Izzat; Yunus, Nurulhuda Mohd

    2014-01-01

    The trend of using renewable sources such as palm oil as raw material in radiation curing is growing due to the demand from the market to produce a more environmental friendly product. In this study, the radiation curable process was done using epoxy acrylate and urethane acrylate resins which are known as epoxidised palm olein acrylate (EPOLA) and palm oil based urethane acrylate (POBUA), respectively. The purpose of the study was to investigate curing properties and the application of this UV-curable palm oil resins for wood coating. Furthermore, the properties of palm oil based coatings are compared with the petrochemical-based compound such as ebecryl (EB) i.e. EB264 and EB830. From the experiment done, the resins from petrochemical-based compounds resulted higher degree of crosslinking (up to 80%) than the palm oil based compounds (up to 70%), where the different is around 10-15%. The hardness property from this two type coatings can reached until 50% at the lower percentage of the oligomer. However, the coatings from petrochemical-based have a high scratch resistance as it can withstand at least up to 3.0 Newtons (N) compared to the palm oil-based compounds which are difficult to withstand the load up to 1.0 N. Finally, the test on the rubber wood substrate showed that the coatings containing benzophenone photoinitiator give higher adhesion property and their also showed a higher glosiness property on the glass substrate compared to the coatings containing irgacure-819 photoinitiator. This study showed that the palm oil coatings can be a suitable for the replacement of petrochemicals compound for wood coating. The palm oil coatings can be more competitive in the market if the problems of using high percentage palm oil oligomer can be overcome as the palm oil price is cheap enough

  8. Development of palm oil-based UV-curable epoxy acrylate and urethane acrylate resins for wood coating application

    Energy Technology Data Exchange (ETDEWEB)

    Tajau, Rida; Mahmood, Mohd Hilmi; Salleh, Mek Zah; Salleh, Nik Ghazali Nik [Radiation Processing Technology Division, Malaysian Nuclear Agency (Nuclear Malaysia), Bangi, 43000 Kajang, Selangor (Malaysia); Ibrahim, Mohammad Izzat [Faculty of Science, University of Malaya (UM), 50603 Kuala Lumpur (Malaysia); Yunus, Nurulhuda Mohd [Faculty of Science and Technology, National University Malaysia (UKM), 43600 Bangi, Selangor (Malaysia)

    2014-02-12

    The trend of using renewable sources such as palm oil as raw material in radiation curing is growing due to the demand from the market to produce a more environmental friendly product. In this study, the radiation curable process was done using epoxy acrylate and urethane acrylate resins which are known as epoxidised palm olein acrylate (EPOLA) and palm oil based urethane acrylate (POBUA), respectively. The purpose of the study was to investigate curing properties and the application of this UV-curable palm oil resins for wood coating. Furthermore, the properties of palm oil based coatings are compared with the petrochemical-based compound such as ebecryl (EB) i.e. EB264 and EB830. From the experiment done, the resins from petrochemical-based compounds resulted higher degree of crosslinking (up to 80%) than the palm oil based compounds (up to 70%), where the different is around 10-15%. The hardness property from this two type coatings can reached until 50% at the lower percentage of the oligomer. However, the coatings from petrochemical-based have a high scratch resistance as it can withstand at least up to 3.0 Newtons (N) compared to the palm oil-based compounds which are difficult to withstand the load up to 1.0 N. Finally, the test on the rubber wood substrate showed that the coatings containing benzophenone photoinitiator give higher adhesion property and their also showed a higher glosiness property on the glass substrate compared to the coatings containing irgacure-819 photoinitiator. This study showed that the palm oil coatings can be a suitable for the replacement of petrochemicals compound for wood coating. The palm oil coatings can be more competitive in the market if the problems of using high percentage palm oil oligomer can be overcome as the palm oil price is cheap enough.

  9. Antifungal Paper Based on a Polyborneolacrylate Coating

    Directory of Open Access Journals (Sweden)

    Jiangqi Xu

    2018-04-01

    Full Text Available Paper documents and products are very susceptible to microbial contamination and damage. Fungi are mainly responsible for those biodeterioration processes. Traditional microbicidal strategies constitute a serious health risk even when microbes are dead. Ideal methods should not be toxic to humans and should have no adverse effects on paper, but should own a broad spectrum, good chemical stability and low cost. In this work, we utilize an advanced antimicrobial strategy of surface stereochemistry by applying a coating of a shallow layer of polyborneolacrylate (PBA, resulting in the desired antifungal performance. The PBA-coated paper is challenged with the most common air-borne fungi growing on paper, Aspergillus niger and Penicillium sp. Ten percent by weight of the coating concentration or a 19-μm infiltration of PBA is sufficient to keep the paper spotless. The PBA coating also exhibits significant inhibition of spores’ germination. After PBA coating, both physicochemical properties (paper whiteness, pH, mechanical strength and inking performance display only slight changes, which are acceptable for general utilization. This PBA coating method is nontoxic, rapid and cost-effective, thus demonstrating great potential for applications in paper products.

  10. Optimization of Ni-Based WC/Co/Cr Composite Coatings Produced by Multilayer Laser Cladding

    Directory of Open Access Journals (Sweden)

    Andrea Angelastro

    2013-01-01

    Full Text Available As a surface coating technique, laser cladding (LC has been developed for improving wear, corrosion, and fatigue properties of mechanical components. The main advantage of this process is the capability of introducing hard particles such as SiC, TiC, and WC as reinforcements in the metallic matrix such as Ni-based alloy, Co-based alloy, and Fe-based alloy to form ceramic-metal composite coatings, which have very high hardness and good wear resistance. In this paper, Ni-based alloy (Colmonoy 227-F and Tungsten Carbides/Cobalt/Chromium (WC/Co/Cr composite coatings were fabricated by the multilayer laser cladding technique (MLC. An optimization procedure was implemented to obtain the combination of process parameters that minimizes the porosity and produces good adhesion to a stainless steel substrate. The optimization procedure was worked out with a mathematical model that was supported by an experimental analysis, which studied the shape of the clad track generated by melting coaxially fed powders with a laser. Microstructural and microhardness analysis completed the set of test performed on the coatings.

  11. Development of Novel Fe-Based Coating Systems for Internal Combustion Engines

    Science.gov (United States)

    Bobzin, K.; Öte, M.; Königstein, T.; Dröder, K.; Hoffmeister, H.-W.; Mahlfeld, G.; Schläfer, T.

    2018-04-01

    Nowadays, combustion engines are the most common way to power vehicles. Thereby, losses occur due to cooling, exhaust gas and friction. With regard to frictional losses, highest potentials for optimization can be found in the tribological system of the inner surface of combustion chamber and piston ring. Besides friction, corrosive stress increases, e.g., due to utilization of exhaust gas recovery. In order to save energy, reduce emissions and enhance the life span of combustion engines, the demand for innovative coating material systems, especially for the inner surface of combustion chamber, increases. This study focuses on the development of innovative iron-based coating materials for the combustion chamber. As a first step, the plasma transferred wire arc and rotating single wire arc (RSW) technologies were compared using 0.8% C-steel as a reference. Subsequently, RSW was used for coating deposition using an innovative iron-based feedstock material. In order to improve wear and corrosion resistance, boron and chromium were added to the feedstock material. After deposition, different honing topographies were manufactured and compared under tribological load. Furthermore, electrochemical corrosion tests were conducted using an electrolyte simulating the exhaust gas concentrate. Especially with regard to corrosion, the novel coating system FeCrBMn showed promising results.

  12. Development of Novel Fe-Based Coating Systems for Internal Combustion Engines

    Science.gov (United States)

    Bobzin, K.; Öte, M.; Königstein, T.; Dröder, K.; Hoffmeister, H.-W.; Mahlfeld, G.; Schläfer, T.

    2018-02-01

    Nowadays, combustion engines are the most common way to power vehicles. Thereby, losses occur due to cooling, exhaust gas and friction. With regard to frictional losses, highest potentials for optimization can be found in the tribological system of the inner surface of combustion chamber and piston ring. Besides friction, corrosive stress increases, e.g., due to utilization of exhaust gas recovery. In order to save energy, reduce emissions and enhance the life span of combustion engines, the demand for innovative coating material systems, especially for the inner surface of combustion chamber, increases. This study focuses on the development of innovative iron-based coating materials for the combustion chamber. As a first step, the plasma transferred wire arc and rotating single wire arc (RSW) technologies were compared using 0.8% C-steel as a reference. Subsequently, RSW was used for coating deposition using an innovative iron-based feedstock material. In order to improve wear and corrosion resistance, boron and chromium were added to the feedstock material. After deposition, different honing topographies were manufactured and compared under tribological load. Furthermore, electrochemical corrosion tests were conducted using an electrolyte simulating the exhaust gas concentrate. Especially with regard to corrosion, the novel coating system FeCrBMn showed promising results.

  13. Game-Based Approaches, Pedagogical Principles and Tactical Constraints: Examining Games Modification

    Science.gov (United States)

    Serra-Olivares, Jaime; García-López, Luis M.; Calderón, Antonio

    2016-01-01

    The purpose of this study was to analyze the effect of modification strategies based on the pedagogical principles of the Teaching Games for Understanding approach on tactical constraints of four 3v3 soccer small-sided games. The Game performance of 21 U-10 players was analyzed in a game similar to the adult game; one based on keeping-the-ball;…

  14. Simultaneous aluminizing and chromizing of steels to form (Fe,Cr){sub 3}Al coatings and Ge-doped silicide coatings of Cr-Zr base alloys

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, M.; He, Y.R.; Rapp, R.A. [Ohio State Univ., Columbus, OH (United States). Dept. of Materials Science and Engineering

    1997-12-01

    A halide-activated cementation pack involving elemental Al and Cr powders has been used to achieve surface compositions of approximately Fe{sub 3}Al plus several percent Cr for low alloy steels (T11, T2 and T22) and medium carbon steel (1045 steel). A two-step treatment at 925 C and 1150 C yields the codeposition and diffusion of aluminum and chromium to form dense and uniform ferrite coatings of about 400 {micro}m thickness, while preventing the formation of a blocking chromium carbide at the substrate surfaces. Upon cyclic oxidation in air at 700 C, the coated steel exhibits a negligible 0.085 mg/cm{sup 2} weight gain for 1900 one-hour cycles. Virtually no attack was observed on coated steels tested at ABB in simulated boiler atmospheres at 500 C for 500 hours. But coatings with a surface composition of only 8 wt% Al and 6 wt% Cr suffered some sulfidation attack in simulated boiler atmospheres at temperatures higher than 500 C for 1000 hours. Two developmental Cr-Zr based Laves phase alloys (CN129-2 and CN117(Z)) were silicide/germanide coated. The cross-sections of the Ge-doped silicide coatings closely mimicked the microstructure of the substrate alloys. Cyclic oxidation in air at 1100 C showed that the Ge-doped silicide coating greatly improved the oxidation resistance of the Cr-Zr based alloys.

  15. Behavior of Human Bone Marrow-Derived Mesenchymal Stem Cells on Various Titanium-Based Coatings

    Directory of Open Access Journals (Sweden)

    Chengjuan Qu

    2016-10-01

    Full Text Available The chemical composition and texture of titanium coatings can influence the growth characteristics of the adhered cells. An enhanced proliferation of the human mesenchymal stem cells (hMSCs would be beneficial. The present study was aimed to investigate whether titanium deposited at different atmospheres would affect the cell growth properties, cellular morphology, and expression of surface markers of hMSCs. Titanium-based coatings were deposited on silicon wafers under oxygen, nitrogen, or argon atmospheres by ultra-short pulsed laser deposition using two different gas pressures followed by heating at 400 °C for 2 h. The characteristics of the coated surfaces were determined via contact angle, zeta potential, and scanning electron microscopy (SEM techniques. Human MSCs were cultivated on differently coated silicon wafers for 48 h. Subsequently, the cell proliferation rates were analyzed with an MTT assay. The phenotype of hMSCs was checked via immunocytochemical stainings of MSC-associated markers CD73, CD90, and CD105, and the adhesion, spreading, and morphology of hMSCs on coated materials via SEM. The cell proliferation rates of the hMSCs were similar on all coated silicon wafers. The hMSCs retained the MSC phenotype by expressing MSC-associated markers and fibroblast-like morphology with cellular projections. Furthermore, no significant differences could be found in the size of the cells when cultured on all various coated surfaces. In conclusion, despite certain differences in the contact angles and the zeta potentials of various titanium-based coatings, no single coating markedly improved the growth characteristics of hMSCs.

  16. Does spousal participation in Gamblers Anonymous benefit compulsive gamblers?

    Science.gov (United States)

    Johnson, E E; Nora, R M

    1992-12-01

    Extent of gambling-free periods was compared for 90 compulsive gamblers, 44 with spouses who participated in Gamblers Anonymous and 46 with spouses who did not. Although the results were in the direction of a beneficial effect of spousal participation, the relationship was statistically nonsignificant.

