WorldWideScience

Sample records for rc5 block cipher

  1. An enhanced chaotic key-based RC5 block cipher adapted to image encryption

    Science.gov (United States)

    Faragallah, Osama S.

    2012-07-01

    RC5 is a block cipher that has several salient features such as adaptability to process different word lengths with a variable block size, a variable number of rounds and a variable-length secret key. However, RC5 can be broken with various attacks such as correlation attack, timing attack, known plaintext correlation attack and differential attacks, revealing weak security. We aimed to enhance the RC5 block cipher to be more secure and efficient for real-time applications while preserving its advantages. For this purpose, this article introduces a new approach based on strengthening both the confusion and diffusion operations by combining chaos and cryptographic primitive operations to produce round keys with better pseudo-random sequences. Comparative security analysis and performance evaluation of the enhanced RC5 block cipher (ERC5) with RC5, RC6 and chaotic block cipher algorithm (CBCA) are addressed. Several test images are used for inspecting the validity of the encryption and decryption algorithms. The experimental results show the superiority of the suggested enhanced RC5 (ERC5) block cipher to image encryption algorithms such as RC5, RC6 and CBCA from the security analysis and performance evaluation points of view.

  2. Implementation of RC5 and RC6 block ciphers on digital images

    International Nuclear Information System (INIS)

    Belhaj Mohamed, A.; Zaibi, G.; Kachouri, A.

    2011-01-01

    With the fast evolution of the networks technology, the security becomes an important research axis. Many types of communication require the transmission of digital images. This transmission must be safe especially in applications that require a fairly high level of security such as military applications, spying, radars, and biometrics applications. Mechanisms for authentication, confidentiality, and integrity must be implemented within their community. For this reason, several cryptographic algorithms have been developed to ensure the safety and reliability of this transmission. In this paper, we investigate the encryption efficiency of RC5 and RC6 block cipher applied to digital images by including a statistical and differential analysis then, and also we investigate those two block ciphers against errors in ambient noise. The security analysis shows that RC6 algorithm is more secure than RC5. However, using RC6 to encrypt images in rough environment (low signal to noise ratio) leads to more errors (almost double of RC5) and may increase energy consumption by retransmitting erroneous packets. A compromise security/energy must be taken into account for the good choice of encryption algorithm.

  3. Block Cipher Analysis

    DEFF Research Database (Denmark)

    Miolane, Charlotte Vikkelsø

    ensurethat no attack violatesthe securitybounds specifiedbygeneric attack namely exhaustivekey search and table lookup attacks. This thesis contains a general introduction to cryptography with focus on block ciphers and important block cipher designs, in particular the Advanced Encryption Standard(AES...... on small scale variants of AES. In the final part of the thesis we present a new block cipher proposal Present and examine its security against algebraic and differential cryptanalysis in particular....

  4. Cryptanalysis of Selected Block Ciphers

    DEFF Research Database (Denmark)

    Alkhzaimi, Hoda A.

    , pseudorandom number generators, and authenticated encryption designs. For this reason a multitude of initiatives over the years has been established to provide a secure and sound designs for block ciphers as in the calls for Data Encryption Standard (DES) and Advanced Encryption Standard (AES), lightweight...... ciphers initiatives, and the Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR). In this thesis, we first present cryptanalytic results on different ciphers. We propose attack named the Invariant Subspace Attack. It is utilized to break the full block cipher...

  5. Secure Block Ciphers - Cryptanalysis and Design

    DEFF Research Database (Denmark)

    Tiessen, Tyge

    be applied to the AES can be transferred to this block cipher, albeit with a higher attack complexity. The second publication introduces a new block cipher family which is targeted for new applications in fully homomorphic encryption and multi-party computation. We demonstrate the soundness of the design...... is encrypted using so-called symmetric ciphers. The security of our digital infrastructure thus rests at its very base on their security. The central topic of this thesis is the security of block ciphers – the most prominent form of symmetric ciphers. This thesis is separated in two parts. The first part...... is an introduction to block ciphers and their cryptanalysis, the second part contains publications written and published during the PhD studies. The first publication evaluates the security of a modification of the AES in which the choice of S-box is unknown to the attacker. We find that some of the attacks that can...

  6. Round Gating for Low Energy Block Ciphers

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco

    2016-01-01

    design techniques for implementing block ciphers in a low energy fashion. We concentrate on round based implementation and we discuss how gating, applied at round level can affect and improve the energy consumption of the most common lightweight block cipher currently used in the internet of things....... Additionally, we discuss how to needed gating wave can be generated. Experimental results show that our technique is able to reduce the energy consumption in most block ciphers by over 60% while incurring only a minimal overhead in hardware....

  7. Benchmarking Block Ciphers for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.

    2004-01-01

    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. We have identified the candidates of block ciphers suitable for

  8. A Novel Image Encryption Scheme Based on Intertwining Chaotic Maps and RC4 Stream Cipher

    Science.gov (United States)

    Kumari, Manju; Gupta, Shailender

    2018-03-01

    As the systems are enabling us to transmit large chunks of data, both in the form of texts and images, there is a need to explore algorithms which can provide a higher security without increasing the time complexity significantly. This paper proposes an image encryption scheme which uses intertwining chaotic maps and RC4 stream cipher to encrypt/decrypt the images. The scheme employs chaotic map for the confusion stage and for generation of key for the RC4 cipher. The RC4 cipher uses this key to generate random sequences which are used to implement an efficient diffusion process. The algorithm is implemented in MATLAB-2016b and various performance metrics are used to evaluate its efficacy. The proposed scheme provides highly scrambled encrypted images and can resist statistical, differential and brute-force search attacks. The peak signal-to-noise ratio values are quite similar to other schemes, the entropy values are close to ideal. In addition, the scheme is very much practical since having lowest time complexity then its counterparts.

  9. A MAC Mode for Lightweight Block Ciphers

    DEFF Research Database (Denmark)

    Luykx, Atul; Preneel, Bart; Tischhauser, Elmar Wolfgang

    2016-01-01

    Lightweight cryptography strives to protect communication in constrained environments without sacrificing security. However, security often conflicts with efficiency, shown by the fact that many new lightweight block cipher designs have block sizes as low as 64 or 32 bits. Such low block sizes lead...... no effect on the security bound, allowing an order of magnitude more data to be processed per key. Furthermore, LightMAC is incredibly simple, has almost no overhead over the block cipher, and is parallelizable. As a result, LightMAC not only offers compact authentication for resource-constrained platforms...

  10. Towards understanding the known-key security of block ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart

    2014-01-01

    ciphers based on ideal components such as random permutations and random functions as well as propose new generic known-key attacks on generalized Feistel ciphers. We introduce the notion of known-key indifferentiability to capture the security of such block ciphers under a known key. To show its...... meaningfulness, we prove that the known-key attacks on block ciphers with ideal primitives to date violate security under known-key indifferentiability. On the other hand, to demonstrate its constructiveness, we prove the balanced Feistel cipher with random functions and the multiple Even-Mansour cipher...... with random permutations known-key indifferentiable for a sufficient number of rounds. We note that known-key indifferentiability is more quickly and tightly attained by multiple Even-Mansour which puts it forward as a construction provably secure against known-key attacks....

  11. Hardware realization of chaos based block cipher for image encryption

    KAUST Repository

    Barakat, Mohamed L.; Radwan, Ahmed G.; Salama, Khaled N.

    2011-01-01

    Unlike stream ciphers, block ciphers are very essential for parallel processing applications. In this paper, the first hardware realization of chaotic-based block cipher is proposed for image encryption applications. The proposed system is tested for known cryptanalysis attacks and for different block sizes. When implemented on Virtex-IV, system performance showed high throughput and utilized small area. Passing successfully in all tests, our system proved to be secure with all block sizes. © 2011 IEEE.

  12. Hardware realization of chaos based block cipher for image encryption

    KAUST Repository

    Barakat, Mohamed L.

    2011-12-01

    Unlike stream ciphers, block ciphers are very essential for parallel processing applications. In this paper, the first hardware realization of chaotic-based block cipher is proposed for image encryption applications. The proposed system is tested for known cryptanalysis attacks and for different block sizes. When implemented on Virtex-IV, system performance showed high throughput and utilized small area. Passing successfully in all tests, our system proved to be secure with all block sizes. © 2011 IEEE.

  13. An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android

    Science.gov (United States)

    Budiman, M. A.; Rachmawati, D.; Parlindungan, M. R.

    2018-03-01

    MDTM is a classical symmetric cryptographic algorithm. As with other classical algorithms, the MDTM Cipher algorithm is easy to implement but it is less secure compared to modern symmetric algorithms. In order to make it more secure, a stream cipher RC4A is added and thus the cryptosystem becomes super encryption. In this process, plaintexts derived from PDFs are firstly encrypted with the MDTM Cipher algorithm and are encrypted once more with the RC4A algorithm. The test results show that the value of complexity is Θ(n2) and the running time is linearly directly proportional to the length of plaintext characters and the keys entered.

  14. Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract)

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.

    2004-01-01

    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. We have identified the candidates of block ciphers suitable for

  15. Counting equations in algebraic attacks on block ciphers

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Miolane, Charlotte Vikkelsø

    2010-01-01

    This paper is about counting linearly independent equations for so-called algebraic attacks on block ciphers. The basic idea behind many of these approaches, e.g., XL, is to generate a large set of equations from an initial set of equations by multiplication of existing equations by the variables...... in the system. One of the most difficult tasks is to determine the exact number of linearly independent equations one obtain in the attacks. In this paper, it is shown that by splitting the equations defined over a block cipher (an SP-network) into two sets, one can determine the exact number of linearly...... independent equations which can be generated in algebraic attacks within each of these sets of a certain degree. While this does not give us a direct formula for the success of algebraic attacks on block ciphers, it gives some interesting bounds on the number of equations one can obtain from a given block...