  17. Microstructure and corrosion resistance of Ni-based alloy laser coatings with nanosize CeO2 addition

    Science.gov (United States)

    Zhang, Shi Hong; Li, Ming Xi; Yoon, Jae Hong; Cho, Tong Yul; Zhu He, Yi; Lee, Chan Gyu

    2008-07-01

    Micron-size Ni-base alloy (NBA) powders were mixed with both 1.5 wt.% (hereinafter %) micron-size CeO2 (m-CeO2) and also 1.5% and 3.0% nano-size CeO2 (n- CeO2) powders. These mixtures were coated on low-carbon steel (Q235) by 2.0 kW CO2 laser cladding. The effects on the microstructures, phases and electrochemical corrosion of the coatings upon the addition of m- and n- CeO2 powders to NBA (m- and n- CeO2 /NBA) have been investigated. The results showed that a smooth coating was prepared under suitable processing parameters (P= 2.0 kW, V= 180 mm min- 1) by adding 1.5% n- CeO2. In addition to the primary phases of γ-Ni, Cr23 C6 and Ni3 B in the Ni-base alloy coating, CeNi3 was formed in Ni-base alloy coatings with both n- CeO2 and m-CeO2 particles, and CeNi5 appeared in the coating upon decreasing the size of CeO2 particles. Well-developed dendrites were observed in the Ni-base alloy coating; directional dendrites grew at the interface in the coating upon the addition of m-CeO2, whereas fine and multioriented dendrites grew upon decreasing the size of CeO2 particles to the nanoscale. Actinomorphic dendrites and compact equiaxed dendrites grew from the interface to near the surface upon increasing the content of n- CeO2 from 1.5 to 3.0%. In strongly acidic HNO3 solution, the severe corrosion of dendrites occurred and there were many corrosion pits in the Ni-base alloy coating; intercrystalline corrosion also has a dominant role upon the addition of m-CeO2, whereas uniform corrosion occurs in the coating as the size of CeO2 particles is decreased to nanoscale.

  18. Microstructure and corrosion resistance of Ni-based alloy laser coatings with nanosize CeO2 addition

    Directory of Open Access Journals (Sweden)

    Shi Hong Zhang et al

    2008-01-01

    Full Text Available Micron-size Ni-base alloy (NBA powders were mixed with both 1.5 wt.% (hereinafter % micron-size CeO2 (m-CeO2 and also 1.5% and 3.0% nano-size CeO2 (n- CeO2 powders. These mixtures were coated on low-carbon steel (Q235 by 2.0 kW CO2 laser cladding. The effects on the microstructures, phases and electrochemical corrosion of the coatings upon the addition of m- and n- CeO2 powders to NBA (m- and n- CeO2 /NBA have been investigated. The results showed that a smooth coating was prepared under suitable processing parameters (P= 2.0 kW, V= 180 mm min- 1 by adding 1.5% n- CeO2. In addition to the primary phases of γ-Ni, Cr23 C6 and Ni3 B in the Ni-base alloy coating, CeNi3 was formed in Ni-base alloy coatings with both n- CeO2 and m-CeO2 particles, and CeNi5 appeared in the coating upon decreasing the size of CeO2 particles. Well-developed dendrites were observed in the Ni-base alloy coating; directional dendrites grew at the interface in the coating upon the addition of m-CeO2, whereas fine and multioriented dendrites grew upon decreasing the size of CeO2 particles to the nanoscale. Actinomorphic dendrites and compact equiaxed dendrites grew from the interface to near the surface upon increasing the content of n- CeO2 from 1.5 to 3.0%. In strongly acidic HNO3 solution, the severe corrosion of dendrites occurred and there were many corrosion pits in the Ni-base alloy coating; intercrystalline corrosion also has a dominant role upon the addition of m-CeO2, whereas uniform corrosion occurs in the coating as the size of CeO2 particles is decreased to nanoscale.

  19. Tribological study of novel metal-doped carbon-based coatings with enhanced thermal stability

    Science.gov (United States)

    Mandal, Paranjayee

    Low friction and high temperature wear resistant PVD coatings are in high demand for use on engine components, which operate in extreme environment. Diamond-like-carbon (DLC) coatings are extensively used for this purpose due to their excellent tribological properties. However, DLC degrades at high temperature and pressure conditions leading to significant increase in friction and wear rate even in the presence of lubricant. To withstand high working temperature and simultaneously maintain improved tribological properties in lubricated condition at ambient and at high temperature, both the transitional metals Mo and W are simultaneously introduced in a carbon-based coating (Mo-W-C) for the first time utilising the benefits of smart material combination and High Power Impulse Magnetron Sputtering (HIPIMS).This research includes development of Mo-W-C coating and investigation of thermal stability and tribological properties at ambient and high temperatures. The as-deposited Mo-W-C coating contains nanocrystalline almost X-ray amorphous structure and show dense microstructure, good adhesion with substrate (Lc -80 N) and high hardness (-17 GPa). During boundary lubricated sliding (commercially available engine oil without friction modifier used as lubricant) at ambient temperature, Mo-W-C coating outperforms commercially available state-of-the-art DLC coatings by providing significantly low friction (u- 0.03 - 0.05) and excellent wear resistance (no measurable wear). When lubricated sliding tests are carried out at 200°C, Mo-W-C coating provides low friction similar to ambient temperature, whereas degradation of DLC coating properties fails to maintain low friction coefficient.A range of surface analyses techniques reveal "in-situ" formation of solid lubricants (WS2 and M0S2) at the tribo-contacts due to tribochemically reactive wear mechanism at ambient and high temperature. Mo-W-C coating reacts with EP additives present in the engine oil during sliding to form WS2

  20. Double Pulse LIBS of Titanium-Based PVD-Coatings with Submicron Resolution

    Directory of Open Access Journals (Sweden)

    K. Ermalitskaia

    2016-01-01

    Full Text Available The possibility for double pulse LIBS in the process of a direct layer-by-layer analysis of the titanium-based PVD-coatings on polished flat blank samples of steel and silicon and also of the TiAlN/TiN-coating on a milling cutter is considered. A method is proposed to control thickness of the radiation evaporated layer by defocusing the laser beam with respect to the surface, making it possible to attain the depth resolution of 0.1 μm. The Ti and Ti-Zr-coatings produced using the ion-assisted condensation method and subjected to streams of the nitrogen plasma in a magnetic-plasma compressor are studied.

  1. Fabrication of robust and thermally stable superhydrophobic nanocomposite coatings based on thermoplastic polyurethane and silica nanoparticles

    Energy Technology Data Exchange (ETDEWEB)

    Seyfi, Javad [School of Chemical Engineering, University of Tehran, P.O. Box 11155-4563, Tehran (Iran, Islamic Republic of); Jafari, Seyed Hassan, E-mail: shjafari@ut.ac.ir [School of Chemical Engineering, University of Tehran, P.O. Box 11155-4563, Tehran (Iran, Islamic Republic of); Khonakdar, Hossein Ali [Leibniz-Institut für Polymerforschung Dresden e.V., Hohe Strasse 6, D-01069 Dresden (Germany); Sadeghi, Gity Mir Mohamad [Department of Polymer Engineering & Color Technology, Amirkabir University of Technology, Tehran (Iran, Islamic Republic of); Zohuri, Gholamhossein [Polymer Group, Faculty of Sciences, Ferdowsi University of Mashhad, Mashhad (Iran, Islamic Republic of); Hejazi, Iman [Department of Polymer Engineering & Color Technology, Amirkabir University of Technology, Tehran (Iran, Islamic Republic of); Simon, Frank [Leibniz-Institut für Polymerforschung Dresden e.V., Hohe Strasse 6, D-01069 Dresden (Germany)

    2015-08-30

    Highlights: • Superhydrophobic coatings were prepared from an intrinsically hydrophilic polymer. • The superhydrophobicity remained intact at elevated temperatures. • Polyurethane plays a key role in improving the mechanical robustness of the coatings. • A complete surface coverage of nanosilica is necessary for superhydrophobicity. - Abstract: In this paper, superhydrophobic nanocomposite coatings based on thermoplastic polyurethane (TPU) and modified nanosilica were fabricated using a simple solution-based method. The main challenge was to impart superhydrophobicity to an intrinsically hydrophilic polymer substrate. The prepared nanocomposite coatings were characterized by means of scanning electron microscopy, confocal microscopy and X-ray photoelectron spectroscopy. Based on the obtained results, it was proved that in order to achieve superhydrophobicity, no TPU macromolecule should be present on the coating's top layer, thus a complete coverage of coating's top layer by nanosilica particles was necessary for achieving ultra water repellent coatings. Mechanical and thermal resistance of the coatings, which are the main challenges in commercializing superhydrophobic surfaces, were also studied by drop impact and thermal annealing tests, respectively. It was proved that using TPU as a sublayer results in improving mechanical resistance of the coatings as compared with the pure silica nanocoating. Moreover, the samples showed an excellent resistance against elevated temperatures (150 °C) and remained superhydrophobic; however, further increment of the annealing temperatures to 200 °C caused the TPU macromolecules to migrate onto the top layer of the coatings significantly reducing the water repellency, which was visually proved by SEM.

  2. Stochastic User Equilibrium Assignment in Schedule-Based Transit Networks with Capacity Constraints

    Directory of Open Access Journals (Sweden)

    Wangtu Xu

    2012-01-01

    Full Text Available This paper proposes a stochastic user equilibrium (SUE assignment model for a schedule-based transit network with capacity constraint. We consider a situation in which passengers do not have the full knowledge about the condition of the network and select paths that minimize a generalized cost function encompassing five components: (1 ride time, which is composed of in-vehicle and waiting times, (2 overload delay, (3 fare, (4 transfer constraints, and (5 departure time difference. We split passenger demands among connections which are the space-time paths between OD pairs of the network. All transit vehicles have a fixed capacity and operate according to some preset timetables. When the capacity constraint of the transit line segment is reached, we show that the Lagrange multipliers of the mathematical programming problem are equivalent to the equilibrium passenger overload delay in the congested transit network. The proposed model can simultaneously predict how passengers choose their transit vehicles to minimize their travel costs and estimate the associated costs in a schedule-based congested transit network. A numerical example is used to illustrate the performance of the proposed model.

  3. Structure and properties of composite iron-based coatings obtained by the electromechanical technique

    Science.gov (United States)

    Dubinskii, N. A.

    2007-09-01

    The influence of the electrolyte temperature and current density on the content of inclusions of powder particles in composite coatings obtained by the electrochemical technique has been investigated. It has been found that the wear resistance of iron coatings with inclusions of powder particles of aluminum, kaolin, and calcium silicate increases from 5 to 10 times compared to coating without inclusions of disperse particles, and the friction coefficient therewith decreases from 0.097 to 0.026. It has been shown that the mechanical properties of iron obtained by the method of electrochemical deposition depend on their fine structure. The regimes of deposition of iron-based coatings have been optimized.

  4. Microscopic Analysis and Electrochemical Behavior of Fe-Based Coating Produced by Laser Cladding

    Directory of Open Access Journals (Sweden)

    Jinlin Chen

    2017-10-01

    Full Text Available The effect of laser cladding on the surface microstructure and corrosion properties of coated/uncoated specimens were investigated. Fe-based alloy coating was produced on 35CrMo steel by laser cladding. The phase composition, microstructure, interface element distribution, microhardness and corrosion resistance of the cladding coating were measured. The results show that the cladding layer is mainly composed of α-Fe phases, the microstructure presents a gradient distribution, and a good metallurgical bond is formed at the boundary with the substrate. Microhardness profiles show that the average microhardness of the cladding coating is about 2.1 times higher than that of the uncoated specimen. In addition, the electrochemical results show that the coated specimen exhibits far better corrosion resistance than to the uncoated specimen.

  5. Transactive-Market-Based Operation of Distributed Electrical Energy Storage with Grid Constraints

    Directory of Open Access Journals (Sweden)

    M. Nazif Faqiry

    2017-11-01

    Full Text Available In a transactive energy market, distributed energy resources (DERs such as dispatchable distributed generators (DGs, electrical energy storages (EESs, distribution-scale load aggregators (LAs, and renewable energy sources (RESs have to earn their share of supply or demand through a bidding process. In such a market, the distribution system operator (DSO may optimally schedule these resources, first in a forward market, i.e., day-ahead, and in a real-time market later on, while maintaining a reliable and economic distribution grid. In this paper, an efficient day-ahead scheduling of these resources, in the presence of interaction with wholesale market at the locational marginal price (LMP, is studied. Due to inclusion of EES units with integer constraints, a detailed mixed integer linear programming (MILP formulation that incorporates simplified DistFlow equations to account for grid constraints is proposed. Convex quadratic line and transformer apparent power flow constraints have been linearized using an outer approximation. The proposed model schedules DERs based on distribution locational marginal price (DLMP, which is obtained as the Lagrange multiplier of the real power balance constraint at each distribution bus while maintaining physical grid constraints such as line limits, transformer limits, and bus voltage magnitudes. Case studies are performed on a modified IEEE 13-bus system with high DER penetration. Simulation results show the validity and efficiency of the proposed model.

  6. The Risk of a Halo Bias as a Reason to Keep Students Anonymous during Grading

    Science.gov (United States)

    Malouff, John M.; Emmerton, Ashley J.; Schutte, Nicola S.

    2013-01-01

    Experts have advocated anonymous grading as a means of eliminating actual or perceived evaluator bias in subjective student assessment. The utility of anonymity in assessment rests on whether information derived from student identity can unduly influence evaluation. The halo effect provides a conceptual background for why a bias might occur. In…

  7. Nanosecond multi-pulse laser milling for certain area removal of metal coating on plastics surface

    Science.gov (United States)

    Zhao, Kai; Jia, Zhenyuan; Ma, Jianwei; Liu, Wei; Wang, Ling

    2014-12-01

    Metal coating with functional pattern on engineering plastics surface plays an important role in industry applications; it can be obtained by adding or removing certain area of metal coating on engineering plastics surface. However, the manufacturing requirements are improved continuously and the plastic substrate presents three-dimensional (3D) structure-many of these parts cannot be fabricated by conventional processing methods, and a new manufacturing method is urgently needed. As the laser-processing technology has many advantages like high machining accuracy and constraints free substrate structure, the machining of the parts is studied through removing certain area of metal coating based on the nanosecond multi-pulse laser milling. To improve the edge quality of the functional pattern, generation mechanism and corresponding avoidance strategy of the processing defects are studied. Additionally, a prediction model for the laser ablation depth is proposed, which can effectively avoid the existence of residual metal coating and reduces the damage of substrate. With the optimal machining parameters, an equiangular spiral pattern on copper-clad polyimide (CCPI) is machined based on the laser milling at last. The experimental results indicate that the edge of the pattern is smooth and consistent, the substrate is flat and without damage. The achievements in this study could be applied in industrial production.

  8. Deepening Contractions and Collateral Constraints

    DEFF Research Database (Denmark)

    Jensen, Henrik; Ravn, Søren Hove; Santoro, Emiliano

    and occasionally non-binding credit constraints. Easier credit access increases the likelihood that constraints become slack in the face of expansionary shocks, while contractionary shocks are further amplified due to tighter constraints. As a result, busts gradually become deeper than booms. Based...

  9. Fracture of niobium-base silicide coated alloy

    International Nuclear Information System (INIS)

    Davydova, A.D.; Zotov, Yu.P.; Ivashchenko, O.V.; Kushnareva, N.P.; Yarosh, I.P.

    1990-01-01

    Mechanical properties and character of fracture of Nb-W-Mo-Zr-C alloy composition with complex by composition and structure silicide coating under different states of stage-by-stage coating are studied. Structural features, character of fracture from ductile to quasibrittle transcrystalline one and, respectively, the composition plasticity level are defined by interrelation of fracture processes in coating, matrix plastic flow and possibility and way of stress relaxation on their boundary

  10. Synthesis and analysis of Mo-Si-B based coatings for high temperature oxidation protection of ceramic materials

    Science.gov (United States)

    Ritt, Patrick J.

    The use of Ni-based superalloys in turbine engines has all but been exhausted, with operating temperatures nearing the melting point of these materials. The use of ceramics in turbine engines, particularly ceramic matrix composites such as SiC/C and SiC/SiC, is of interest due to their low density and attractive mechanical properties at elevated temperatures. The same materials are also in consideration for leading edges on hypersonic vehicles. However, SiC-based composites degrade in high temperature environments with low partial pressures of oxygen due to active oxidation, as well as high temperature environments containing water or sand. The need for a protective external coating for SiC-based composites in service is obvious. To date, no coating investigated for SiC/C or SiC/SiC has been proven to be resistant to oxidation and corrosion at intermediate and high temperatures, as well as in environments deficient in oxygen. The Mo-Si-B coating shows great promise in this area, having been proven resistant to attack from oxidation at extreme temperatures, from water vapor and from calcia-magnesia-aluminosilicate (CMAS). The adaptation of the Mo-Si-B coating for ceramic materials is presented in detail here. Evaluation of the coating under a range of oxidation conditions as well as simulated re-entry conditions confirms the efficacy of the Mo-Si-B based coating as protection from catastrophic failure. The key to the oxidation and corrosion resistance is a robust external aluminoborosilica glass layer that forms and flows quickly to cover the substrate, even under the extreme simulated re-entry conditions. Suppression of active oxidation of SiC, which may occur during atmospheric re-entry and hypersonic flight trajectories, has also been examined. In order to adapt the Mo-Si-B based coating to low partial pressures of oxygen and elevated temperatures, controlled amounts of Al were added to the Mo-Si-B based coating. The resulting coating decreased the inward

  11. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Directory of Open Access Journals (Sweden)

    Javier Portela

    2016-11-01

    Full Text Available Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  12. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  13. Affine-Invariant Geometric Constraints-Based High Accuracy Simultaneous Localization and Mapping

    Directory of Open Access Journals (Sweden)

    Gangchen Hua

    2017-01-01

    Full Text Available In this study we describe a new appearance-based loop-closure detection method for online incremental simultaneous localization and mapping (SLAM using affine-invariant-based geometric constraints. Unlike other pure bag-of-words-based approaches, our proposed method uses geometric constraints as a supplement to improve accuracy. By establishing an affine-invariant hypothesis, the proposed method excludes incorrect visual words and calculates the dispersion of correctly matched visual words to improve the accuracy of the likelihood calculation. In addition, camera’s intrinsic parameters and distortion coefficients are adequate for this method. 3D measuring is not necessary. We use the mechanism of Long-Term Memory and Working Memory (WM to manage the memory. Only a limited size of the WM is used for loop-closure detection; therefore the proposed method is suitable for large-scale real-time SLAM. We tested our method using the CityCenter and Lip6Indoor datasets. Our proposed method results can effectively correct the typical false-positive localization of previous methods, thus gaining better recall ratios and better precision.

  14. High-Performance Corrosion-Resistant Materials: Iron-Based Amorphous-Metal Thermal-Spray Coatings

    International Nuclear Information System (INIS)

    Farmer, J C; Haslam, J J; Wong, F; Ji, X; Day, S D; Branagan, D J; Marshall, M C; Meacham, B E; Buffa, E J; Blue, C A; Rivard, J K; Beardsley, M B; Weaver, D T; Aprigliano, L F; Kohler, L; Bayles, R; Lemieux, E J; Wolejsza, T M; Martin, F J; Yang, N; Lucadamo, G; Perepezko, J H; Hildal, K; Kaufman, L; Heuer, A H; Ernst, F; Michal, G M; Kahn, H; Lavernia, E J

    2004-01-01

    The multi-institutional High Performance Corrosion Resistant Materials (HPCRM) Team is cosponsored by the Defense Advanced Projects Agency (DARPA) Defense Science Office (DSO) and the Department of Energy (DOE) Office of Civilian Radioactive Waste Management (OCRWM), and has developed new corrosion-resistant, iron-based amorphous metals that can be applied as coatings with advanced thermal spray technology. Two compositions have corrosion resistance superior to wrought nickel-based Alloy C-22 (UNS No. N06022) in very aggressive environments, including concentrated calcium-chloride brines at elevated temperature. Corrosion costs the Department of Defense billions of dollars every year, with an immense quantity of material in various structures undergoing corrosion. For example, in addition to fluid and seawater piping, ballast tanks, and propulsions systems, approximately 345 million square feet of structure aboard naval ships and crafts require costly corrosion control measures. The use of advanced corrosion-resistant materials to prevent the continuous degradation of this massive surface area would be extremely beneficial. The Fe-based corrosion-resistant, amorphous-metal coatings under development may prove of importance for applications on ships. Such coatings could be used as an ''integral drip shield'' on spent fuel containers, as well as protective coatings that could be applied over welds, thereby preventing exposure to environments that might cause stress corrosion cracking. In the future, such new high-performance iron-based materials could be substituted for more-expensive nickel-based alloys, thereby enabling a reduction in the $58-billion life cycle cost for the long-term storage of the Nation's spent nuclear fuel by tens of percent

  15. Pack cementation diffusion coatings for Fe-base and refractory alloys. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Rapp, R.A. [Ohio State Univ., Columbus, OH (United States). Dept. of Materials Science and Engineering

    1998-03-10

    With the aid of computer-assisted calculations of the equilibrium vapor pressures in halide-activated cementation packs, processing conditions have been identified and experimentally verified for the codeposition of two or more alloying elements in a diffusion coating on a variety of steels and refractory metal alloys. A new comprehensive theory to treat the multi-component thermodynamic equilibria in the gas phase for several coexisting solid phases was developed and used. Many different processes to deposit various types of coatings on several types of steels were developed: Cr-Si codeposition for low- or medium-carbon steels, Cr-Al codeposition on low-carbon steels to yield either a Kanthal-type composition (Fe-25Cr-4Al in wt.%) or else a (Fe, Cr){sub 3}Al surface composition. An Fe{sub 3}Al substrate was aluminized to achieve an FeAl surface composition, and boron was also added to ductilize the coating. The developmental Cr-lean ORNL alloys with exceptional creep resistance were Cr-Al coated to achieve excellent oxidation resistance. Alloy wires of Ni-base were aluminized to provide an average composition of Ni{sub 3}Al for use as welding rods. Several different refractory metal alloys based on Cr-Cr{sub 2}Nb have been silicided, also with germanium additions, to provide excellent oxidation resistance. A couple of developmental Cr-Zr alloys were similarly coated and tested.

  16. Direct synthesis of antimicrobial coatings based on tailored bi-elemental nanoparticles

    Directory of Open Access Journals (Sweden)

    Giulio Benetti

    2017-03-01

    Full Text Available Ultrathin coatings based on bi-elemental nanoparticles (NPs are very promising to limit the surface-related spread of bacterial pathogens, particularly in nosocomial environments. However, tailoring the synthesis, composition, adhesion to substrate, and antimicrobial spectrum of the coating is an open challenge. Herein, we report on a radically new nanostructured coating, obtained by a one-step gas-phase deposition technique, and composed of bi-elemental Janus type Ag/Ti NPs. The NPs are characterized by a cluster-in-cluster mixing phase with metallic Ag nano-crystals embedded in amorphous TiO2 and present a promising antimicrobial activity including also multidrug resistant strains. We demonstrate the flexibility of the method to tune the embedded Ag nano-crystals dimension, the total relative composition of the coating, and the substrate type, opening the possibility of tailoring the dimension, composition, antimicrobial spectrum, and other physical/chemical properties of such multi-elemental systems. This work is expected to significantly spread the range of applications of NPs coatings, not only as an effective tool in the prevention of healthcare-associated infections but also in other technologically relevant fields like sensors or nano-/micro joining.

  17. Direct synthesis of antimicrobial coatings based on tailored bi-elemental nanoparticles

    Science.gov (United States)

    Benetti, Giulio; Cavaliere, Emanuele; Canteri, Adalberto; Landini, Giulia; Rossolini, Gian Maria; Pallecchi, Lucia; Chiodi, Mirco; Van Bael, Margriet J.; Winckelmans, Naomi; Bals, Sara; Gavioli, Luca

    2017-03-01

    Ultrathin coatings based on bi-elemental nanoparticles (NPs) are very promising to limit the surface-related spread of bacterial pathogens, particularly in nosocomial environments. However, tailoring the synthesis, composition, adhesion to substrate, and antimicrobial spectrum of the coating is an open challenge. Herein, we report on a radically new nanostructured coating, obtained by a one-step gas-phase deposition technique, and composed of bi-elemental Janus type Ag/Ti NPs. The NPs are characterized by a cluster-in-cluster mixing phase with metallic Ag nano-crystals embedded in amorphous TiO2 and present a promising antimicrobial activity including also multidrug resistant strains. We demonstrate the flexibility of the method to tune the embedded Ag nano-crystals dimension, the total relative composition of the coating, and the substrate type, opening the possibility of tailoring the dimension, composition, antimicrobial spectrum, and other physical/chemical properties of such multi-elemental systems. This work is expected to significantly spread the range of applications of NPs coatings, not only as an effective tool in the prevention of healthcare-associated infections but also in other technologically relevant fields like sensors or nano-/micro joining.