  16. Survey and Benchmark of Block Ciphers for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.

    Choosing the most storage- and energy-efficient block cipher specifically for wireless sensor networks (WSNs) is not as straightforward as it seems. To our knowledge so far, there is no systematic evaluation framework for the purpose. In this paper, we have identified the candidates of block ciphers

  17. Efficient configurations for block ciphers with unified ENC/DEC paths

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco

    2017-01-01

    by analyzing 12 circuit configurations for the Advanced Encryption Standard (AES-128) cipher and establish some design rules for energy efficiency. We then extend our analysis to several lightweight block ciphers. In the second part of the paper we also investigate area optimized circuits for combined......Block Ciphers providing the combined functionalities of encryption and decryption are required to operate in modes of operation like CBC and ELmD. Hence such architectures form critical building blocks for secure cryptographic implementations. Depending on the algebraic structure of a given cipher......, there may be multiple ways of constructing the combined encryption/decryption circuit, each targeted at optimizing lightweight design metrics like area or power etc. In this paper we look at how the choice of circuit configuration affects the energy required to perform one encryption/decryption. We begin...

  18. A new block cipher based on chaotic map and group theory

    International Nuclear Information System (INIS)

    Yang Huaqian; Liao Xiaofeng; Wong Kwokwo; Zhang Wei; Wei Pengcheng

    2009-01-01

    Based on the study of some existing chaotic encryption algorithms, a new block cipher is proposed. In the proposed cipher, two sequences of decimal numbers individually generated by two chaotic piecewise linear maps are used to determine the noise vectors by comparing the element of the two sequences. Then a sequence of decimal numbers is used to define a bijection map. The modular multiplication operation in the group Z 2 8 +1 * and permutations are alternately applied on plaintext with block length of multiples of 64 bits to produce ciphertext blocks of the same length. Analysis show that the proposed block cipher does not suffer from the flaws of pure chaotic cryptosystems.

  19. Parallelizable and Authenticated Online Ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Luykx, Atul

    2013-01-01

    Online ciphers encrypt an arbitrary number of plaintext blocks and output ciphertext blocks which only depend on the preceding plaintext blocks. All online ciphers proposed so far are essentially serial, which significantly limits their performance on parallel architectures such as modern general......-purpose CPUs or dedicated hardware.We propose the first parallelizable online cipher, COPE. It performs two calls to the underlying block cipher per plaintext block and is fully parallelizable in both encryption and decryption. COPE is proven secure against chosenplaintext attacks assuming the underlying block...... cipher is a strong PRP. Our implementation with Intel AES-NI on a Sandy Bridge CPU architecture shows that both COPE and COPA are about 5 times faster than their closest competition: TC1, TC3, and McOE-G. This high factor of advantage emphasizes the paramount role of parallelizability on up...

  20. Block cipher based on modular arithmetic and methods of information compression

    Science.gov (United States)

    Krendelev, S.; Zbitnev, N.; Shishlyannikov, D.; Gridin, D.

    2017-10-01

    The article focuses on the description of a new block cipher. Due to the heightened interest in BigData the described cipher is used to encrypt big volumes of data in cloud storage services. The main advantages of the given cipher are the ease of implementation and the possibility of probabilistic encryption. This means that the text encryption will be different when the key is the same and the data is the same. So, the strength of the encryption is improved. Additionally, the ciphered message size can be hardly predicted.

  1. Observations on the SIMON Block Cipher Family

    DEFF Research Database (Denmark)

    Kölbl, Stefan; Leander, Gregor; Tiessen, Tyge

    2015-01-01

    In this paper we analyse the general class of functions underlying the Simon block cipher. In particular, we derive efficiently computable and easily implementable expressions for the exact differential and linear behaviour of Simon-like round functions. Following up on this, we use those...

  2. Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher

    Directory of Open Access Journals (Sweden)

    Hao Chen

    2017-01-01

    Full Text Available HIGHT is a lightweight block cipher which has been adopted as a standard block cipher. In this paper, we present a bit-level algebraic fault analysis (AFA of HIGHT, where the faults are perturbed by a stealthy HT. The fault model in our attack assumes that the adversary is able to insert a HT that flips a specific bit of a certain intermediate word of the cipher once the HT is activated. The HT is realized by merely 4 registers and with an extremely low activation rate of about 0.000025. We show that the optimal location for inserting the designed HT can be efficiently determined by AFA in advance. Finally, a method is proposed to represent the cipher and the injected faults with a merged set of algebraic equations and the master key can be recovered by solving the merged equation system with an SAT solver. Our attack, which fully recovers the secret master key of the cipher in 12572.26 seconds, requires three times of activation on the designed HT. To the best of our knowledge, this is the first Trojan attack on HIGHT.

  3. Exploring Energy Efficiency of Lightweight Block Ciphers

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco

    2016-01-01

    is the encryption of one plaintext. By studying the energy consumption model of a CMOS gate, we arrive at the conclusion that the energy consumed per cycle during the encryption operation of an r-round unrolled architecture of any block cipher is a quadratic function in r. We then apply our model to 9 well known...

  4. Cryptanalysis of a chaotic block cipher with external key and its improved version

    International Nuclear Information System (INIS)

    Li Chengqing; Li Shujun; Alvarez, Gonzalo; Chen Guanrong; Lo, K.-T.

    2008-01-01

    Recently, Pareek et al. proposed a symmetric key block cipher using multiple one-dimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: (1) a number of weak keys exist; (2) some important intermediate data of the cipher are not sufficiently random; (3) the whole secret key can be broken by a known-plaintext attack with only 120 consecutive known plain-bytes in one known plaintext. In addition, it is pointed out that an improved version of the chaotic cipher proposed by Wei et al. still suffers from all the same security defects

  5. Cipher block based authentication module: A hardware design perspective

    NARCIS (Netherlands)

    Michail, H.E.; Schinianakis, D.; Goutis, C.E.; Kakarountas, A.P.; Selimis, G.

    2011-01-01

    Message Authentication Codes (MACs) are widely used in order to authenticate data packets, which are transmitted thought networks. Typically MACs are implemented using modules like hash functions and in conjunction with encryption algorithms (like Block Ciphers), which are used to encrypt the

  6. Cryptanalysis of the full Spritz stream cipher

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Isobe, Takanori

    2016-01-01

    Spritz is a stream cipher proposed by Rivest and Schuldt at the rump session of CRYPTO 2014. It is intended to be a replacement of the popular RC4 stream cipher. In this paper we propose distinguishing attacks on the full Spritz, based on a short-term bias in the first two bytes of a keystream an...

  7. Cryptanalysis of Some Lightweight Symmetric Ciphers

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed Awadelkareem Mohamed Ahmed

    In recent years, the need for lightweight encryption systems has been increasing as many applications use RFID and sensor networks which have a very low computational power and thus incapable of performing standard cryptographic operations. In response to this problem, the cryptographic community...... on a variant of PRESENT with identical round keys. We propose a new attack named the Invariant Subspace Attack that was specifically mounted against the lightweight block cipher PRINTcipher. Furthermore, we mount several attacks on a recently proposed stream cipher called A2U2....... of the international standards in lightweight cryptography. This thesis aims at analyzing and evaluating the security of some the recently proposed lightweight symmetric ciphers with a focus on PRESENT-like ciphers, namely, the block cipher PRESENT and the block cipher PRINTcipher. We provide an approach to estimate...

  8. A fast image encryption algorithm based on only blocks in cipher text

    Science.gov (United States)

    Wang, Xing-Yuan; Wang, Qian

    2014-03-01

    In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simultaneously. The cipher-text image is divided into blocks and each block has k ×k pixels, while the pixels of the plain-text are scanned one by one. Four logistic maps are used to generate the encryption key stream and the new place in the cipher image of plain image pixels, including the row and column of the block which the pixel belongs to and the place where the pixel would be placed in the block. After encrypting each pixel, the initial conditions of logistic maps would be changed according to the encrypted pixel's value; after encrypting each row of plain image, the initial condition would also be changed by the skew tent map. At last, it is illustrated that this algorithm has a faster speed, big key space, and better properties in withstanding differential attacks, statistical analysis, known plaintext, and chosen plaintext attacks.

  9. A fast image encryption algorithm based on only blocks in cipher text

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Wang Qian

    2014-01-01

    In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simultaneously. The cipher-text image is divided into blocks and each block has k ×k pixels, while the pixels of the plain-text are scanned one by one. Four logistic maps are used to generate the encryption key stream and the new place in the cipher image of plain image pixels, including the row and column of the block which the pixel belongs to and the place where the pixel would be placed in the block. After encrypting each pixel, the initial conditions of logistic maps would be changed according to the encrypted pixel's value; after encrypting each row of plain image, the initial condition would also be changed by the skew tent map. At last, it is illustrated that this algorithm has a faster speed, big key space, and better properties in withstanding differential attacks, statistical analysis, known plaintext, and chosen plaintext attacks

  10. BLOSTREAM: A HIGH SPEED STREAM CIPHER

    Directory of Open Access Journals (Sweden)

    ALI H. KASHMAR

    2017-04-01

    Full Text Available Although stream ciphers are widely utilized to encrypt sensitive data at fast speeds, security concerns have led to a shift from stream to block ciphers, judging that the current technology in stream cipher is inferior to the technology of block ciphers. This paper presents the design of an improved efficient and secure stream cipher called Blostream, which is more secure than conventional stream ciphers that use XOR for mixing. The proposed cipher comprises two major components: the Pseudo Random Number Generator (PRNG using the Rabbit algorithm and a nonlinear invertible round function (combiner for encryption and decryption. We evaluate its performance in terms of implementation and security, presenting advantages and disadvantages, comparison of the proposed cipher with similar systems and a statistical test for randomness. The analysis shows that the proposed cipher is more efficient, high speed, and secure than current conventional stream ciphers.

  11. Survey and Benchmark of Block Ciphers for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.

    Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without human intervention for a long period of time

  12. Improved cryptanalysis of the block cipher KASUMI

    DEFF Research Database (Denmark)

    Jia, Keting; Li, Leibo; Rechberger, Christian

    2013-01-01

    KASUMI is a block cipher which consists of eight Feistel rounds with a 128-bit key. Proposed more than 10 years ago, the confidentiality and integrity of 3G mobile communications systems depend on the security of KASUMI. In the practically interesting single key setting, only up to 6 rounds have...... been attacked so far. In this paper we use some observations on the FL and FO functions. Combining these observations with a key schedule weakness, we select some special input and output values to refine the general 5-round impossible differentials and propose the first 7-round attack on KASUMI...... with time and data complexities similar to the previously best 6-round attacks. This leaves now only a single round of security margin. The new impossible differential attack on the last 7 rounds needs 2114.3 encryptions with 252.5 chosen plaintexts. For the attack on the first 7 rounds, the data complexity...

  13. Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function

    NARCIS (Netherlands)

    Liu, Bozhong; Gong, Zheng; Chen, Xiaohong; Qiu, Weidong; Zheng, Dong

    2010-01-01

    Hash functions are widely used in authentication. In this paper, the security of Lin et al.'s efficient block-cipher-based hash function is reviewed. By using Joux's multicollisions and Kelsey et al.'s expandable message techniques, we find the scheme is vulnerable to collision, preimage and second

  14. The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS

    DEFF Research Database (Denmark)

    Beierle, Christof; Jean, Jérémy; Kölbl, Stefan

    2016-01-01

    We present a new tweakable block cipher family SKINNY, whose goal is to compete with NSA recent design SIMON in terms of hardware/ software performances, while proving in addition much stronger security guarantees with regards to differential/linear attacks. In particular, unlike SIMON, we are able...... to provide strong bounds for all versions, and not only in the single-key model, but also in the related-key or related-tweak model. SKINNY has flexible block/key/tweak sizes and can also benefit from very efficient threshold implementations for sidechannel protection. Regarding performances, it outperforms...

  15. Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis

    Science.gov (United States)

    Lu, Jiqiang; Kim, Jongsung

    SHACAL-2 is a 64-round block cipher with a 256-bit block size and a variable length key of up to 512 bits. It is a NESSIE selected block cipher algorithm. In this paper, we observe that, when checking whether a candidate quartet is useful in a (related-key) rectangle attack, we can check the two pairs from the quartet one after the other, instead of checking them simultaneously; if the first pair does not meet the expected conditions, we can discard the quartet immediately. We next exploit a 35-round related-key rectangle distinguisher with probability 2-460 for the first 35 rounds of SHACAL-2, which is built on an existing 24-round related-key differential and a new 10-round differential. Finally, taking advantage of the above observation, we use the distinguisher to mount a related-key rectangle attack on the first 44 rounds of SHACAL-2. The attack requires 2233 related-key chosen plaintexts, and has a time complexity of 2497.2 computations. This is better than any previously published cryptanalytic results on SHACAL-2 in terms of the numbers of attacked rounds.

  16. On-line Ciphers and the Hash-CBC Constructions

    DEFF Research Database (Denmark)

    Bellare, M.; Boldyreva, A.; Knudsen, Lars Ramkilde

    2012-01-01

    We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of large and varying lengths and will output the i th block of the ciphertext after having processed only the first i blocks of the plaintext. Such ciphers permit length-preserving encryption of a data stream...... with only a single pass through the data. We provide security definitions for this primitive and study its basic properties. We then provide attacks on some possible candidates, including CBC with fixed IV. We then provide two constructions, HCBC1 and HCBC2, based on a given block cipher E and a family...... of computationally AXU functions. HCBC1 is proven secure against chosen-plaintext attacks assuming that E is a PRP secure against chosen-plaintext attacks, while HCBC2 is proven secure against chosen-ciphertext attacks assuming that E is a PRP secure against chosen-ciphertext attacks....

  17. The (related-key) impossible boomerang attack and its application to the AES block cipher

    NARCIS (Netherlands)

    Lu, J.

    2011-01-01

    The Advanced Encryption Standard (AES) is a 128-bit block cipher with a user key of 128, 192 or 256 bits, released by NIST in 2001 as the next-generation data encryption standard for use in the USA. It was adopted as an ISO international standard in 2005. Impossible differential cryptanalysis and

  18. Comparing the Cost of Protecting Selected Lightweight Block Ciphers against Differential Power Analysis in Low-Cost FPGAs

    Directory of Open Access Journals (Sweden)

    William Diehl

    2018-04-01

    Full Text Available Lightweight block ciphers are an important topic in the Internet of Things (IoT since they provide moderate security while requiring fewer resources than the Advanced Encryption Standard (AES. Ongoing cryptographic contests and standardization efforts evaluate lightweight block ciphers on their resistance to power analysis side channel attack (SCA, and the ability to apply countermeasures. While some ciphers have been individually evaluated, a large-scale comparison of resistance to side channel attack and the formulation of absolute and relative costs of implementing countermeasures is difficult, since researchers typically use varied architectures, optimization strategies, technologies, and evaluation techniques. In this research, we leverage the Test Vector Leakage Assessment (TVLA methodology and the FOBOS SCA framework to compare FPGA implementations of AES, SIMON, SPECK, PRESENT, LED, and TWINE, using a choice of architecture targeted to optimize throughput-to-area (TP/A ratio and suitable for introducing countermeasures to Differential Power Analysis (DPA. We then apply an equivalent level of protection to the above ciphers using 3-share threshold implementations (TI and verify the improved resistance to DPA. We find that SIMON has the highest absolute TP/A ratio of protected versions, as well as the lowest relative cost of protection in terms of TP/A ratio. Additionally, PRESENT uses the least energy per bit (E/bit of all protected implementations, while AES has the lowest relative cost of protection in terms of increased E/bit.

  19. Hardware Implementation of Artificial Neural Network for Data Ciphering

    Directory of Open Access Journals (Sweden)

    Sahar L. Kadoory

    2016-10-01

    Full Text Available This paper introduces the design and realization of multiple blocks ciphering techniques on the FPGA (Field Programmable Gate Arrays. A back propagation neural networks have been built for substitution, permutation and XOR blocks ciphering using Neural Network Toolbox in MATLAB program. They are trained to encrypt the data, after obtaining the suitable weights, biases, activation function and layout. Afterward, they are described using VHDL and implemented using Xilinx Spartan-3E FPGA using two approaches: serial and parallel versions. The simulation results obtained with Xilinx ISE 9.2i software. The numerical precision is chosen carefully when implementing the Neural Network on FPGA. Obtained results from the hardware designs show accurate numeric values to cipher the data. As expected, the synthesis results indicate that the serial version requires less area resources than the parallel version. As, the data throughput in parallel version is higher than the serial version in rang between (1.13-1.5 times. Also, a slight difference can be observed in the maximum frequency.

  20. An Implementation of RC4+ Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security

    Science.gov (United States)

    Budiman, M. A.; Amalia; Chayanie, N. I.

    2018-03-01

    Cryptography is the art and science of using mathematical methods to preserve message security. There are two types of cryptography, namely classical and modern cryptography. Nowadays, most people would rather use modern cryptography than classical cryptography because it is harder to break than the classical one. One of classical algorithm is the Zig-zag algorithm that uses the transposition technique: the original message is unreadable unless the person has the key to decrypt the message. To improve the security, the Zig-zag Cipher is combined with RC4+ Cipher which is one of the symmetric key algorithms in the form of stream cipher. The two algorithms are combined to make a super-encryption. By combining these two algorithms, the message will be harder to break by a cryptanalyst. The result showed that complexity of the combined algorithm is θ(n2 ), while the complexity of Zig-zag Cipher and RC4+ Cipher are θ(n2 ) and θ(n), respectively.

  1. Possibilities and testing of CPRNG in block cipher mode of operation PM-DC-LM

    Energy Technology Data Exchange (ETDEWEB)

    Zacek, Petr; Jasek, Roman; Malanik, David [Faculty of applied Informatics, Tomas Bata University in Zlin, Zlin, Czech Republic zacek@fai.utb.cz, jasek@fai.utb.cz, dmalanik@fai.utb.cz (Czech Republic)

    2016-06-08

    This paper discusses the chaotic pseudo-random number generator (CPRNG), which is used in block cipher mode of operation called PM-DC-LM. PM-DC-LM is one of possible subversions of general PM mode. In this paper is not discussed the design of PM-DC-LM, but only CPRNG as a part of it because designing is written in other papers. Possibilities, how to change or to improve CPRNG are mentioned. The final part is devoted for a little testing of CPRNG and some testing data are shown.

  2. Possibilities and testing of CPRNG in block cipher mode of operation PM-DC-LM

    Science.gov (United States)

    Zacek, Petr; Jasek, Roman; Malanik, David

    2016-06-01

    This paper discusses the chaotic pseudo-random number generator (CPRNG), which is used in block cipher mode of operation called PM-DC-LM. PM-DC-LM is one of possible subversions of general PM mode. In this paper is not discussed the design of PM-DC-LM, but only CPRNG as a part of it because designing is written in other papers. Possibilities, how to change or to improve CPRNG are mentioned. The final part is devoted for a little testing of CPRNG and some testing data are shown.

  3. Possibilities and testing of CPRNG in block cipher mode of operation PM-DC-LM

    International Nuclear Information System (INIS)

    Zacek, Petr; Jasek, Roman; Malanik, David

    2016-01-01

    This paper discusses the chaotic pseudo-random number generator (CPRNG), which is used in block cipher mode of operation called PM-DC-LM. PM-DC-LM is one of possible subversions of general PM mode. In this paper is not discussed the design of PM-DC-LM, but only CPRNG as a part of it because designing is written in other papers. Possibilities, how to change or to improve CPRNG are mentioned. The final part is devoted for a little testing of CPRNG and some testing data are shown.

  4. Cryptanalysis of a chaos block cipher for wireless sensor network

    Science.gov (United States)

    Yang, Jiyun; Xiao, Di; Xiang, Tao

    2011-02-01

    Based on the analysis of a chaos block cipher for wireless sensor network (WSN), it is found that there is a fatal flaw in its security because the number of rounds is too small and the calculation precision of round function is too short. The scheme could be cryptanalyzed by utilizing differential cryptanalysis theory. First, the third round key is recovered by chosen plaintext attack according to the characteristics of the round function. Then, the second round key can be deduced from the relationship of the sub-keys between the second and the third rounds. Based on the above successful attacks, the first round key could also be broken by brute-force attack. Finally, by employing the characteristics of Feistel structure, the fourth round key could also be obtained. Since all round keys have been cryptanalyzed, the plaintext can then be decrypted. The encryption scheme is proven to be insecure consequently.