  18. Correlating Coating Characteristics with the Performance of Drug-Coated Balloons – A Comparative In Vitro Investigation of Own Established Hydrogel- and Ionic Liquid-Based Coating Matrices

    Science.gov (United States)

    Kaule, Sebastian; Minrath, Ingo; Stein, Florian; Kragl, Udo; Schmidt, Wolfram; Schmitz, Klaus-Peter; Sternberg, Katrin; Petersen, Svea

    2015-01-01

    Drug-coated balloons (DCB), which have emerged as a therapeutic alternative to drug-eluting stents in percutaneous cardiovascular intervention, are well described with regard to clinical efficacy and safety within a number of clinical studies. In vitro studies elucidating the correlation between coating additive and DCB performance are however rare but considered important for the understanding of DCB requirements and the improvement of established DCB. In this regard, we examined three different DCB-systems, which were developed in former studies based on the ionic liquid cetylpyridinium salicylate, the body-own hydrogel hyaluronic acid and the pharmaceutically well-established hydrogel polyvinylpyrrolidone, considering coating morphology, coating thickness, drug-loss, drug-transfer to the vessel wall, residual drug-concentration on the balloon surface and entire drug-load during simulated use in an in vitro vessel model. Moreover, we investigated particle release of the different DCB during simulated use and determined the influence of the three coatings on the mechanical behavior of the balloon catheter. We could show that coating characteristics can be indeed correlated with the performance of DCB. For instance, paclitaxel incorporation in the matrix can reduce the drug wash-off and benefit a high drug transfer. Additionally, a thin coating with a smooth surface and high but delayed solubility can reduce drug wash-off and decrease particle burden. As a result, we suggest that it is very important to characterize DCB in terms of mentioned properties in vitro in addition to their clinical efficacy in order to better understand their function and provide more data for the clinicians to improve the tool of DCB in coronary angioplasty. PMID:25734818

  19. From physical dose constraints to equivalent uniform dose constraints in inverse radiotherapy planning

    International Nuclear Information System (INIS)

    Thieke, Christian; Bortfeld, Thomas; Niemierko, Andrzej; Nill, Simeon

    2003-01-01

    Optimization algorithms in inverse radiotherapy planning need information about the desired dose distribution. Usually the planner defines physical dose constraints for each structure of the treatment plan, either in form of minimum and maximum doses or as dose-volume constraints. The concept of equivalent uniform dose (EUD) was designed to describe dose distributions with a higher clinical relevance. In this paper, we present a method to consider the EUD as an optimization constraint by using the method of projections onto convex sets (POCS). In each iteration of the optimization loop, for the actual dose distribution of an organ that violates an EUD constraint a new dose distribution is calculated that satisfies the EUD constraint, leading to voxel-based physical dose constraints. The new dose distribution is found by projecting the current one onto the convex set of all dose distributions fulfilling the EUD constraint. The algorithm is easy to integrate into existing inverse planning systems, and it allows the planner to choose between physical and EUD constraints separately for each structure. A clinical case of a head and neck tumor is optimized using three different sets of constraints: physical constraints for all structures, physical constraints for the target and EUD constraints for the organs at risk, and EUD constraints for all structures. The results show that the POCS method converges stable and given EUD constraints are reached closely

  20. Research in constraint-based layout, visualization, CAD, and related topics : a bibliographical survey

    OpenAIRE

    Hower, Walter; Graf, Winfried H.

    1995-01-01

    The present work compiles numerous papers in the area of computer-aided design, graphics, layout configuration, and user interfaces in general. There is nearly no conference on graphics, multimedia, and user interfaces that does not include a section on constraint-based graphics; on the other hand most conferences on constraint processing favour applications in graphics. This work of bibliographical pointers may serve as a basis for a detailed and comprehensive survey of this important and ch...

  1. An Improved Constraint-Based System for the Verification of Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov [30]. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect flaws associated to partial

  2. An Improved Constraint-based system for the verification of security protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hermenegildo, Manuel V.; Puebla, German

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect aws associated to partial runs

  3. MECHANICAL PROPERTIES AND CORROSION PROTECTION OF CARBON STEEL COATED WITH AN EPOXY BASED POWDER COATING CONTAINING MONTMORILONITE FUNCTIONALIZED WITH SILANE

    OpenAIRE

    Paula Tibola Bertuoli; Veronica Perozzo Frizzo; Diego Piazza; Lisete Cristine Scienza; Ademir José Zattera

    2014-01-01

    In the present work the MMT-Na+ clay was functionalized with 3-aminopropyltriethoxysilane (γ-APS) and incorporated in a commercial formulation epoxy-based powder coating in a proportion of 8 wt% and applied on 1008 carbon steel panels by electrostatic spray. Adhesion, flexibility, impact and corrosion performance in salt spray chamber tests were performed to evaluate the coatings. The presence of clay did not affect the mechanical properties of the film, however greater subcutaneo...

  4. Microstructure evolution of Fe-based nanostructured bainite coating by laser cladding

    International Nuclear Information System (INIS)

    Guo, Yanbing; Li, Zhuguo; Yao, Chengwu; Zhang, Ke; Lu, Fenggui; Feng, Kai; Huang, Jian; Wang, Min; Wu, Yixiong

    2014-01-01

    Highlights: • The laser cladding and isothermal holding are used to fabricate nanobainite coating. • Fine prior austenite is obtained to accelerate the bainite transformation. • Low transformation temperature results in fine bainite ferrite and film austenite. • Retained austenite volume fraction in bainite coating is determined by XRD. • Evolution of carbon content in austenite and ferrite is analyzed. - Abstract: A Fe-based coating with nano-scale bainitic microstructure was fabricated using laser cladding and subsequent isothermal heat treatment. The microstructure of the coating was observed and analyzed using optical microscope (OM), field-emission scanning electron microscope (FE-SEM), transmission electron microscope (TEM) and X-ray diffraction (XRD). The results showed that nanostructured bainitic ferrite and carbon-enriched retained austenite distributed uniformly in the coating. Blocky retained austenite was confined to the prior austenite grain boundaries resulting from the elements segregation. The bainitic microstructure obtained at 250 °C had a finer scale compared with that obtained at 300 °C. The volume fraction of austenite increased with increasing transformation temperature for the fully transformed bainitic coating. The bainitic transformation was accelerated as a result of the fine prior austenite generated during the laser cladding. The evolution of the carbon contents in bainitic ferrite and retained austenite revealed the diffusionless mechanism of the bainitic transformation

  5. Who Goes There? Staying Anonymous on the Internet

    Science.gov (United States)

    Descy, Don E.

    2009-01-01

    Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…

  6. The development of estimated methodology for interfacial adhesion of semiconductor coatings having an enormous mismatch extent

    Science.gov (United States)

    Lee, Chang-Chun; Huang, Pei-Chen

    2018-05-01

    The long-term reliability of multi-stacked coatings suffering the bending or rolling load was a severe challenge to extend the lifespan of foregoing structure. In addition, the adhesive strength of dissimilar materials was regarded as the major mechanical reliability concerns among multi-stacked films. However, the significant scale-mismatch from several nano-meter to micro-meter among the multi-stacked coatings causing the numerical accuracy and converged capability issues on fracture-based simulation approach. For those reasons, this study proposed the FEA-based multi-level submodeling and multi-point constraint (MPC) technique to conquer the foregoing scale-mismatch issue. The results indicated that the decent region of first and second-order submodeling can achieve the small error of 1.27% compared with the experimental result and significantly reduced the mesh density and computing time. Moreover, the MPC method adopted in FEA simulation also shown only 0.54% error when the boundary of selected local region was away the concerned critical region following the Saint-Venant principle. In this investigation, two FEA-based approaches were used to conquer the evidently scale mismatch issue when the adhesive strengths of micro and nano-scale multi-stacked coating were taken into account.

  7. Low-cycle fatigue and damage of an uncoated and coated single crystal nickel-base superalloy SCB

    International Nuclear Information System (INIS)

    Stekovic, S.; Ericsson, T.

    2007-01-01

    This paper presents low-cycle fatigue (LCF) behaviour and damage mechanisms of uncoated and coated specimens of a single crystal nickel-base superalloy SCB tested at 500 C and 900 C. Four coatings were deposited on the base material, an overlay coating AMDRY997, a platinum-modified aluminide diffusion coating RT22 and two innovative coatings called IC1 and IC3 with a NiW diffusion barrier in the interface. AMDRY997 and RT22 were used as reference coatings. The LCF tests were performed at three strain amplitudes, 1.0, 1.2 and 1.4%, with R = -1, in laboratory air and without any dwell time. The LCF life of the specimens is determined by crack initiation and propagation. Crack data are presented for different classes of crack size in the form of crack density, that is, the number of cracks normalised to the investigated interface length. Micrographs of damage of the coatings are also shown. The effect of the coatings on the LCF life of the superalloy was dependent on the test temperature and deposited coating. At 500 C all coatings had a detrimental effect on the LCF life of the superalloy. At 900 C both AMDRY997 and IC1 prolonged the fatigue life of the superalloy by factors ranging between 1.5 and 4 while RT22 and IC3 shortened the life of the coating-substrate system. Specimens coated with RT22 exhibited generally more damage than other tested coatings at 900 C. Most of the cracks observed initiated at the coating surface and a majority were arrested in the interdiffusion zone between the base material and the coating. No topologically close-packed phases were found. Delamination was only found in AMDRY997 at higher strains. Surface roughness or rumpling was found in the overlay coating AMDRY997 with some cracks initiating from the rumples. The failure morphology at 900 C reflected the role of oxidation in the fatigue life, the crack initiation and propagation of the coated specimens. The wake of the cracks grown into the substrate was severely oxidised leading to

  8. Si-based thin film coating on Y-TZP: Influence of deposition parameters on adhesion of resin cement

    Energy Technology Data Exchange (ETDEWEB)

    Queiroz, José Renato Cavalcanti, E-mail: joserenatocq@hotmail.com [Potiguar University, Department of Biotechnology, Natal (Brazil); Nogueira Junior, Lafayette [São Paulo State University, Department of Prosthodontics and Dental Materials, São José dos Campos (Brazil); Massi, Marcos [Federal University of São Paulo, Institute of Science and Technology, São José dos Campos (Brazil); Silva, Alecssandro de Moura; Bottino, Marco Antonio [São Paulo State University, Department of Prosthodontics and Dental Materials, São José dos Campos (Brazil); Sobrinho, Argemiro Soares da Silva [Technological Institute of Aeronautics, Department of Physics, São José dos Campos (Brazil); Özcan, Mutlu [University of Zurich, Dental Materials Unit, Center for Dental and Oral Medicine, Clinic for Fixed and Removable Prosthodontics and Dental Materials Science, Zurich (Switzerland)

    2013-10-01

    This study evaluated the influence of deposition parameters for Si-based thin films using magnetron sputtering for coating zirconia and subsequent adhesion of resin cement. Zirconia ceramic blocks were randomly divided into 8 groups and specimens were either ground finished and polished or conditioned using air-abrasion with alumina particles coated with silica. In the remaining groups, the polished specimens were coated with Si-based film coating with argon/oxygen magnetron discharge at 8:1 or 20:1 flux. In one group, Si-based film coating was performed on air-abraded surfaces. After application of bonding agent, resin cement was bonded. Profilometry, goniometry, Energy Dispersive X-ray Spectroscopy and Rutherford Backscattering Spectroscopy analysis were performed on the conditioned zirconia surfaces. Adhesion of resin cement to zirconia was tested using shear bond test and debonded surfaces were examined using Scanning Electron Microscopy. Si-based film coating applied on air-abraded rough zirconia surfaces increased the adhesion of the resin cement (22.78 ± 5.2 MPa) compared to those of other methods (0–14.62 MPa) (p = 0.05). Mixed type of failures were more frequent in Si film coated groups on either polished or air-abraded groups. Si-based thin films increased wettability compared to the control group but did not change the roughness, considering the parameters evaluated. Deposition parameters of Si-based thin film and after application of air-abrasion influenced the initial adhesion of resin cement to zirconia.

  9. Si-based thin film coating on Y-TZP: Influence of deposition parameters on adhesion of resin cement

    International Nuclear Information System (INIS)

    Queiroz, José Renato Cavalcanti; Nogueira Junior, Lafayette; Massi, Marcos; Silva, Alecssandro de Moura; Bottino, Marco Antonio; Sobrinho, Argemiro Soares da Silva; Özcan, Mutlu

    2013-01-01

    This study evaluated the influence of deposition parameters for Si-based thin films using magnetron sputtering for coating zirconia and subsequent adhesion of resin cement. Zirconia ceramic blocks were randomly divided into 8 groups and specimens were either ground finished and polished or conditioned using air-abrasion with alumina particles coated with silica. In the remaining groups, the polished specimens were coated with Si-based film coating with argon/oxygen magnetron discharge at 8:1 or 20:1 flux. In one group, Si-based film coating was performed on air-abraded surfaces. After application of bonding agent, resin cement was bonded. Profilometry, goniometry, Energy Dispersive X-ray Spectroscopy and Rutherford Backscattering Spectroscopy analysis were performed on the conditioned zirconia surfaces. Adhesion of resin cement to zirconia was tested using shear bond test and debonded surfaces were examined using Scanning Electron Microscopy. Si-based film coating applied on air-abraded rough zirconia surfaces increased the adhesion of the resin cement (22.78 ± 5.2 MPa) compared to those of other methods (0–14.62 MPa) (p = 0.05). Mixed type of failures were more frequent in Si film coated groups on either polished or air-abraded groups. Si-based thin films increased wettability compared to the control group but did not change the roughness, considering the parameters evaluated. Deposition parameters of Si-based thin film and after application of air-abrasion influenced the initial adhesion of resin cement to zirconia.