  5. On the Design of Error-Correcting Ciphers

    Directory of Open Access Journals (Sweden)

    Mathur Chetan Nanjunda

    2006-01-01

    Full Text Available Securing transmission over a wireless network is especially challenging, not only because of the inherently insecure nature of the medium, but also because of the highly error-prone nature of the wireless environment. In this paper, we take a joint encryption-error correction approach to ensure secure and robust communication over the wireless link. In particular, we design an error-correcting cipher (called the high diffusion cipher and prove bounds on its error-correcting capacity as well as its security. Towards this end, we propose a new class of error-correcting codes (HD-codes with built-in security features that we use in the diffusion layer of the proposed cipher. We construct an example, 128-bit cipher using the HD-codes, and compare it experimentally with two traditional concatenated systems: (a AES (Rijndael followed by Reed-Solomon codes, (b Rijndael followed by convolutional codes. We show that the HD-cipher is as resistant to linear and differential cryptanalysis as the Rijndael. We also show that any chosen plaintext attack that can be performed on the HD cipher can be transformed into a chosen plaintext attack on the Rijndael cipher. In terms of error correction capacity, the traditional systems using Reed-Solomon codes are comparable to the proposed joint error-correcting cipher and those that use convolutional codes require more data expansion in order to achieve similar error correction as the HD-cipher. The original contributions of this work are (1 design of a new joint error-correction-encryption system, (2 design of a new class of algebraic codes with built-in security criteria, called the high diffusion codes (HD-codes for use in the HD-cipher, (3 mathematical properties of these codes, (4 methods for construction of the codes, (5 bounds on the error-correcting capacity of the HD-cipher, (6 mathematical derivation of the bound on resistance of HD cipher to linear and differential cryptanalysis, (7 experimental comparison

  6. Reflection ciphers

    DEFF Research Database (Denmark)

    Boura, Christina; Canteaut, Anne; Knudsen, Lars Ramkilde

    2017-01-01

    study the necessary properties for this coupling permutation. Special care has to be taken of some related-key distinguishers since, in the context of reflection ciphers, they may provide attacks in the single-key setting.We then derive some criteria for constructing secure reflection ciphers...

  7. Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows

    DEFF Research Database (Denmark)

    Beierle, Christof; Jovanovic, Philipp; Lauridsen, Martin Mehl

    2015-01-01

    Designing block ciphers and hash functions in a manner that resemble the AES in many aspects has been very popular since Rijndael was adopted as the Advanced Encryption Standard. However, in sharp contrast to the MixColumns operation, the security implications of the way the state is permuted...... by the operation resembling ShiftRows has never been studied in depth. Here, we provide the first structured study of the influence of ShiftRows-like operations, or more generally, word-wise permutations, in AES-like ciphers with respect to diffusion properties and resistance towards differential- and linear...... normal form. Using a mixed-integer linear programming approach, we obtain optimal parameters for a wide range of AES-like ciphers, and show improvements on parameters for Rijndael-192, Rijndael-256, PRIMATEs-80 and Prøst-128. As a separate result, we show for specific cases of the state geometry...

  8. A New Substitution Cipher - Random-X

    Directory of Open Access Journals (Sweden)

    Falguni Patel

    2015-08-01

    Full Text Available Ciphers are the encryption methods to prepare the algorithm for encryption and decryption. The currently known ciphers are not strong enough to protect the data. A new substitution cipher Random-X that we introduce in this paper can be used for password encryption and data encryption. Random-X cipher is a unique substitution cipher which replaces the units of plaintext with triplets of letters. The beauty of this cipher is that the encrypted string of the same plain text is not always same. This makes it strong and difficult to crack. This paper covers the principle the implementation ideas and testing of Random-X cipher.

  9. Periodic Ciphers with Small Blocks and Cryptanalysis of KeeLoq

    DEFF Research Database (Denmark)

    Courtois, Nicolas T.; Bard, Gregory V.; Bogdanov, Andrey

    2008-01-01

    ]. In this paper we study a unique way of attacking KeeLoq, in which the periodic property of KeeLoq is used in to distinguish 512 rounds of KeeLoq from a random permutation. Our attacks require the knowledge of the entire code-book and are not among the fastest attacks known on this cipher. However one of them...

  10. Quantum-noise randomized ciphers

    International Nuclear Information System (INIS)

    Nair, Ranjith; Yuen, Horace P.; Kumar, Prem; Corndorf, Eric; Eguchi, Takami

    2006-01-01

    We review the notion of a classical random cipher and its advantages. We sharpen the usual description of random ciphers to a particular mathematical characterization suggested by the salient feature responsible for their increased security. We describe a concrete system known as αη and show that it is equivalent to a random cipher in which the required randomization is affected by coherent-state quantum noise. We describe the currently known security features of αη and similar systems, including lower bounds on the unicity distances against ciphertext-only and known-plaintext attacks. We show how αη used in conjunction with any standard stream cipher such as the Advanced Encryption Standard provides an additional, qualitatively different layer of security from physical encryption against known-plaintext attacks on the key. We refute some claims in the literature that αη is equivalent to a nonrandom stream cipher

  11. Cryptanalysis on classical cipher based on Indonesian language

    Science.gov (United States)

    Marwati, R.; Yulianti, K.

    2018-05-01

    Cryptanalysis is a process of breaking a cipher in an illegal decryption. This paper discusses about encryption some classic cryptography, breaking substitution cipher and stream cipher, and increasing its security. Encryption and ciphering based on Indonesian Language text. Microsoft Word and Microsoft Excel were chosen as ciphering and breaking tools.

  12. Some security results of the RC4+ stream cipher

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Jha, Sonu

    2015-01-01

    to any even 8-bit constant other than 0xAA. Therefore, the question that naturally arises is whether the design of RC4+ can be protected by fixing the pad parameter to some constant odd value. In this paper, we try to answer this very question. We show that the design is still vulnerable by mounting...... in terms of number of faults required and the computational complexity. In fact, we reduce the number of faults by around 11264 on average, and our algorithm is around 26 times faster....

  13. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  14. Performance evaluation of Grain family and Espresso ciphers for applications on resource constrained devices

    Directory of Open Access Journals (Sweden)

    Subhrajyoti Deb

    2018-03-01

    Full Text Available A secure stream cipher is an effective security solution for applications running on resource-constrained devices. The Grain family of stream ciphers (Grain v1, Grain-128, and Grain-128a is a family of stream ciphers designed for low-end devices. Similarly, Espresso is a lightweight stream cipher that was developed recently for 5G wireless mobile communication. The randomness of the keystream produced by a stream cipher is a good indicator of its security strength. In this study, we have analyzed the randomness properties of the keystreams produced by both the Grain Family and Espresso ciphers using the statistical packages DieHarder and NIST STS. We also analyzed their performances in two constrained devices (ATmega328P and ESP8266 based on three attainable parameters, namely computation time, memory, and power consumption. Keywords: Stream cipher, Randomness, Dieharder, NIST STS

  15. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  16. A chaotic stream cipher and the usage in video protection

    International Nuclear Information System (INIS)

    Lian Shiguo; Sun Jinsheng; Wang Jinwei; Wang Zhiquan

    2007-01-01

    In this paper, a chaotic stream cipher is constructed and used to encrypt video data selectively. The stream cipher based on a discrete piecewise linear chaotic map satisfies the security requirement of cipher design. The video encryption scheme based on the stream cipher is secure in perception, efficient and format compliant, which is suitable for practical video protection. The video encryption scheme's performances prove the stream cipher's practicability

  17. A Novel Image Stream Cipher Based On Dynamic Substitution

    OpenAIRE

    Elsharkawi, A.; El-Sagheer, R. M.; Akah, H.; Taha, H.

    2016-01-01

    Recently, many chaos-based stream cipher algorithms have been developed. Traditional chaos stream cipher is based on XORing a generated secure random number sequence based on chaotic maps (e.g. logistic map, Bernoulli Map, Tent Map etc.) with the original image to get the encrypted image, This type of stream cipher seems to be vulnerable to chosen plaintext attacks. This paper introduces a new stream cipher algorithm based on dynamic substitution box. The new algorithm uses one substitution b...

  18. Penerapan CIELab dan Chaos sebagai Cipher pada Aplikasi Kriptografi Citra Digital

    Directory of Open Access Journals (Sweden)

    Linna Oktaviana Sari

    2013-04-01

    Full Text Available The development of Internet supports people to transmit information, such as text, images and other media quickly. However, digital images transmitted over the Internet are very vulnerable to attacks, for examples modification and duplication by unauthorized people. Therefore, cryptography as one of method for data security has been developed. This research proposed a combination of color structure CIELab and key randomization by logistic map from chaos as new cipher in digital image cryptographic applications. Cipher is applied to the encryption and decryption process. Implementation of new cipher in cryptographic digital images application was built with Matlab R2010a. Based on the research that has been done, it was found that combination CIELab and chaos can be applied as a new cipher on the encryption and decryption of digital images for cryptographic applications with processing time less than 1 second. Under possible maximum key range on RGB image by 5,2x 1033, the cipher was sufficiently secure against brute-force attack. Decrypted image has good quality with PSNR greater than 50 dB for digital image formatted in “tiff” and “png”.

  19. A stream cipher based on a spatiotemporal chaotic system

    International Nuclear Information System (INIS)

    Li Ping; Li Zhong; Halang, Wolfgang A.; Chen Guanrong

    2007-01-01

    A stream cipher based on a spatiotemporal chaotic system is proposed. A one-way coupled map lattice consisting of logistic maps is served as the spatiotemporal chaotic system. Multiple keystreams are generated from the coupled map lattice by using simple algebraic computations, and then are used to encrypt plaintext via bitwise XOR. These make the cipher rather simple and efficient. Numerical investigation shows that the cryptographic properties of the generated keystream are satisfactory. The cipher seems to have higher security, higher efficiency and lower computation expense than the stream cipher based on a spatiotemporal chaotic system proposed recently

  20. Stream ciphers and number theory

    CERN Document Server

    Cusick, Thomas W; Renvall, Ari R

    2004-01-01

    This is the unique book on cross-fertilisations between stream ciphers and number theory. It systematically and comprehensively covers known connections between the two areas that are available only in research papers. Some parts of this book consist of new research results that are not available elsewhere. In addition to exercises, over thirty research problems are presented in this book. In this revised edition almost every chapter was updated, and some chapters were completely rewritten. It is useful as a textbook for a graduate course on the subject, as well as a reference book for researchers in related fields. · Unique book on interactions of stream ciphers and number theory. · Research monograph with many results not available elsewhere. · A revised edition with the most recent advances in this subject. · Over thirty research problems for stimulating interactions between the two areas. · Written by leading researchers in stream ciphers and number theory.

  1. Experiments of 10 Gbit/sec quantum stream cipher applicable to optical Ethernet and optical satellite link

    Science.gov (United States)

    Hirota, Osamu; Ohhata, Kenichi; Honda, Makoto; Akutsu, Shigeto; Doi, Yoshifumi; Harasawa, Katsuyoshi; Yamashita, Kiichi

    2009-08-01

    The security issue for the next generation optical network which realizes Cloud Computing System Service with data center" is urgent problem. In such a network, the encryption by physical layer which provide super security and small delay should be employed. It must provide, however, very high speed encryption because the basic link is operated at 2.5 Gbit/sec or 10 Gbit/sec. The quantum stream cipher by Yuen-2000 protocol (Y-00) is a completely new type random cipher so called Gauss-Yuen random cipher, which can break the Shannon limit for the symmetric key cipher. We develop such a cipher which has good balance of the security, speed and cost performance. In SPIE conference on quantum communication and quantum imaging V, we reported a demonstration of 2.5 Gbit/sec system for the commercial link and proposed how to improve it to 10 Gbit/sec. This paper reports a demonstration of the Y-00 cipher system which works at 10 Gbit/sec. A transmission test in a laboratory is tried to get the basic data on what parameters are important to operate in the real commercial networks. In addition, we give some theoretical results on the security. It is clarified that the necessary condition to break the Shannon limit requires indeed the quantum phenomenon, and that the full information theoretically secure system is available in the satellite link application.

  2. Cryptanalysis of PRESENT-like ciphers with secret S-boxes

    DEFF Research Database (Denmark)

    Borghoff, Julia; Knudsen, Lars Ramkilde; Leander, Gregor

    2011-01-01

    At Eurocrypt 2001, Biryukov and Shamir investigated the security of AES-like ciphers where the substitutions and affine transformations are all key-dependent and successfully cryptanalysed two and a half rounds. This paper considers PRESENT-like ciphers in a similar manner. We focus on the settings...... where the S-boxes are key dependent, and repeated for every round. We break one particular variant which was proposed in 2009 with practical complexity in a chosen plaintext/chosen ciphertext scenario. Extrapolating these results suggests that up to 28 rounds of such ciphers can be broken. Furthermore...

  3. An algorithm for the construction of substitution box for block ciphers based on projective general linear group

    Directory of Open Access Journals (Sweden)

    Anas Altaleb

    2017-03-01

    Full Text Available The aim of this work is to synthesize 8*8 substitution boxes (S-boxes for block ciphers. The confusion creating potential of an S-box depends on its construction technique. In the first step, we have applied the algebraic action of the projective general linear group PGL(2,GF(28 on Galois field GF(28. In step 2 we have used the permutations of the symmetric group S256 to construct new kind of S-boxes. To explain the proposed extension scheme, we have given an example and constructed one new S-box. The strength of the extended S-box is computed, and an insight is given to calculate the confusion-creating potency. To analyze the security of the S-box some popular algebraic and statistical attacks are performed as well. The proposed S-box has been analyzed by bit independent criterion, linear approximation probability test, non-linearity test, strict avalanche criterion, differential approximation probability test, and majority logic criterion. A comparison of the proposed S-box with existing S-boxes shows that the analyses of the extended S-box are comparatively better.

  4. Ganzua: A Cryptanalysis Tool for Monoalphabetic and Polyalphabetic Ciphers

    Science.gov (United States)

    Garcia-Pasquel, Jesus Adolfo; Galaviz, Jose

    2006-01-01

    Many introductory courses to cryptology and computer security start with or include a discussion of classical ciphers that usually contemplates some cryptanalysis techniques used to break them. Ganzua (picklock in Spanish) is an application designed to assist the cryptanalysis of ciphertext obtained with monoalphabetic or polyalphabetic ciphers.…

  5. Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments

    Directory of Open Access Journals (Sweden)

    Vahid Amin Ghafari

    2018-03-01

    Full Text Available In Fast Software Encryption (FSE 2015, while presenting a new idea (i.e., the design of stream ciphers with the small internal state by using a secret key, not only in the initialization but also in the keystream generation, Sprout was proposed. Sprout was insecure and an improved version of Sprout was presented in FSE 2017. We introduced Fruit stream cipher informally in 2016 on the web page of IACR (eprint and few cryptanalysis were published on it. Fortunately, the main structure of Fruit was resistant. Now, Fruit-80 is presented as a final version which is easier to implement and is secure. The size of LFSR and NFSR in Fruit-80 is only 80 bits (for 80-bit security level, while for resistance to the classical time-memory-data tradeoff (TMDTO attacks, the internal state size should be at least twice that of the security level. To satisfy this rule and to design a concrete cipher, we used some new design ideas. It seems that the bottleneck of designing an ultra-lightweight stream cipher is TMDTO distinguishing attacks. A countermeasure was suggested, and another countermeasure is proposed here. Fruit-80 is better than other small-state stream ciphers in terms of the initialization speed and area size in hardware. It is possible to redesign many of the stream ciphers and achieve significantly smaller area size by using the new idea.

  6. Loss Characteristics of 6.5 kV RC-IGBT Applied to a Traction Converter

    Directory of Open Access Journals (Sweden)

    Xianjin Huang

    2017-07-01

    Full Text Available 6.5 kV level IGBT (Insulated Gate Bipolar Transistor modules are widely applied in megawatt locomotive (MCUs traction converters, to achieve an upper 3.5 kV DC link, which is beneficial for decreasing power losses and increasing the power density. Reverse Conducting IGBT (RC-IGBT constructs the conventional IGBT function and freewheel diode function in a single chip, which has a greater flow ability in the same package volume. In the same cooling conditions, RC-IGBT allows for a higher operating temperature. In this paper, a mathematic model is developed, referring to the datasheets and measurement data, to study the 6.5 kV/1000 A RC-IGBT switching features. The relationship among the gate desaturated pulse, conducting losses, and recovery losses is discussed. Simulations and tests were carried out to consider the influence of total losses on the different amplitudes and durations of the desaturated pulse. The RC-IGBT traction converter system with gate pulse desaturated control is built, and the simulation and measurements show that the total losses of RC-IGBT with desaturated control decreased comparing to the RC-IGBT without desaturated control or conventional IGBT. Finally, a proportional small power platform is developed, and the test results prove the correction of the theory analysis.

  7. Why IV Setup for Stream Ciphers is Difficult

    DEFF Research Database (Denmark)

    Zenner, Erik

    2007-01-01

    In recent years, the initialization vector (IV) setup has proven to be the most vulnerable point when designing secure stream ciphers. In this paper, we take a look at possible reasons why this is the case, identifying numerous open research problems in cryptography.......In recent years, the initialization vector (IV) setup has proven to be the most vulnerable point when designing secure stream ciphers. In this paper, we take a look at possible reasons why this is the case, identifying numerous open research problems in cryptography....

  8. The Rabbit Stream Cipher

    DEFF Research Database (Denmark)

    Boesgaard, Martin; Vesterager, Mette; Zenner, Erik

    2008-01-01

    The stream cipher Rabbit was first presented at FSE 2003, and no attacks against it have been published until now. With a measured encryption/decryption speed of 3.7 clock cycles per byte on a Pentium III processor, Rabbit does also provide very high performance. This paper gives a concise...... description of the Rabbit design and some of the cryptanalytic results available....

  9. A MULTICORE COMPUTER SYSTEM FOR DESIGN OF STREAM CIPHERS BASED ON RANDOM FEEDBACK

    Directory of Open Access Journals (Sweden)

    Borislav BEDZHEV

    2013-01-01

    Full Text Available The stream ciphers are an important tool for providing information security in the present communication and computer networks. Due to this reason our paper describes a multicore computer system for design of stream ciphers based on the so - named random feedback shift registers (RFSRs. The interest to this theme is inspired by the following facts. First, the RFSRs are a relatively new type of stream ciphers which demonstrate a significant enhancement of the crypto - resistance in a comparison with the classical stream ciphers. Second, the studding of the features of the RFSRs is in very initial stage. Third, the theory of the RFSRs seems to be very hard, which leads to the necessity RFSRs to be explored mainly by the means of computer models. The paper is organized as follows. First, the basics of the RFSRs are recalled. After that, our multicore computer system for design of stream ciphers based on RFSRs is presented. Finally, the advantages and possible areas of application of the computer system are discussed.

  10. A novel chaotic stream cipher and its application to palmprint template protection

    International Nuclear Information System (INIS)

    Heng-Jian, Li; Jia-Shu, Zhang

    2010-01-01

    Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher. (general)

  11. A novel chaotic stream cipher and its application to palmprint template protection

    Science.gov (United States)

    Li, Heng-Jian; Zhang, Jia-Shu

    2010-04-01

    Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher.

  12. Hardware stream cipher with controllable chaos generator for colour image encryption

    KAUST Repository

    Barakat, Mohamed L.

    2014-01-01

    This study presents hardware realisation of chaos-based stream cipher utilised for image encryption applications. A third-order chaotic system with signum non-linearity is implemented and a new post processing technique is proposed to eliminate the bias from the original chaotic sequence. The proposed stream cipher utilises the processed chaotic output to mask and diffuse input pixels through several stages of XORing and bit permutations. The performance of the cipher is tested with several input images and compared with previously reported systems showing superior security and higher hardware efficiency. The system is experimentally verified on XilinxVirtex 4 field programmable gate array (FPGA) achieving small area utilisation and a throughput of 3.62 Gb/s. © The Institution of Engineering and Technology 2013.

  13. 47 CFR 95.201 - (R/C Rule 1) What is the Radio Control (R/C) Radio Service?

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false (R/C Rule 1) What is the Radio Control (R/C...) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Radio Control (R/C) Radio Service General Provisions § 95.201 (R/C Rule 1) What is the Radio Control (R/C) Radio Service? The R/C Service is a private...

  14. Coherent pulse position modulation quantum cipher

    Energy Technology Data Exchange (ETDEWEB)

    Sohma, Masaki; Hirota, Osamu [Quantum ICT Research Institute, Tamagawa University, 6-1-1 Tamagawa-gakuen, Machida, Tokyo 194-8610 (Japan)

    2014-12-04

    On the basis of fundamental idea of Yuen, we present a new type of quantum random cipher, where pulse position modulated signals are encrypted in the picture of quantum Gaussian wave form. We discuss the security of our proposed system with a phase mask encryption.