  10. Nano-cellulose based nano-coating biomaterial dataset using corn leaf biomass: An innovative biodegradable plant biomaterial

    Directory of Open Access Journals (Sweden)

    A.B.M. Sharif Hossain

    2018-04-01

    Full Text Available The nanocellulose derived biodegradable plant biomaterial as nano-coating can be used in the medical, biomedical cosmetics, and bioengineering products. Bio-plastic and some synthetic derived materials are edible and naturally biodegradable. The study was conducted to investigate edible nano-biopolymer based nano-coating of capsules and drugs or other definite biomedical materials from corn leaf biomass. Corn leaf biomass was used as an innovative sample to produce edible nano-coating bioplastic for drug and capsule coating and other industrial uses. The data show the negligible water 0.01% absorbed by bio-plastic nanocoating. Odor represented by burning test was under the completely standard based on ASTM. Moreover, data on color coating, tensile strength, pH, cellulose content have been shown under standard value of ASTM (American standard for testing and materials standard. In addition to that data on the chemical element test like K+, CO3−−, Cl-, Na+ exhibited positive data compared to the synthetic plastic in the laboratory using the EN (166 standardization. Therefore, it can be concluded that both organic (cellulose and starch based edible nano-coating bioplastic may be used for drug and capsule coating as biomedical and medical components in the pharmaceutical industries. Keywords: Nanocellulose, Nanobioplastic, Nanocoating, Biodegradable, Corn leaf

  11. Long-term antibiotic delivery by chitosan-based composite coatings with bone regenerative potential

    Science.gov (United States)

    Ordikhani, F.; Simchi, A.

    2014-10-01

    Composite coatings with bone-bioactivity and drug-eluting capacity are considered as promising materials for titanium bone implants. In this work, drug-eluting chitosan-bioactive glass coatings were fabricated by a single-step electrophoretic deposition technique. Drug-loading and -releasing capacity of the composite coatings were carried out using the vancomycin antibiotic. Uniform coatings with a thickness of ∼55 μm containing 23.7 wt% bioactive glass particles and various amounts of the antibiotic (380-630 μg/cm2) were produced. The coatings were bioactive in terms of apatite-forming ability in simulated body fluid and showed favorable cell adhesion and growth. In vitro biological tests also indicated that the composite coatings had better cellular affinity than pristine chitosan coatings. The in vitro elution kinetics of the composite coating revealed an initial burst release of around 40% of the drug within the first elution step of 1 h and following by a continuous eluting over 4 weeks, revealing long-term drug-delivering potential. Antibacterial tests using survival assay against Gram-positive Staphylococcus aureus bacteria determined the effect of vancomycin release on reduction of infection risk. Almost no bacteria were survived on the coatings prepared from the EPD suspension containing ≥0.5 g/l vancomycin. The developed chitosan-based composite coatings with bone bioactivity and long-term drug-delivery ability may be potentially useful for metallic implants to reduce infection risk.

  12. Electrochemical Sensor Coating Based on Electrophoretic Deposition of Au-Doped Self-Assembled Nanoparticles.

    Science.gov (United States)

    Zhang, Rongli; Zhu, Ye; Huang, Jing; Xu, Sheng; Luo, Jing; Liu, Xiaoya

    2018-02-14

    The electrophoretic deposition (EPD) of self-assembled nanoparticles (NPs) on the surface of an electrode is a new strategy for preparing sensor coating. By simply changing the deposition conditions, the electrochemical response for an analyte of deposited NPs-based coating can be controlled. This advantage can decrease the difference between different batches of sensor coating and ensure the reproducibility of each sensor. This work investigated the effects of deposition conditions (including deposition voltage, pH value of suspension, and deposition time) on the structure and the electrochemical response for l-tryptophan of sensor coating formed from Au-doped poly(sodium γ-glutamate) with pendant dopamine units nanohybrids (Au/γ-PGA-DA NBs) via the EPD method. The structure and thickness of the deposited sensor coating were measured by atomic force microscopy, which demonstrated that the structure and thickness of coating can be affected by the deposition voltage, the pH value of the suspension, and the deposition time. The responsive current for l-tryptophan of the deposited sensor coating were measured by differential pulse voltammetry, which showed that the responsive current value was affected by the structure and thickness of the deposited coating. These arguments suggested that a rich design-space for tuning the electrochemical response for analyte and a source of variability in the structure of sensor coating can be provided by the deposition conditions. When Au/γ-PGA-DA NBs were deposited on the electrode surface and formed a continuous coating with particle morphology and thinner thickness, the deposited sensor coating exhibited optimal electrochemical response for l-tryptophan.

  13. Hot corrosion testing of Ni-based alloys and coatings in a modified Dean rig

    Science.gov (United States)

    Steward, Jason Reid

    Gas turbine blades are designed to withstand a variety of harsh operating conditions. Although material and coating improvements are constantly administered to increase the mean time before turbine refurbishment or replacement, hot corrosion is still considered as the major life-limiting factor in many industrial and marine gas turbines. A modified Dean rig was designed and manufactured at Tennessee Technological University to simulate the accelerated hot corrosion conditions and to conduct screening tests on the new coatings on Ni-based superalloys. Uncoated Ni-based superalloys, Rene 142 and Rene 80, were tested in the modified Dean rig to establish a testing procedure for Type I hot corrosion. The influence of surface treatments on the hot corrosion resistance was then investigated. It was found that grit-blasted specimens showed inferior hot corrosion resistance than that of the polished counterpart. The Dean rig was also used to test model MCrAlY alloys, pack cementation NiAl coatings, and electro-codeposited MCrAlY coatings. Furthermore, the hot corrosion attack on the coated-specimens were also assessed using a statistical analysis approach.

  14. Physicochemical Properties of Calcium Phosphate Based Coating on Gutta-Percha Root Canal Filling

    Directory of Open Access Journals (Sweden)

    Afaf Al-Haddad

    2015-01-01

    Full Text Available Dental Gutta-percha (GP is a polymer based standard root canal filling material that has been widely used in dentistry. However, it has an inadequate sealing ability and adhesion to root dentin. The aim of this study is to coat GP with a bioactive material to enhance its sealing ability and adhesion to the root sealer and subsequently to the root dentin. The choice of coating method is limited by the nature of GP as it requires a technique that is not governed by high temperatures or uses organic solvents. In this study, biomimetic coating technique using 1.5 Tas-simulated body fluids (SBF was employed to coat the treated GP cones. The coated samples were characterized using Fourier transform infrared spectroscopy (FTIR, X-ray Diffraction (XRD, and field emission scanning electron microscope (FESEM. The presence of hydroxyl, carbonate, and phosphate groups was detected by FTIR while the formation of hydroxyapatite (HA/calcium phosphate was confirmed with XRD. FESEM revealed uniform, thin, and crystalline HA calcium phosphate coating. The adhesion of the coating to the GP substrate was assessed with microscratch technique. It was viable with cohesive failure mode. In conclusion, Tas-SBF is able to coat pretreated GP cones with a crystalline apatitic calcium phosphate layer.

  15. Formation of electrically insulating coatings on aluminided vanadium-base alloys in liquid lithium

    International Nuclear Information System (INIS)

    Park, J.H.; Dragel, G.

    1993-01-01

    Aluminide coatings were produced on vanadium and vanadium-base alloys by exposure of the materials to liquid lithium that contained 3-5 at.% dissolved aluminum in sealed capsules at temperatures between 775 and 880 degrees C. Reaction of the aluminide layer with dissolved nitrogen in liquid lithium provides a means of developing an in-situ electrical insulator coating on the surface of the alloys. The electrical resistivity of A1N coatings on aluminided V and V-20 wt.% Ti was determined in-situ

  16. Carbon-based coatings for automotive components; Kohlenstoffbasierte Beschichtungen fuer automotive-Komponenten. Einsatz von Beschichtungen als Konstruktionselement

    Energy Technology Data Exchange (ETDEWEB)

    Huben, Theresa [Oerlikon Balzers AG, Balzers (Liechtenstein). Geschaeftsbereich Automotive-Komponenten; Becker, Juergen [Oerlikon Balzers Coating Germany GmbH, Bingen (Germany). Entwicklung fuer den Geschaeftsbereich Automotive-Komponenten

    2012-04-15

    The outstanding properties of carbon-based coatings are the low friction against steel and the wear resistance, interconnected with the high hardness. In lubricated systems coatings only work in the mixed and boundary friction regime; this means as long as primary body and counter body are still in contact. The properties of coatings can be adjusted in wide ranges. A purposeful adaptation requires that the tribological system is sufficiently well understood. It has been shown that solutions based on coatings are only sub-optimal if the coating is only introduced at the end of the design-phase. A greater benefit is obtained, when the scope for development as given by a coating is utilized already in the early design phase. The coating is accepted as a design element. To test the suitability of the selected coating quickly and inexpensively in advance, the usual standard laboratory tests are not always appropriate. A test set-up has to be close enough to the application to generate useful results. These considerations are illustrated using the example of a piston pin coating. The roughness of the primary body and of the counter body is of particular importance for the adjustment of the coating system, when high loads are applied. The example presented here shows that the usual indicators for surface roughness like R{sub a} and R{sub z} are not always sufficient. (orig.)

  17. Tailored Aluminium based Coatings for Optical Appearance and Corrosion Resistance

    DEFF Research Database (Denmark)

    Aggerbeck, Martin

    potential differences in the microstructure, and protection from the network of the Al3Ti phases precipitated during the heat treatment. Laser surface cladding of aluminium containing up to 20 wt. % Ti6Al4V were studied focusing on the microstructure and the alkaline corrosion properties. Due......The current project investigated the possibility of designing aluminium based coatings focusing on the effect of composition and surface finish on the optical appearance and on the alkaline corrosion properties using titanium as the main alloying element. The main results and discussions...... that the roughness after etching increases with higher amounts of alloying elements (especially iron and silicon). Proper polishing requires some alloy hardness, while alloy purity is required for a glossy appearance after anodisation. Magnetron sputtered aluminium based coatings containing up to 18 wt. % titanium...

  18. Momentum constraint relaxation

    International Nuclear Information System (INIS)

    Marronetti, Pedro

    2006-01-01

    Full relativistic simulations in three dimensions invariably develop runaway modes that grow exponentially and are accompanied by violations of the Hamiltonian and momentum constraints. Recently, we introduced a numerical method (Hamiltonian relaxation) that greatly reduces the Hamiltonian constraint violation and helps improve the quality of the numerical model. We present here a method that controls the violation of the momentum constraint. The method is based on the addition of a longitudinal component to the traceless extrinsic curvature A ij -tilde, generated by a vector potential w i , as outlined by York. The components of w i are relaxed to solve approximately the momentum constraint equations, slowly pushing the evolution towards the space of solutions of the constraint equations. We test this method with simulations of binary neutron stars in circular orbits and show that it effectively controls the growth of the aforementioned violations. We also show that a full numerical enforcement of the constraints, as opposed to the gentle correction of the momentum relaxation scheme, results in the development of instabilities that stop the runs shortly

  19. Tantalum-based multilayer coating on cobalt alloys in total hip and knee replacement

    Energy Technology Data Exchange (ETDEWEB)

    Balagna, C., E-mail: cristina.balagna@polito.it [Institute of Materials Engineering and Physics, Applied Science and Technology Department, Politecnico di Torino, Corso Duca degli Abruzzi 24,10129 Torino (Italy); Faga, M.G. [Istituto di Scienza e Tecnologia dei Materiali Ceramici, Consiglio Nazionale delle Ricerche, Strada delle Cacce 73, 10135 Torino (Italy); Spriano, S. [Institute of Materials Engineering and Physics, Applied Science and Technology Department, Politecnico di Torino, Corso Duca degli Abruzzi 24,10129 Torino (Italy)

    2012-05-01

    Cobalt-chromium-molybdenum (CoCrMo) alloys are widely used in total hip and knee joint replacement, due to high mechanical properties and resistance to wear and corrosion. They are able to form efficient artificial joints by means of coupling metal-on-polymer or metal-on-metal contacts. However, a high concentration of stress and direct friction between surfaces leads to the formation of polyethylene wear debris and the release of toxic metal ions into the human body, limiting, as a consequence, the lifetime of implants. The aim of this research is a surface modification of CoCrMo alloys in order to improve their biocompatibility and to decrease the release of metal ions and polyethylene debris. Thermal treatment in molten salts was the process employed for the deposition of tantalum-enriched coating. Tantalum and its compounds are considered biocompatible materials with low ion release and high corrosion resistance. Three different CoCrMo alloys were processed as substrates. An adherent coating of about 1 {mu}m of thickness, with a multilayer structure consisting of two tantalum carbides and metallic tantalum was deposited. The substrates and modified layers were characterized by means of structural, chemical and morphological analysis. Moreover nanoindentation, scratch and tribological tests were carried out in order to evaluate the mechanical behavior of the substrates and coating. The hardness of the coated samples increases more than double than the untreated alloys meanwhile the presence of the coating reduced the wear volume and rate of about one order of magnitude. - Highlights: Black-Right-Pointing-Pointer Thermal treatment in molten salts deposits a Ta-based coating on Co-based alloys. Black-Right-Pointing-Pointer Coating is composed by one or two tantalum carbides and/or metallic tantalum. Black-Right-Pointing-Pointer The coating structure depends on thermal temperature and substrates carbon content. Black-Right-Pointing-Pointer Coating is able to

  20. A constraint-based bottom-up counterpart to definite clause grammars

    DEFF Research Database (Denmark)

    Christiansen, Henning

    2004-01-01

    A new grammar formalism, CHR Grammars (CHRG), is proposed that provides a constraint-solving approach to language analysis, built on top of the programming language of Constraint Handling Rules in the same way as Definite Clause Grammars (DCG) on Prolog. CHRG works bottom-up and adds the following......, integrity constraints, operators a la assumption grammars, and to incorporate other constraint solvers. (iv)~Context-sensitive rules that apply for disambiguation, coordination in natural language and tagger-like rules....