  15. An Enhanced Vigenere Cipher For Data Security

    Directory of Open Access Journals (Sweden)

    Aized Amin Soofi

    2015-08-01

    Full Text Available In todays world the amount of data that is exchanged has increased in the last few years so securing the information has become a crucial task. Cryptography is an art of converting plain text message into unreadable message. Encryption algorithms play an important role in information security systems. Encryption is considered as one of the most powerful tool for secure transmission of data over the communication network. Vigenere technique is an example of polyalphabetic stream cipher it has various limitations such as Kasiski and Friedman attack to find the length of encryption key. In this paper an enhanced version of traditional vigenere cipher has been proposed that eliminates the chances of Kaisiski and Friedman attack. Proposed technique also provides better security against cryptanalysis and pattern prediction.

  16. Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement

    Science.gov (United States)

    Nurdiyanto, Heri; Rahim, Robbi; Wulan, Nur

    2017-12-01

    Symmetric type cryptography algorithm is known many weaknesses in encryption process compared with asymmetric type algorithm, symmetric stream cipher are algorithm that works on XOR process between plaintext and key, to improve the security of symmetric stream cipher algorithm done improvisation by using Triple Transposition Key which developed from Transposition Cipher and also use Base64 algorithm for encryption ending process, and from experiment the ciphertext that produced good enough and very random.

  17. CIPHER: coded imager and polarimeter for high-energy radiation

    CERN Document Server

    Caroli, E; Dusi, W; Bertuccio, G; Sampietro, M

    2000-01-01

    The CIPHER instrument is a hard X- and soft gamma-ray spectroscopic and polarimetric coded mask imager based on an array of cadmium telluride micro-spectrometers. The position-sensitive detector (PSD) will be arranged in 4 modules of 32x32 crystals, each of 2x2 mm sup 2 cross section and 10 mm thickness giving a total active area of about 160 cm sup 2. The micro-spectrometer characteristics allow a wide operating range from approx 10 keV to 1 MeV, while the PSD is actively shielded by CsI crystals on the bottom in order to reduce background. The mask, based on a modified uniformly redundant array (MURA) pattern, is four times the area of the PSD and is situated at about 100 cm from the CdTe array top surface. The CIPHER instrument is proposed for a balloon experiment, both in order to assess the performance of such an instrumental concept for a small/medium-size satellite survey mission and to perform an innovative measurement of the Crab polarisation level. The CIPHER's field of view allows the instrument to...

  18. Cracking the Cipher Challenge

    CERN Document Server

    CERN. Geneva. Audiovisual Unit; Singh, Simon

    2002-01-01

    In the back of 'The Code Book', a history of cryptography, Simon Singh included a series of 10 encoded messages, each from a different period of history. The first person to crack all 10 messages would win a prize of £10,000. Now that the prize has been won, Simon can reveal the story behind the Cipher Challenge. Along the way he will show how mathematics can be used to crack codes, the role it played in World War Two and how it helps to guarantee security in the Information Age.

  19. Field performance of timber bridges. 17, Ciphers stress-laminated deck bridge

    Science.gov (United States)

    James P. Wacker; James A. Kainz; Michael A. Ritter

    In September 1989, the Ciphers bridge was constructed within the Beltrami Island State Forest in Roseau County, Minnesota. The bridge superstructure is a two-span continuous stress-laminated deck that is approximately 12.19 m long, 5.49 m wide, and 305 mm deep (40 ft long, 18 ft wide, and 12 in. deep). The bridge is one of the first to utilize red pine sawn lumber for...

  20. From Greeks to Today: Cipher Trees and Computer Cryptography.

    Science.gov (United States)

    Grady, M. Tim; Brumbaugh, Doug

    1988-01-01

    Explores the use of computers for teaching mathematical models of transposition ciphers. Illustrates the ideas, includes activities and extensions, provides a mathematical model and includes computer programs to implement these topics. (MVL)

  1. Stream cipher based on pseudorandom number generation using optical affine transformation

    Science.gov (United States)

    Sasaki, Toru; Togo, Hiroyuki; Tanida, Jun; Ichioka, Yoshiki

    2000-07-01

    We propose a new stream cipher technique for 2D image data which can be implemented by iterative optical transformation. The stream cipher uses a pseudo-random number generator (PRNG) to generate pseudo-random bit sequence. The proposed method for the PRNG is composed of iterative operation of 2D affine transformation achieved by optical components, and modulo-n addition of the transformed images. The method is expected to be executed efficiently by optical parallel processing. We verify performance of the proposed method in terms of security strength and clarify problems on optical implementation by the optical fractal synthesizer.

  2. Novel Quantum Encryption Algorithm Based on Multiqubit Quantum Shift Register and Hill Cipher

    International Nuclear Information System (INIS)

    Khalaf, Rifaat Zaidan; Abdullah, Alharith Abdulkareem

    2014-01-01

    Based on a quantum shift register, a novel quantum block cryptographic algorithm that can be used to encrypt classical messages is proposed. The message is encoded and decoded by using a code generated by the quantum shift register. The security of this algorithm is analysed in detail. It is shown that, in the quantum block cryptographic algorithm, two keys can be used. One of them is the classical key that is used in the Hill cipher algorithm where Alice and Bob use the authenticated Diffie Hellman key exchange algorithm using the concept of digital signature for the authentication of the two communicating parties and so eliminate the man-in-the-middle attack. The other key is generated by the quantum shift register and used for the coding of the encryption message, where Alice and Bob share the key by using the BB84 protocol. The novel algorithm can prevent a quantum attack strategy as well as a classical attack strategy. The problem of key management is discussed and circuits for the encryption and the decryption are suggested

  3. Cryptanalysis of an ergodic chaotic cipher

    International Nuclear Information System (INIS)

    Alvarez, G.; Montoya, F.; Romera, M.; Pastor, G.

    2003-01-01

    In recent years, a growing number of cryptosystems based on chaos have been proposed, many of them fundamentally flawed by a lack of robustness and security. In this Letter, we offer our results after having studied the security and possible attacks on a very interesting cipher algorithm based on the logistic map's ergodicity property. This algorithm has become very popular recently, as it has been taken as the development basis of new chaotic cryptosystems

  4. Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System

    Science.gov (United States)

    Aryanti, Aryanti; Mekongga, Ikhthison

    2018-02-01

    Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA) and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA) and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.

  5. On RC-spaces

    OpenAIRE

    Bielas, Wojciech; Plewik, Szymon

    2018-01-01

    Following Frink's characterization of completely regular spaces, we say that a regular T_1-space is an RC-space whenever the family of all regular open sets constitutes a regular normal base. Normal spaces are RC-spaces and there exist completely regular spaces which are not RC-spaces. So the question arises, which of the known examples of completely regular and not normal spaces are RC-spaces. We show that the Niemytzki plane and the Sorgenfrey plane are RC-spaces.

  6. Implementation of Rivest Shamir Adleman Algorithm (RSA and Vigenere Cipher In Web Based Information System

    Directory of Open Access Journals (Sweden)

    Aryanti Aryanti

    2018-01-01

    Full Text Available Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.

  7. On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers

    DEFF Research Database (Denmark)

    Blondeau, Celine; Bogdanov, Andrey; Wang, Meiqin

    2014-01-01

    or inequivalence has not been formally addressed so far in a constructive practical way.In this paper, we aim to bridge this gap in the understanding of the links between the ID and ZC properties. We tackle this problem at the example of two wide classes of ciphers, namely, Feistel- and Skipjack-type ciphers...

  8. Hardware stream cipher with controllable chaos generator for colour image encryption

    KAUST Repository

    Barakat, Mohamed L.; Mansingka, Abhinav S.; Radwan, Ahmed Gomaa; Salama, Khaled N.

    2014-01-01

    This study presents hardware realisation of chaos-based stream cipher utilised for image encryption applications. A third-order chaotic system with signum non-linearity is implemented and a new post processing technique is proposed to eliminate

  9. Hybrid Message-Embedded Cipher Using Logistic Map

    OpenAIRE

    Mishra, Mina; Mankar, V. H.

    2012-01-01

    The proposed hybrid message embedded scheme consists of hill cipher combined with message embedded chaotic scheme. Message-embedded scheme using non-linear feedback shift register as non-linear function and 1-D logistic map as chaotic map is modified, analyzed and tested for avalanche property and strength against known plaintext attack and brute-force attack. Parameter of logistic map acts as a secret key. As we know that the minimum key space to resist brute-force attack is 2100, and it is ...

  10. Cipher image damage and decisions in real time

    Science.gov (United States)

    Silva-García, Victor Manuel; Flores-Carapia, Rolando; Rentería-Márquez, Carlos; Luna-Benoso, Benjamín; Jiménez-Vázquez, Cesar Antonio; González-Ramírez, Marlon David

    2015-01-01

    This paper proposes a method for constructing permutations on m position arrangements. Our objective is to encrypt color images using advanced encryption standard (AES), using variable permutations means a different one for each 128-bit block in the first round after the x-or operation is applied. Furthermore, this research offers the possibility of knowing the original image when the encrypted figure suffered a failure from either an attack or not. This is achieved by permuting the original image pixel positions before being encrypted with AES variable permutations, which means building a pseudorandom permutation of 250,000 position arrays or more. To this end, an algorithm that defines a bijective function between the nonnegative integer and permutation sets is built. From this algorithm, the way to build permutations on the 0,1,…,m-1 array, knowing m-1 constants, is presented. The transcendental numbers are used to select these m-1 constants in a pseudorandom way. The quality of the proposed encryption according to the following criteria is evaluated: the correlation coefficient, the entropy, and the discrete Fourier transform. A goodness-of-fit test for each basic color image is proposed to measure the bits randomness degree of the encrypted figure. On the other hand, cipher images are obtained in a loss-less encryption way, i.e., no JPEG file formats are used.

  11. Approximation of a chaotic orbit as a cryptanalytical method on Baptista's cipher

    International Nuclear Information System (INIS)

    Skrobek, Adrian

    2008-01-01

    Many cryptographic schemes based on M.S. Baptista algorithm were created. The original algorithm and some of the versions that based upon it were put to test with various cryptanalytic techniques. This Letter shows the new approach to Baptista's cipher cryptanalysis. The presumption is that the attacker knows the mapping in between the characters of the plaintext and the numbers of the ε-interval. Then, depending on the amount of the knowledge about the key possessed, the estimation of all components of the key requires a different computational complexity, however it is possible. This Letter also takes into consideration, independently, all the components of the key from the M.S. Baptista's original algorithm. The main aim is the use of the approximation of the blurred chaotic orbit's real value in Baptista-type cipher cryptanalysis

  12. Identification Report: Earthquake Test on 2-Bay, 6-Story Scale 1:5 RC-Frames

    DEFF Research Database (Denmark)

    Kirkegaard, Poul Henning; Skjærbæk, P. S.; Nielsen, Søren R. K.

    The aim of the present report is to supply the identification results from the tests performed with a laboratory model of a plane 6-storey, 2-bay scale 1:5 RC-frame at Aalborg University, Denmark during the autumn 1996. The tests were performed as a part of a Ph.D study considering evaluation of ...

  13. Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware

    DEFF Research Database (Denmark)

    Bilgin, Begul; Bogdanov, Andrey; Knezevic, Miroslav

    2013-01-01

    In this paper, we present a novel lightweight authenticated cipher optimized for hardware implementations called Fides. It is an online nonce-based authenticated encryption scheme with authenticated data whose area requirements are as low as 793 GE and 1001 GE for 80-bit and 96-bit security...

  14. A New Application of Stochastic Transformation

    OpenAIRE

    Nilar Win Kyaw

    2009-01-01

    In cryptography, confusion and diffusion are very important to get confidentiality and privacy of message in block ciphers and stream ciphers. There are two types of network to provide confusion and diffusion properties of message in block ciphers. They are Substitution- Permutation network (S-P network), and Feistel network. NLFS (Non-Linear feedback stream cipher) is a fast and secure stream cipher for software application. NLFS have two modes basic mode that is synchro...

  15. HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY

    Directory of Open Access Journals (Sweden)

    Grace Lamudur Arta Sihombing

    2017-03-01

    Full Text Available Confidentiality of data is very important in communication. Many cyber crimes that exploit security holes for entry and manipulation. To ensure the security and confidentiality of the data, required a certain technique to encrypt data or information called cryptography. It is one of the components that can not be ignored in building security. And this research aimed to analyze the hybrid cryptography with symmetric key by using a stream cipher algorithm and asymmetric key by using RSA (Rivest Shamir Adleman algorithm. The advantages of hybrid cryptography is the speed in processing data using a symmetric algorithm and easy transfer of key using asymmetric algorithm. This can increase the speed of transaction processing data. Stream Cipher Algorithm using the image digital signature as a keys, that will be secured by the RSA algorithm. So, the key for encryption and decryption are different. Blum Blum Shub methods used to generate keys for the value p, q on the RSA algorithm. It will be very difficult for a cryptanalyst to break the key. Analysis of hybrid cryptography stream cipher and RSA algorithms with digital signatures as a key, indicates that the size of the encrypted file is equal to the size of the plaintext, not to be larger or smaller so that the time required for encryption and decryption process is relatively fast.

  16. Application and Misapplication of the Czechoslovak STP Cipher During WWII – Report on an Unpublished Manuscript

    Czech Academy of Sciences Publication Activity Database

    Porubský, Štefan

    2017-01-01

    Roč. 70, č. 1 (2017), s. 41-91 ISSN 1210-3195 Institutional support: RVO:67985807 Keywords : STP cipher * Josef Růžek * Karol Cigáň * František Moravec * Czechoslovak military cryptography * Word War II Subject RIV: BA - General Mathematics OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) https://tatra.mat.savba.sk/paper.php?id_paper=1412

  17. Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher

    Science.gov (United States)

    Panduranga, H. T.; Naveen Kumar, S. K.; Kiran, HASH(0x22c8da0)

    2014-06-01

    In this paper we presented a image encryption based on permutation-substitution using chaotic map and Latin square image cipher. The proposed method consists of permutation and substitution process. In permutation process, plain image is permuted according to chaotic sequence generated using chaotic map. In substitution process, based on secrete key of 256 bit generate a Latin Square Image Cipher (LSIC) and this LSIC is used as key image and perform XOR operation between permuted image and key image. The proposed method can applied to any plain image with unequal width and height as well and also resist statistical attack, differential attack. Experiments carried out for different images of different sizes. The proposed method possesses large key space to resist brute force attack.

  18. Performance of Сellular Automata-based Stream Ciphers in GPU Implementation

    Directory of Open Access Journals (Sweden)

    P. G. Klyucharev

    2016-01-01

    Full Text Available Earlier the author had developed methods to build high-performance generalized cellular automata-based symmetric ciphers, which allow obtaining the encryption algorithms that show extremely high performance in hardware implementation. However, their implementation based on the conventional microprocessors lacks high performance. The mere fact is quite common - it shows a scope of applications for these ciphers. Nevertheless, the use of graphic processors enables achieving an appropriate performance for a software implementation.The article is extension of a series of the articles, which study various aspects to construct and implement cryptographic algorithms based on the generalized cellular automata. The article is aimed at studying the capabilities to implement the GPU-based cryptographic algorithms under consideration.Representing a key generator, the implemented encryption algorithm comprises 2k generalized cellular automata. The cellular automata graphs are Ramanujan’s ones. The cells of produced k gamma streams alternate, thereby allowing the GPU capabilities to be better used.To implement was used OpenCL, as the most universal and platform-independent API. The software written in C ++ was designed so that the user could set various parameters, including the encryption key, the graph structure, the local communication function, various constants, etc. To test were used a variety of graphics processors (NVIDIA GTX 650; NVIDIA GTX 770; AMD R9 280X.Depending on operating conditions, and GPU used, a performance range is from 0.47 to 6.61 Gb / s, which is comparable to the performance of the countertypes.Thus, the article has demonstrated that using the GPU makes it is possible to provide efficient software implementation of stream ciphers based on the generalized cellular automata.This work was supported by the RFBR, the project №16-07-00542.

  19. A Novel Image Encryption Scheme Based on Self-Synchronous Chaotic Stream Cipher and Wavelet Transform

    Directory of Open Access Journals (Sweden)

    Chunlei Fan

    2018-06-01

    Full Text Available In this paper, a novel image encryption scheme is proposed for the secure transmission of image data. A self-synchronous chaotic stream cipher is designed with the purpose of resisting active attack and ensures the limited error propagation of image data. Two-dimensional discrete wavelet transform and Arnold mapping are used to scramble the pixel value of the original image. A four-dimensional hyperchaotic system with four positive Lyapunov exponents serve as the chaotic sequence generator of the self-synchronous stream cipher in order to enhance the security and complexity of the image encryption system. Finally, the simulation experiment results show that this image encryption scheme is both reliable and secure.

  20. Progress in Y-00 physical cipher for Giga bit/sec optical data communications (intensity modulation method)

    Science.gov (United States)

    Hirota, Osamu; Futami, Fumio

    2014-10-01

    To guarantee a security of Cloud Computing System is urgent problem. Although there are several threats in a security problem, the most serious problem is cyber attack against an optical fiber transmission among data centers. In such a network, an encryption scheme on Layer 1(physical layer) with an ultimately strong security, a small delay, and a very high speed should be employed, because a basic optical link is operated at 10 Gbit/sec/wavelength. We have developed a quantum noise randomied stream cipher so called Yuen- 2000 encryption scheme (Y-00) during a decade. This type of cipher is a completely new type random cipher in which ciphertext for a legitimate receiver and eavesdropper are different. This is a condition to break the Shannon limit in theory of cryptography. In addition, this scheme has a good balance on a security, a speed and a cost performance. To realize such an encryption, several modulation methods are candidates such as phase-modulation, intensity-modulation, quadrature amplitude modulation, and so on. Northwestern university group demonstrated a phase modulation system (α=η) in 2003. In 2005, we reported a demonstration of 1 Gbit/sec system based on intensity modulation scheme(ISK-Y00), and gave a design method for quadratic amplitude modulation (QAM-Y00) in 2005 and 2010. An intensity modulation scheme promises a real application to a secure fiber communication of current data centers. This paper presents a progress in quantum noise randomized stream cipher based on ISK-Y00, integrating our theoretical and experimental achievements in the past and recent 100 Gbit/sec(10Gbit/sec × 10 wavelengths) experiment.

  1. ELASTO-PLASTIC BEHAVIOR OF RC FRAMES COMPOSED OF STEEL JACKETTED RC SHORT COLUMNS AND SPANDREL WALLS

    OpenAIRE

    Nasruddin

    2012-01-01

    This experimental study is a part of the investigation on the seismic design method for Double Tubes Hybrid System (DTHS) for buildings. This structural system consists of RC core walls as the interior tube, and the exterior frames composed of RC short columns and RC spandrel walls as the exterior tube. The RC core walls are designed as the Energy Dissipation Structural Walls (EDSW), which are composed of RC coupled shear walls linked by short steel H-shaped beams as the energy dissipation de...

  2. Comparing low volume saphenous-obturator block with placebo and femoral-obturator block for anterior cruciate ligament reconstruction: a randomized controlled trial

    DEFF Research Database (Denmark)

    Lenz, Katja; Jensen, Kenneth; Tanggaard, Katrine

    2018-01-01

    BACKGROUND: Anterior cruciate ligament reconstruction (ACL-RC) is often associated with moderate to severe postoperative pain even with a multimodal analgesic regimen. We aimed to compare the analgesic efficacy of low volume saphenous-obturator block with placebo and femoral- obturator block in p...

  3. The Combination of RSA And Block Chiper Algorithms To Maintain Message Authentication

    Science.gov (United States)

    Yanti Tarigan, Sepri; Sartika Ginting, Dewi; Lumban Gaol, Melva; Lorensi Sitompul, Kristin

    2017-12-01

    RSA algorithm is public key algorithm using prime number and even still used today. The strength of this algorithm lies in the exponential process, and the factorial number into 2 prime numbers which until now difficult to do factoring. The RSA scheme itself adopts the block cipher scheme, where prior to encryption, the existing plaintext is divide in several block of the same length, where the plaintext and ciphertext are integers between 1 to n, where n is typically 1024 bit, and the block length itself is smaller or equal to log(n)+1 with base 2. With the combination of RSA algorithm and block chiper it is expected that the authentication of plaintext is secure. The secured message will be encrypted with RSA algorithm first and will be encrypted again using block chiper. And conversely, the chipertext will be decrypted with the block chiper first and decrypted again with the RSA algorithm. This paper suggests a combination of RSA algorithms and block chiper to secure data.