  1. More than addiction: Examining the role of anonymity, endless narrative, and socialization in prolonged gaming and instant messaging practices

    Directory of Open Access Journals (Sweden)

    Kishonna Gray

    2015-06-01

    Full Text Available This ethnographic study explores a user’s prolonged engagement within virtual gaming communities. Likening prolonged engagement with addiction, this research provides an alternative perspective into virtual addiction focusing on three interrelated themes: 1 anonymity, 2 endless narrative, and 3 socialization. By employing narrative interviews and virtual observations, the researchers examine two different cultural, racial and age groups’ user experience within console and computer-based multiplayer environments. More specifically, they explore how the three factors (i.e., anonymity; endless narrative; socialization relate to the prolonged and extended use within these virtual communities and highlight the multifaceted uses of traditional chat services, social media, and the convergence of media existing within these chat communities.

  2. Model-Based Control of a Continuous Coating Line for Proton Exchange Membrane Fuel Cell Electrode Assembly

    Directory of Open Access Journals (Sweden)

    Vikram Devaraj

    2015-01-01

    Full Text Available The most expensive component of a fuel cell is the membrane electrode assembly (MEA, which consists of an ionomer membrane coated with catalyst material. Best-performing MEAs are currently fabricated by depositing and drying liquid catalyst ink on the membrane; however, this process is limited to individual preparation by hand due to the membrane’s rapid water absorption that leads to shape deformation and coating defects. A continuous coating line can reduce the cost and time needed to fabricate the MEA, incentivizing the commercialization and widespread adoption of fuel cells. A pilot-scale membrane coating line was designed for such a task and is described in this paper. Accurate process control is necessary to prevent manufacturing defects from occurring in the coating line. A linear-quadratic-Gaussian (LQG controller was developed based on a physics-based model of the coating process to optimally control the temperature and humidity of the drying zones. The process controller was implemented in the pilot-scale coating line proving effective in preventing defects.

  3. Properties of a epoxy-based powder coating containing modified montmorillonite with cerium

    International Nuclear Information System (INIS)

    Beux, A.R.D.; Piazza, D.; Zattera, A.J.; Ferreira, C.A.; Scienza, L.C.

    2014-01-01

    Organic coatings are widely used to prevent corrosion in metal structures. The incorporation of nanofiller the polymer matrix in order to obtain polymer nanocomposites has been arousing scientific and technological interest, because it provides significant improvements when incorporated into pure polymeric materials or conventional composites. In the present study were been developed epoxy-based powder coating with addition of different concentrations (2, 4 and 8% (w / w)) of the montmorillonite type Cloisite® 15A modified with cerium in the melt state on a double-screw extruder co-rotating. The coatings were characterized by average particle size, time (gel time) gel, X-ray diffraction (XRD), scanning electron microscopy (SEM), and thermogravimetric analysis (TGA). Coatings with intercalated structure was observed in the XRD analysis and confirmed by SEM to the observe an increase in the concentration of tactoids an increased filler content. (author)

  4. Rigid Body Time Integration by Convected Base Vectors with Implicit Constraints

    DEFF Research Database (Denmark)

    Krenk, Steen; Nielsen, Martin Bjerre

    2013-01-01

    of the kinetic energy used in the present formulation is deliberately chosen to correspond to a rigid body rotation, and the orthonormality constraints are introduced via the equivalent Green strain components of the base vectors. The particular form of the extended inertia tensor used here implies a set...

  5. Poly(hydroxyalkanoates-Based Hydrophobic Coatings for the Protection of Stone in Cultural Heritage

    Directory of Open Access Journals (Sweden)

    Serena Andreotti

    2018-01-01

    Full Text Available Reversibility is a mandatory requirement for materials used in heritage conservation, including hydrophobic protectives. Nevertheless, current protectives for stone are not actually reversible as they remain on the surfaces for a long time after their hydrophobicity is lost and can hardly be removed. Ineffective and aged coatings may jeopardise the stone re-treatability and further conservation interventions. This paper aims at investigating the performance of PHAs-based coatings for stone protection, their main potential being the ‘reversibility by biodegradation’ once water repellency ended. The biopolymer coatings were applied to three different kinds of stone, representative of lithotypes used in historic architecture: sandstone, limestone and marble. Spray, poultice and dip-coating were tested as coating techniques. The effectiveness and compatibility of the protectives were evaluated in terms of capillary water absorption, static and dynamic contact angles, water vapour diffusion, colour alteration and surface morphology. The stones’ wettability after application of two commercial protectives was investigated too, for comparison. Finally, samples were subjected to artificial ageing to investigate their solar light stability. Promising results in terms of efficacy and compatibility were obtained, although the PHAs-based formulations developed here still need improvement for increased durability and on-site applicability.

  6. Taxonomy for and Analysis of Anonymous Communications Networks

    Science.gov (United States)

    2009-03-01

    degradation, preservation and elimination in cyberspace to enhance the security of information assets. This includes discovery/obfuscation of...a means of communication and information dissemination, concerns about Internet privacy and security are escalating. In 1980’s, Chaum began work...variety of different systems including the T9000 Transputer AFIT/DCS/ENG/09-08 - 123 - [Bar95] and a secure ecommerce system [HaC02]. Anonymity

  7. Crosslinkable coatings from phosphorylcholine-based polymers.

    Science.gov (United States)

    Lewis, A L; Cumming, Z L; Goreish, H H; Kirkwood, L C; Tolhurst, L A; Stratford, P W

    2001-01-01

    2-Methacryloyloxyethyl phosphorylcholine (MPC) was synthesised and then used in the preparation of crosslinked polymer membranes with lauryl methacrylate, hydroxypropyl methacrylate and trimethoxysilylpropyl methacrylate (crosslinker) comonomers. Some physical aspects of the membrane properties were evaluated in order to establish the basis for the synthesis of a series of post-crosslinkable polymers. These materials were made by copolymerisation of the constituent monomers via a free radical method, and characterised using NMR, FT-IR, viscometry and elemental analysis. The optimum crosslink density and conditions required for curing coatings of these polymers were investigated using atomic force microscopy (AFM) and showed the inclusion of 5 mol% silyl crosslinking agent to be ideal. A nanoindentation technique was employed to determine if the coating developed elasticity upon crosslinking. The biological properties of the coatings were evaluated using a variety of protein adsorption assays and blood contacting experiments, and an enzyme immunoassay was developed to detect E. coli in order to assess the level of bacterial adhesion to these biomaterials. Polymers of this type were shown to be very useful as coating materials for improving the biocompatibility of, or reducing the levels of adherent bacteria to medical devices.

  8. DISILICIDE BASE REFRACTORY METAL COATINGS IN SPACE ENVIRONMENT

    Energy Technology Data Exchange (ETDEWEB)

    Bocarsly, Sidney I.

    1963-03-15

    Studies of probable effects of space environment exposure of Durak B'' (a Chromizing Corp. proprietary disilicide coating) coated Mo are described. It was concluded that, in a high-temperature environment, solar radiation will not affect the material system. Sputtering will not cause a structural problem, but it may cause a change in optical properties. Meteoroids may cause coating spalling and minimum to possibly total failure. Some protection system will probably be necessary. Vacuum will cause some coating evaporation. The rate will be temperature-dependent and probably of a low order. The possible problem area is that the evaporation appears to occur preferentially at crack sites. Ionized nitrogen and hydrogen may react with the coating and charge physical or mechanical properties. (A.G.W.)

  9. GOLD's coating and testing facilities for ISSIS-WSO

    Science.gov (United States)

    Larruquert, Juan I.; Méndez, José Antonio; Aznárez, José Antonio; Vidal-Dasilva, Manuela; García-Cortés, Sergio; Rodríguez-de Marcos, Luis; Fernández-Perea, Mónica

    2011-09-01

    ISSIS imager has been thought as an open purpose instrument within the World Space Observatory (WSO) international space mission. The highest priorities of ISSIS, an instrument to be developed by Spain, are to guarantee high spatial resolution and high sensitivity down to the far ultraviolet (FUV). The paper displays the capacities of GOLD for multilayer deposition and FUV reflectometry, among other metrologies, for ISSIS optical elements. Deposition of coatings for ISSIS-WSO will be carried out in a new UHV system with a 75-cm diameter deposition chamber. The purpose of the new laboratory is the deposition of coatings satisfying the constraints for FUV space optics. The first target coating to be developed in this new laboratory is Al protected with MgF2, with optimum reflectance down to ˜120 nm. GOLD's existing reflectometer is able to characterize flat pieces both by transmittance and reflectance, and the latter from near-normal to grazing incidence, in the range from 12 to 200 nm. Other metrologies that will be available at GOLD for ISSIS's coatings and filters include optical thickness of filters to assure parfocality, filter wedge, and coating and filter scattering.

  10. Membrane-bound conformation of M13 major coat protein : a structure validation through FRET-derived constraints

    NARCIS (Netherlands)

    Vos, W.L.; Koehorst, R.B.M.; Spruijt, R.B.; Hemminga, M.A.

    2005-01-01

    M13 major coat protein, a 50-amino-acid-long protein, was incorporated into DOPC/DOPG (80/20 molar ratio) unilamellar vesicles. Over 60% of all amino acid residues was replaced with cysteine residues, and the single cysteine mutants were labeled with the fluorescent label I-AEDANS. The coat protein

  11. Bacterial adherence on fluorinated carbon based coatings deposited on polyethylene surfaces

    International Nuclear Information System (INIS)

    Terriza, A; Del Prado, G; Perez, A Ortiz; Martinez, M J; Puertolas, J A; Manso, D Molina; Gonzalez-Elipe, A R; Yubero, F; Barrena, E Gomez; Esteban, J

    2010-01-01

    Development of intrinsically antibacterial surfaces is of key importance in the context of prostheses used in orthopaedic surgery. In this work we present a thorough study of several plasma based coatings that may be used with this functionality: diamond like carbon (DLC), fluorine doped DLC (F-DLC) and a high fluorine content carbon-fluor polymer (CF X ). The study correlates the surface chemistry and hydrophobicity of the coating surfaces with their antibacterial performance. The coatings were deposited by RF-plasma assisted deposition at room temperature on ultra high molecular weight polyethylene (UHMWPE) samples. Fluorine content and relative amount of C-C and C-F bond types was monitored by X-ray photoelectron spectroscopy and hydrophobicity by water contact angle measurements. Adherence of Staphylococcus aureus and Staphylococcus epidermidis to non-coated and coated UHMWPE samples was evaluated. Comparisons of the adherence performance were evaluated using a paired t test (two materials) and a Kruskall Wallis test (all the materials). S. aureus was statistically significant (p< 0.001) less adherent to DLC and F-DLC surfaces than S. epidermidis. Both bacteria showed reduction of adherence on DLC/UHMWPE. For S. aureus, reduction of bacterial adherence on F-DLC/UHMWPE was statistically significant respect to all other materials.

  12. Identifying the optimal HVOF spray parameters to attain minimum porosity and maximum hardness in iron based amorphous metallic coatings

    Directory of Open Access Journals (Sweden)

    S. Vignesh

    2017-04-01

    Full Text Available Flow based Erosion – corrosion problems are very common in fluid handling equipments such as propellers, impellers, pumps in warships, submarine. Though there are many coating materials available to combat erosion–corrosion damage in the above components, iron based amorphous coatings are considered to be more effective to combat erosion–corrosion problems. High velocity oxy-fuel (HVOF spray process is considered to be a better process to coat the iron based amorphous powders. In this investigation, iron based amorphous metallic coating was developed on 316 stainless steel substrate using HVOF spray technique. Empirical relationships were developed to predict the porosity and micro hardness of iron based amorphous coating incorporating HVOF spray parameters such as oxygen flow rate, fuel flow rate, powder feed rate, carrier gas flow rate, and spray distance. Response surface methodology (RSM was used to identify the optimal HVOF spray parameters to attain coating with minimum porosity and maximum hardness.

  13. Constraint-based Student Modelling in Probability Story Problems with Scaffolding Techniques

    Directory of Open Access Journals (Sweden)

    Nabila Khodeir

    2018-01-01

    Full Text Available Constraint-based student modelling (CBM is an important technique employed in intelligent tutoring systems to model student knowledge to provide relevant assistance. This paper introduces the Math Story Problem Tutor (MAST, a Web-based intelligent tutoring system for probability story problems, which is able to generate problems of different contexts, types and difficulty levels for self-paced learning. Constraints in MAST are specified at a low-level of granularity to allow fine-grained diagnosis of the student error. Furthermore, MAST extends CBM to address errors due to misunderstanding of the narrative story. It can locate and highlight keywords that may have been overlooked or misunderstood leading to an error. This is achieved by utilizing the role of sentences and keywords that are defined through the Natural Language Generation (NLG methods deployed in the story problem generation. MAST also integrates CBM with scaffolding questions and feedback to provide various forms of help and guidance to the student. This allows the student to discover and correct any errors in his/her solution. MAST has been preliminary evaluated empirically and the results show the potential effectiveness in tutoring students with a decrease in the percentage of violated constraints along the learning curve. Additionally, there is a significant improvement in the results of the post–test exam in comparison to the pre-test exam of the students using MAST in comparison to those relying on the textbook

  14. Gamblers anonymous and cognitive-behavioral therapies for pathological gamblers.

    Science.gov (United States)

    Petry, Nancy M

    2005-01-01

    Numerous types of treatments for pathological gambling have been described, but two of the most common are Gamblers Anonymous (GA) and cognitive-behavioral therapy. This paper describes some outcome data associated with the two approaches. It also reviews evidence suggesting that a combined intervention may enhance therapy engagement and reduce relapse rates.

  15. Secure anonymous mutual authentication for star two-tier wireless body area networks.

    Science.gov (United States)

    Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga

    2016-10-01

    Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is

  16. ASPIRE: An Authoring System and Deployment Environment for Constraint-Based Tutors

    Science.gov (United States)

    Mitrovic, Antonija; Martin, Brent; Suraweera, Pramuditha; Zakharov, Konstantin; Milik, Nancy; Holland, Jay; McGuigan, Nicholas

    2009-01-01

    Over the last decade, the Intelligent Computer Tutoring Group (ICTG) has implemented many successful constraint-based Intelligent Tutoring Systems (ITSs) in a variety of instructional domains. Our tutors have proven their effectiveness not only in controlled lab studies but also in real classrooms, and some of them have been commercialized.…

  17. Optimization of cardiovascular stent against restenosis: factorial design-based statistical analysis of polymer coating conditions.

    Directory of Open Access Journals (Sweden)

    Gayathri Acharya

    Full Text Available The objective of this study was to optimize the physicodynamic conditions of polymeric system as a coating substrate for drug eluting stents against restenosis. As Nitric Oxide (NO has multifunctional activities, such as regulating blood flow and pressure, and influencing thrombus formation, a continuous and spatiotemporal delivery of NO loaded in the polymer based nanoparticles could be a viable option to reduce and prevent restenosis. To identify the most suitable carrier for S-Nitrosoglutathione (GSNO, a NO prodrug, stents were coated with various polymers, such as poly (lactic-co-glycolic acid (PLGA, polyethylene glycol (PEG and polycaprolactone (PCL, using solvent evaporation technique. Full factorial design was used to evaluate the effects of the formulation variables in polymer-based stent coatings on the GSNO release rate and weight loss rate. The least square regression model was used for data analysis in the optimization process. The polymer-coated stents were further assessed with Differential scanning calorimetry (DSC, Fourier transform infrared spectroscopy analysis (FTIR, Scanning electron microscopy (SEM images and platelet adhesion studies. Stents coated with PCL matrix displayed more sustained and controlled drug release profiles than those coated with PLGA and PEG. Stents coated with PCL matrix showed the least platelet adhesion rate. Subsequently, stents coated with PCL matrix were subjected to the further optimization processes for improvement of surface morphology and enhancement of the drug release duration. The results of this study demonstrated that PCL matrix containing GSNO is a promising system for stent surface coating against restenosis.

  18. Materials interaction tests to identify base and coating materials for an enhanced in-vessel core catcher design

    Energy Technology Data Exchange (ETDEWEB)

    Rempe, J.L.; Knudson, D.L.; Condie, K.G.; Swank, W.D. [Idaho National Engineering and Environmental Laboratory, Idaho Falls ID (United States); Cheung, F.B. [Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park PA (United States); Suh, K.Y. [Seoul National University, Department of Nuclear Engineering, Seoul (Korea, Republic of); Kim, S.B. [Korea Atomic Energy Research Institute, Severe Accident Research Project, Taejon (Korea, Republic of)

    2004-07-01

    An enhanced in-vessel core catcher is being designed and evaluated, it must ensure In-Vessel Retention of core materials that may relocate under severe accident conditions in advanced reactors. To reduce cost and simplify manufacture and installation, this new core catcher design consists of several interlocking sections that are machined to fit together when inserted into the lower head. If needed, the core catcher can be manufactured with holes to accommodate lower head penetrations. Each section of the core catcher consists of two material layers with an option to add a third layer (if deemed necessary): a base material, which has the capability to support and contain the mass of core materials that may relocate during a severe accident; an insulating oxide coating material on top of the base material, which resists interactions with high-temperature core materials; and an optional coating on the bottom side of the base material to prevent any potential oxidation of the base material during the lifetime of the reactor. Initial evaluations suggest that a thermally-sprayed oxide material is the most promising candidate insulator coating for a core catcher. Tests suggest that 2 coatings can provide adequate protection to a stainless steel core catcher: -) a 500 {mu}m thick zirconium dioxide coating over a 100-200 {mu}m Inconel 718 bond coating, and -) a 500 {mu}m thick magnesium zirconate coating.

  19. The adhesion performance of epoxy coating on AA6063 treated in Ti/Zr/V based solution

    International Nuclear Information System (INIS)

    Zhu, Wen; Li, Wenfang; Mu, Songlin; Yang, Yunyu; Zuo, Xi

    2016-01-01

    Highlights: • A non-chrome titanium/zirconium/vanadium-based (Ti/Zr/V) conversion coating is prepared on AA6063 at room temperature. • The Ti/Zr/V conversion coating is produced on AA6063 within 50 s. • The adhesion strength between epoxy coating and AA6063 is improved significantly after the Ti/Zr/V conversion treatment. - Abstract: An environment-friendly titanium/zirconium/vanadium-based (Ti/Zr/V) conversion coating was prepared on aluminum alloy 6063 (AA6063). The epoxy powder coatings were applied on the AA6063 samples with/without Ti/Zr/V conversion coatings via electrostatic spraying. The morphology and composition of the conversion coating were studied by scanning electron microscope (SEM) and X-ray photoelectron spectroscopy (XPS), respectively. The surface free energy components of AA6063 samples were measured by a static contact angle measuring device with Owens method. The adhesion properties of the epoxy coating on AA6063 treated with different conversion times were evaluated using a pull-off tester. The Ti/Zr/V conversion coating was mainly composed of metal oxide (TiO 2 , ZrO 2 , V 2 O 5 , Al 2 O 3 , etc.), metal fluoride (ZrF 4 , AlF 3 , etc.) and metal organic complex. The formation time of this conversion coating was reduced to 50 s. After such surface treatment, the samples' surface roughness was increased and the contact angle with water was decreased. Both the surface free energy and the work of adhesion were increased. The adhesion strength between the epoxy coating and AA6063 was enhanced significantly.

  20. High performance bio-based thermosets for composites and coatings

    Science.gov (United States)

    Paramarta, Adlina Ambeg

    In the recent decade, there has been increasing interest in using renewable feedstocks as chemical commodities for composites and coatings application. Vegetable oils are promising renewable resources due to their wide availability with affordable cost. In fact, the utilization of vegetable oils to produce composite and coatings products has been around for centuries; linseed oil was widely used for wide variety of paints. However, due to its chemical structure, the application of vegetable oils for high-performance materials is limited; and thus chemical modification is necessary. One of the modification approaches is by substituting the glycerol core in the triglycerides with sucrose to form sucrose esters of vegetable oil fatty acids, in which this resin possesses a higher number of functional group per molecule and a more rigid core. In this research, thermosets of highly functionalized sucrose esters of vegetable oils were developed. Two crosslinking methods of epoxidized surcrose soyate (ESS) resins were explored: direct polymerization with anhydride moieties for composite applications and Michael-addition reaction of acrylated-epoxidized sucrose soyate (AESS) for coatings applications. In the first project, it was shown that the reaction kinetics, thermal and mechanical properties of the materials can be tuned by varying the molar ratio between the epoxide and anhydride, plus the type and amount of catalyst. Furthermore, the toughness properties of the ESS-based thermosets can be improved by changing the type of anhydride crosslinkers and incorporating secondary phase rubbers. Then, in the second system, the epoxy functionality in the ESS was converted into acrylate group, which then crosslinked with amine groups through the Michael-addition reaction to produce coatings systems. The high number of functional groups and the fast reactivity of the crosslinker results in coatings that can be cured at ambient temperature, yet still possess moderately high glass

  1. FIRE-RESISTANT SHIELDING COATING BASED ON SHUNGITE-CONTAINING PAINT

    Directory of Open Access Journals (Sweden)

    BELOUSOVA Elena Sergeevna

    2013-08-01

    Full Text Available Today when specific shielded facilities are designed the construction materials and shields should meet a range of fire safety requirements. A composite coating on the basis of a water-based fire-resistant paint filled with shungite nanopowder can be applied onto walls, floors, ceilings and other surfaces in the shielded areas to reduce electromagnetic radiation and simultaneously to ensure fire safety. Shungit is a mineral with multilayer carbon fullerene globules which diameter is 10–30 nm. Due to the high conductivity shungite is able to weaken electromagnetic radiation. A coating made of schungite-containing paint on a cellulose substrate was subjected to the open flame under the temperature of 1700° C for 3 minutes and 40 seconds. That resulted in the formation of insulating foam layer without mechanical damage of the substrate. The XRD diffraction analysis of the powder obtained in the process of flame influence on the coating showed the formation of the such substances as orthoclase, barite, rutile, etc. Carbon contained in shungit and used as a filler for the fireproof paint wasn’t detected. This fact indicates carbon oxidation as the result of its burning out. The shielding efficiency of the composite coating after open flame exposure was measured for the frequency range 8…12 GHz with the use of the panoramic attenuation meter and voltage standing wave ratio meter YA2R-67-61 with a sweep generator and waveguides. After that the reflection and transmission coefficients were calculated. The results of measurements and calculations showed decrease of the reflection and transmission coefficients due to conductivity decrease and dielectric losses changes of the composite coating provided by silica content increase and carbon percentage decrease.

  2. Impact of dilution on the microstructure and properties of Ni-based 625 alloy coatings

    Directory of Open Access Journals (Sweden)

    Tiago Jose Antoszczyszyn

    2014-06-01

    Full Text Available Nickel-based alloy IN 625 is used to protect components of aircrafts, power generation and oil refinery due to an association of toughness and high corrosion resistance. These properties are associated with the chemical composition and microstructure of coatings which depend on the processing parameters and the composition of the component being protected. This paper assessed impact of dilution on the microstructure and properties of the Ni alloy IN 625 deposited by Plasma Transferred Arc (PTA on two substrates: carbon steel API 5L and stainless steel AISI 316L. Differences due to the interaction with the substrate were maximized analyzing single layer coatings, processed with three deposition current: 120, 150 and 180 A. Correlation with a cast Nickel-based alloy sample contributed to assess the impact of dilution on coatings. Dilution was determined by the area ratio and Vickers hardness measured on the transverse section of coatings. Scanning electron and Laser confocal microscopy and X-ray diffraction analysis were carried out to characterize the microstructure. Results indicated the increasing dilution with the deposition current was deeply influenced by the substrate. Dilution ranging from 5 to 29% was measured on coatings processed on the API 5L steel and from 22 to 51% on the low thermal conductivity AISI 316L steel substrate. Differences on the microstructure and properties of coatings can be associated with the interaction with each substrate. Higher fraction of carbides account for the higher coating hardness when processing on API 5L whereas the low thermal conductivity of AISI 316L and the higher Fe content in solid solution contributed to the lower hardness of coatings.

  3. A high performance ceria based interdiffusion barrier layer prepared by spin-coating

    DEFF Research Database (Denmark)

    Plonczak, Pawel; Joost, Mario; Hjelm, Johan

    2011-01-01

    A multiple spin-coating deposition procedure of Ce0.9Gd0.1O1.95 (CGO) for application in solid oxide fuel cells (SOFCs) was developed. The thin and dense CGO layer can be employed as a barrier layer between yttria stabilised zirconia (YSZ) electrolyte and a (La, Sr)(Co, Fe)O3 based cathode....... The decomposition of the polymer precursor used in the spin-coating process was studied. The depositions were performed on anode supported half cells. By controlling the sintering temperature between each spin-coating process, dense and crack-free CGO films with a thickness of approximately 1 μm were obtained....... The successive steps of dense layer production was investigated by scanning electron microscopy. X-ray diffraction was employed to monitor the crystal structure of the CGO layer sintered at different temperatures. The described spin coated barrier layer was evaluated using an anode supported cell...

  4. Biodegradable, elastomeric coatings with controlled anti-proliferative agent release for magnesium-based cardiovascular stents.

    Science.gov (United States)

    Gu, Xinzhu; Mao, Zhongwei; Ye, Sang-Ho; Koo, Youngmi; Yun, Yeoheung; Tiasha, Tarannum R; Shanov, Vesselin; Wagner, William R

    2016-08-01

    Vascular stent design continues to evolve to further improve the efficacy and minimize the risks associated with these devices. Drug-eluting coatings have been widely adopted and, more recently, biodegradable stents have been the focus of extensive evaluation. In this report, biodegradable elastomeric polyurethanes were synthesized and applied as drug-eluting coatings for a relatively new class of degradable vascular stents based on Mg. The dynamic degradation behavior, hemocompatibility and drug release were investigated for poly(carbonate urethane) urea (PCUU) and poly(ester urethane) urea (PEUU) coated magnesium alloy (AZ31) stents. Poly(lactic-co-glycolic acid) (PLGA) coated and bare stents were employed as control groups. The PCUU coating effectively slowed the Mg alloy corrosion in dynamic degradation testing compared to PEUU-coated, PLGA-coated and bare Mg alloy stents. This was confirmed by electron microscopy, energy-dispersive x-ray spectroscopy and magnesium ion release experiments. PCUU-coating of AZ31 was also associated with significantly reduced platelet adhesion in acute blood contact testing. Rat vascular smooth muscle cell (rSMC) proliferation was successfully inhibited when paclitaxel was released from pre-loaded PCUU coatings. The corrosion retardation, low thrombogenicity, drug loading capacity, and high elasticity make PCUU an attractive option for drug eluting coating on biodegradable metallic cardiovascular stents. Copyright © 2016 Elsevier B.V. All rights reserved.

  5. Effects of Polysaccharide-Based Edible Coatings on Quality and Antioxidant Enzyme System of Strawberry during Cold Storage

    Directory of Open Access Journals (Sweden)

    Li Li

    2017-01-01

    Full Text Available Strawberry is a nutritious, but highly perishable fruit. Three polysaccharide-based edible coatings (alginate, chitosan, and pullulan were applied to postharvest strawberry fruit during cold storage (4°C, and their effects on fruit quality and antioxidant enzyme system were investigated in the present study. The results showed that polysaccharide coatings showed a significant delay in fruit softening and rot and reduced changes in total soluble solid and titratable acidity content during 16 d storage. Polysaccharide coatings also maintained higher ascorbic acid and total phenolic contents than control from day 2 and significantly inhibited fruit decay and respiration after 12 d storage (p<0.05. Polysaccharide treatments enhanced the activities of antioxidant enzymes (peroxidase, catalase, superoxide dismutase, and ascorbate peroxidase so as to prevent lipid peroxidation and reduce membrane damage. Additionally, chitosan coating had the most positive effects on fruit quality amongst three polysaccharide-based edible coatings and presented the highest relative activities of antioxidant enzymes. These results indicated that polysaccharide-based edible coatings were helpful in postharvest quality maintenance of strawberry fruit.

  6. Effect of Silicon Addition on Microstructure and Mechanical Properties of Chromium and Titanium Based Coatings

    Directory of Open Access Journals (Sweden)

    Luis Carlos Ardila-Téllez

    2014-07-01

    Full Text Available The changes in the microstructure, mechanical properties and residual stresses of AlTiN, AlTiSiN, AlCrN and AlCrSiN coatings, has been studied before and after annealing at 900 ºC and 1100 ºC, using scanning and transmission electron microscopy, along with nano-indentation and X-ray diffraction techniques. The As-deposited coatings show a columnar structure, with a crystallite size between 18 nm and 28 nm. Despite the silicon addition, no effect on the crystallite size refinement was observed.However, the addition of silicon increases hardness, elastic modulus and compressive residual stresses. After annealing at 900 ºC, the crystallite size growth and the residual stress relaxes; therefore, the coating hardness decreases. At 1100 ºC, the oxide layers formed in AlTiN and AlTiSiN, which act as protective layers enhancing oxidation resistance; meanwhile, a complete oxidation of AlCrN and AlCrSiN coatings take place. The Titanium based coatings present some superior mechanical properties and oxidation resistance than the chromium based coatings at 900 ºC and 1100 ºC.

  7. Novel epoxy-benzoxazine water-based emulsions with reactive benzoxazine surfactants for coatings

    Directory of Open Access Journals (Sweden)

    M. Krajnc

    2014-08-01

    Full Text Available Novel epoxy-benzoxazine emulsions designed for water-based coatings were prepared and investigated. Bisphenol A-based epoxy resins with molar weights of 340, 377 and 1750 g/mol along with epoxidized soybean oil were emulsified using mono- and bi-functional benzoxazine surfactants, which are able to react with epoxy resins at their cure temperature. The structure of synthesized surfactants carrying one or two polyether chains was confirmed using Fourier transform infrared spectroscopy, 1H nuclear magnetic resonance and differential scanning calorimetry. Stability of emulsions was verified by particle diameters measurements. Coatings, made directly from emulsions, were dried and cured at elevated temperature using 3,3'-dimetoxybenzidine as curing agent to ensure a highly cross-linked structure of thermosetting films. Curing process, thermal properties and hardness of cured films were investigated. It was found that benzoxazine molecules were well incorporated into the epoxy network upon curing, which ensures no void structure of cured copolymer and enhanced coating properties.

  8. Application of the Theory of Constraints in Project Based Structures

    Directory of Open Access Journals (Sweden)

    Martynas Sarapinas

    2011-04-01

    Full Text Available The article deals with the application of the Theory of Constraints (TOC in project management. This article involves a short introduction to TOC as a project management method and deep analysis of project management specialties using the TOC: TOC based project planning, timetable management, tasks synchronization, project control and “relay runner work ethic”. Moreover, the article describes traditional and TOC based project management theories in their comparison, and emphasize the main benefits we received as the results of the study. Article in Lithuanian

  9. Nano-anisotropic surface coating based on drug immobilized pendant polymer to suppress macrophage adhesion response.

    Science.gov (United States)

    Kaladhar, K; Renz, H; Sharma, C P

    2015-04-01

    Exploring drug molecules for material design, to harness concepts of nano-anisotropy and ligand-receptor interactions, are rather elusive. The aim of this study is to demonstrate the bottom-up design of a single-step and bio-interactive polymeric surface coating, based on drug based pendant polymer. This can be applied on to polystyrene (PS) substrates, to suppress macrophage adhesion and spreading. The drug molecule is used in this coating for two purposes. The first one is drug as a "pendant" group, to produce nano-anisotropic properties that can enable adhesion of the coatings to the substrate. The second purpose is to use the drug as a "ligand", to produce ligand-receptor interaction, between the bound ligand and receptors of albumin, to develop a self-albumin coat over the surface, by the preferential binding of albumin in biological environment, to reduce macrophage adhesion. Our in silico studies show that, diclofenac (DIC) is an ideal drug based "ligand" for albumin. This can also act as a "pendant" group with planar aryl groups. The combination of these two factors can help to harness, both nano-anisotropic properties and biological functions to the polymeric coating. Further, the drug, diclofenac (DIC) is immobilized to the polyvinyl alcohol (PVA), to develop the pendant polymer (PVA-DIC). The interaction of bound DIC with the albumin is a ligand-receptor based interaction, as per the studies by circular dichroism, differential scanning calorimetry, and SDS-PAGE. The non-polar π-π* interactions are regulating; the interactions between PVA bound DIC-DIC interactions, leading to "nano-anisotropic condensation" to form distinct "nano-anisotropic segments" inside the polymeric coating. This is evident from, the thermo-responsiveness and uniform size of nanoparticles, as well as regular roughness in the surface coating, with similar properties as that of nanoparticles. In addition, the hydrophobic DIC-polystyrene (PS) interactions, between the PVA

  10. Creativity from Constraints in Engineering Design

    DEFF Research Database (Denmark)

    Onarheim, Balder

    2012-01-01

    This paper investigates the role of constraints in limiting and enhancing creativity in engineering design. Based on a review of literature relating constraints to creativity, the paper presents a longitudinal participatory study from Coloplast A/S, a major international producer of disposable...... and ownership of formal constraints played a crucial role in defining their influence on creativity – along with the tacit constraints held by the designers. The designers were found to be highly constraint focused, and four main creative strategies for constraint manipulation were observed: blackboxing...

  11. Constrained sintering of an air-plasma-sprayed thermal barrier coating

    International Nuclear Information System (INIS)

    Cocks, A.C.F.; Fleck, N.A.

    2010-01-01

    A micromechanical model is presented for the constrained sintering of an air-plasma-sprayed, thermal barrier coating upon a thick superalloy substrate. The coating comprises random splats with intervening penny-shaped cracks. The crack faces make contact at asperities, which progressively sinter in-service by interfacial diffusion, accommodated by bulk creep. Diffusion is driven by the reduction in interfacial energy at the developing contacts and by the local asperity contact stress. At elevated operating temperature, both sintering and creep strains accumulate within the plane of the coating. The sensitivities of sintering rate and microstructure evolution rate to the kinetic parameters and thermodynamic driving forces are explored. It is demonstrated that the sintering response is governed by three independent timescales, as dictated by the material and geometric properties of the coating. Finally, the role of substrate constraint is assessed by comparing the rate of constrained sintering with that for free sintering.

  12. Anonymously Productive and Socially Engaged While Learning at Work

    Science.gov (United States)

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  13. Towards Predicting Efficient and Anonymous Tor Circuits

    OpenAIRE

    Barton, Armon; Imani, Mohsen; Ming, Jiang; Wright, Matthew

    2018-01-01

    The Tor anonymity system provides online privacy for millions of users, but it is slower than typical web browsing. To improve Tor performance, we propose PredicTor, a path selection technique that uses a Random Forest classifier trained on recent measurements of Tor to predict the performance of a proposed path. If the path is predicted to be fast, then the client builds a circuit using those relays. We implemented PredicTor in the Tor source code and show through live Tor experiments and Sh...

  14. Poly(hydroxyalkanoate)s-Based Hydrophobic Coatings for the Protection of Stone in Cultural Heritage.

    Science.gov (United States)

    Andreotti, Serena; Franzoni, Elisa; Fabbri, Paola

    2018-01-20

    Reversibility is a mandatory requirement for materials used in heritage conservation, including hydrophobic protectives. Nevertheless, current protectives for stone are not actually reversible as they remain on the surfaces for a long time after their hydrophobicity is lost and can hardly be removed. Ineffective and aged coatings may jeopardise the stone re-treatability and further conservation interventions. This paper aims at investigating the performance of PHAs-based coatings for stone protection, their main potential being the 'reversibility by biodegradation' once water repellency ended. The biopolymer coatings were applied to three different kinds of stone, representative of lithotypes used in historic architecture: sandstone, limestone and marble. Spray, poultice and dip-coating were tested as coating techniques. The effectiveness and compatibility of the protectives were evaluated in terms of capillary water absorption, static and dynamic contact angles, water vapour diffusion, colour alteration and surface morphology. The stones' wettability after application of two commercial protectives was investigated too, for comparison. Finally, samples were subjected to artificial ageing to investigate their solar light stability. Promising results in terms of efficacy and compatibility were obtained, although the PHAs-based formulations developed here still need improvement for increased durability and on-site applicability.

  15. High Temperature coatings based on β-NiAI

    Energy Technology Data Exchange (ETDEWEB)

    Severs, Kevin [Iowa State Univ., Ames, IA (United States)

    2012-01-01

    High temperature alloys are reviewed, focusing on current superalloys and their coatings. The synthesis, characerization, and oxidation performance of a NiAl–TiB2 composite are explained. A novel coating process for Mo–Ni–Al alloys for improved oxidation performance is examined. The cyclic oxidation performance of coated and uncoated Mo–Ni–Al alloys is discussed.

  16. Robust anonymous authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  17. Friction and wear behaviour of Mo-W doped carbon-based coating during boundary lubricated sliding

    Science.gov (United States)

    Hovsepian, Papken Eh.; Mandal, Paranjayee; Ehiasarian, Arutiun P.; Sáfrán, G.; Tietema, R.; Doerwald, D.

    2016-03-01

    A molybdenum and tungsten doped carbon-based coating (Mo-W-C) was developed in order to provide low friction in boundary lubricated sliding condition at ambient and at high temperature. The Mo-W-C coating showed the lowest friction coefficient among a number of commercially available state-of-the-art DLC coatings at ambient temperature. At elevated temperature (200 °C), Mo-W-C coating showed a significant reduction in friction coefficient with sliding distance in contrast to DLC coatings. Raman spectroscopy revealed the importance of combined Mo and W doping for achieving low friction at both ambient and high temperature. The significant decrease in friction and wear rate was attributed to the presence of graphitic carbon debris (from coating) and 'in situ' formed metal sulphides (WS2 and MoS2, where metals were supplied from coating and sulphur from engine oil) in the transfer layer.

  18. Constraint-Based Abstraction of a Model Checker for Infinite State Systems

    DEFF Research Database (Denmark)

    Banda, Gourinath; Gallagher, John Patrick

    Abstract interpretation-based model checking provides an approach to verifying properties of infinite-state systems. In practice, most previous work on abstract model checking is either restricted to verifying universal properties, or develops special techniques for temporal logics such as modal t...... to implementation of abstract model checking algorithms for abstract domains based on constraints, making use of an SMT solver....

  19. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  20. Overlay metallic-cermet alloy coating systems

    International Nuclear Information System (INIS)

    Gedwill, M.A.; Glasgow, T.K.; Levine, S.R.

    1982-01-01

    A substrate, such as a turbine blade, vane, or the like, which is subjected to high temperature use is coated with a base coating of an oxide dispersed, metallic alloy (cermet). A top coating of an oxidation, hot corrosion, erosion resistant alloy of nickel, cobalt, or iron is then deposited on the base coating. A heat treatment is used to improve the bonding. The base coating serves as an inhibitor to interdiffusion between the protective top coating and the substrate. Otherwise, the protective top coating would rapidly interact detrimentally with the substrate and degrade by spalling of the protective oxides formed on the outer surface at elevated temperatures