  4. Detecção da citotoxicidade de materiais biocompatíveis nas linhagens celulares MRC-5, HeLa e RC-IAL MRC-5, HeLa and RC-IAL cell lines sensitivity for detection of cytotoxicity of biocompatible materials

    Directory of Open Access Journals (Sweden)

    Aurea S. Cruz

    1992-04-01

    Full Text Available A sensibilidade de uma linhagem celular diplóide e duas heteroplóides, para a detecção de citotoxicidade através do método de difusão em camada de ágar sobre culturas celulares, foi avaliada experimentalmente com solução de ácido ascórbico em diferentes concentrações e, na prática, frente a 562 amostras de 21 diferentes materiais industriais enviados para análise na Seção de Culturas Celulares do Instituto Adolfo Lutz. A linhagem celular heteroplóide designada RC-IAL apresentou, em relação às linhagens MRC-5 e HeLa, maior sensibilidade porque revelou a presença de efeito citotóxico nas menores concentrações utilizadas (10 e 25 ug/ml do ácido ascórbico e apresentou maior diâmetro do halo citotóxico em 15 amostras e igual diâmetro em 16 das 43 amostras (7,6% que resultaram positivas. Nas 43 amostras positivas, a linhagem MRC-5 não revelou citotoxicidade em 3 amostras de espuma e 1 de resina acrílica. O polivinilcloreto (PVC e o polietileno, raramente revelaram positividade, enquanto plástico, algodão e resinas acrílicas revelaram citotoxicidade ao redor de 5%. Em vista dos resultados é discutida a proposta da utilização da linhagem RC-IAL e HeLa para a continuidade das futuras análises solicitadas ao Instituto Adolfo LutzThe sensitivity of diploid and heteroploid cell lines for detection of cytotoxicity using the agar diffusion method on cell culture, was tested with ascorbic acid solution of different concentrations. A total of 562 samples of 21 various materials were tested. The heteroploid cell line, RC-IAL, showed in relation to the MRC-5 and HeLa cell lines, greater sensitivity because it showed the presence of cytotoxic effect with the lowest concentration used (10 and 25ug/ml of ascorbic acid and showed greater diameter of cytotoxic halo in 15 samples and equal diameter in 16 of the 43 positive samples (7.6%. Out of 43 positive samples, the MRC-5 line did not show cytotoxicity in 3 sponge samples and

  5. Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-like Ciphers

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed

    2012-01-01

    We use large but sparse correlation and transition-difference-probability submatrices to find the best linear and differential approximations respectively on PRESENT-like ciphers. This outperforms the branch and bound algorithm when the number of low-weight differential and linear characteristics...

  6. Analysis of selected methods for the recovery of encrypted WEP key

    Science.gov (United States)

    Wójtowicz, Sebastian; Belka, Radosław

    2014-11-01

    This paper deals with some of the WEP (Wired Equivalent Privacy) key decryption methods based on aircrack-ng software, which was embedded in Backtrack operating system (Linux distribution). The 64-bit (40-bit) and 128-bit (104- bit) key encrypted with RC4 cipher weakness was shown. Research methods were made in different network environments. In this work we compared different types of keys to check how strong the RC4 stream cipher can be. The 40-bit and 104-bit WEP key has been tested on IEEE 802.11 based wireless LAN using laptop with live-CD Linux operating system. A short analysis of key creation methods was performed to compare the amount of time necessary to decrypt random and nonrandom WEP keys.

  7. Integral cryptanalysis

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Wagner, David

    2002-01-01

    This paper considers a cryptanalytic approach called integral cryptanalysis. It can be seen as a dual to differential cryptanalysis and applies to ciphers not vulnerable to differential attacks. The method is particularly applicable to block ciphers which use bijective components only.......This paper considers a cryptanalytic approach called integral cryptanalysis. It can be seen as a dual to differential cryptanalysis and applies to ciphers not vulnerable to differential attacks. The method is particularly applicable to block ciphers which use bijective components only....

  8. Building indifferentiable compression functions from the PGV compression functions

    DEFF Research Database (Denmark)

    Gauravaram, P.; Bagheri, Nasour; Knudsen, Lars Ramkilde

    2016-01-01

    Preneel, Govaerts and Vandewalle (PGV) analysed the security of single-block-length block cipher based compression functions assuming that the underlying block cipher has no weaknesses. They showed that 12 out of 64 possible compression functions are collision and (second) preimage resistant. Black......, Rogaway and Shrimpton formally proved this result in the ideal cipher model. However, in the indifferentiability security framework introduced by Maurer, Renner and Holenstein, all these 12 schemes are easily differentiable from a fixed input-length random oracle (FIL-RO) even when their underlying block...

  9. Implementation of Super-Encryption with Trithemius Algorithm and Double Transposition Cipher in Securing PDF Files on Android Platform

    Science.gov (United States)

    Budiman, M. A.; Rachmawati, D.; Jessica

    2018-03-01

    This study aims to combine the trithemus algorithm and double transposition cipher in file security that will be implemented to be an Android-based application. The parameters being examined are the real running time, and the complexity value. The type of file to be used is a file in PDF format. The overall result shows that the complexity of the two algorithms with duper encryption method is reported as Θ (n 2). However, the processing time required in the encryption process uses the Trithemius algorithm much faster than using the Double Transposition Cipher. With the length of plaintext and password linearly proportional to the processing time.

  10. A novel chaotic block cryptosystem based on iterating map with output-feedback

    International Nuclear Information System (INIS)

    Yang Degang; Liao Xiaofeng; Wang Yong; Yang Huaqian; Wei Pengcheng

    2009-01-01

    A novel method for encryption based on iterating map with output-feedback is presented in this paper. The output-feedback, instead of simply mixing the chaotic signal of the proposed chaotic cryptosystem with the cipher-text, is relating to previous cipher-text that is obtained through the plaintext and key. Some simulated experiments are performed to substantiate that our method can make cipher-text more confusion and diffusion and that the proposed method is practical whenever efficiency, cipher-text length or security is concerned.

  11. Cloud Computing Security Model with Combination of Data Encryption Standard Algorithm (DES) and Least Significant Bit (LSB)

    Science.gov (United States)

    Basri, M.; Mawengkang, H.; Zamzami, E. M.

    2018-03-01

    Limitations of storage sources is one option to switch to cloud storage. Confidentiality and security of data stored on the cloud is very important. To keep up the confidentiality and security of such data can be done one of them by using cryptography techniques. Data Encryption Standard (DES) is one of the block cipher algorithms used as standard symmetric encryption algorithm. This DES will produce 8 blocks of ciphers combined into one ciphertext, but the ciphertext are weak against brute force attacks. Therefore, the last 8 block cipher will be converted into 8 random images using Least Significant Bit (LSB) algorithm which later draws the result of cipher of DES algorithm to be merged into one.

  12. A Symmetric Chaos-Based Image Cipher with an Improved Bit-Level Permutation Strategy

    Directory of Open Access Journals (Sweden)

    Chong Fu

    2014-02-01

    Full Text Available Very recently, several chaos-based image ciphers using a bit-level permutation have been suggested and shown promising results. Due to the diffusion effect introduced in the permutation stage, the workload of the time-consuming diffusion stage is reduced, and hence the performance of the cryptosystem is improved. In this paper, a symmetric chaos-based image cipher with a 3D cat map-based spatial bit-level permutation strategy is proposed. Compared with those recently proposed bit-level permutation methods, the diffusion effect of the new method is superior as the bits are shuffled among different bit-planes rather than within the same bit-plane. Moreover, the diffusion key stream extracted from hyperchaotic system is related to both the secret key and the plain image, which enhances the security against known/chosen plaintext attack. Extensive security analysis has been performed on the proposed scheme, including the most important ones like key space analysis, key sensitivity analysis, plaintext sensitivity analysis and various statistical analyses, which has demonstrated the satisfactory security of the proposed scheme

  13. Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm

    Science.gov (United States)

    Rachmawati, D.; Budiman, M. A.; Aulya, L.

    2018-02-01

    Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.

  14. An optimum design of R-C oscillatory De-Qing circuit

    International Nuclear Information System (INIS)

    Cao Dezhang; Pan Linghe; Yang Tianlu

    1990-01-01

    An optimum design of R-C oscillatory De-Qing circuit has been developed for voltage regulation of the pulse modulator. When a new coefficient T 3 /T is introduced, the selection of De-Qing circuit parameters will become quite simple and the optimum parameters can be calculated directly. The De-Qing circuit parameters calculated will be effective in the whole range of the percentage regulation η from zero to maximum design value. The limit value of η is 0.36 or 0.29, theoretically, when the time constant of the De-Qing circuit is 3RC or 5RC respectively

  15. PDF file encryption on mobile phone using super-encryption of Variably Modified Permutation Composition (VMPC) and two square cipher algorithm

    Science.gov (United States)

    Rachmawati, D.; Budiman, M. A.; Atika, F.

    2018-03-01

    Data security is becoming one of the most significant challenges in the digital world. Retrieval of data by unauthorized parties will result in harm to the owner of the data. PDF data are also susceptible to data security disorder. These things affect the security of the information. To solve the security problem, it needs a method to maintain the protection of the data, such as cryptography. In cryptography, several algorithms can encode data, one of them is Two Square Cipher algorithm which is a symmetric algorithm. At this research, Two Square Cipher algorithm has already developed into a 16 x 16 key aims to enter the various plaintexts. However, for more enhancement security it will be combined with the VMPC algorithm which is a symmetric algorithm. The combination of the two algorithms is called with the super-encryption. At this point, the data already can be stored on a mobile phone allowing users to secure data flexibly and can be accessed anywhere. The application of PDF document security on this research built by Android-platform. At this study will also calculate the complexity of algorithms and process time. Based on the test results the complexity of the algorithm is θ (n) for Two Square Cipher and θ (n) for VMPC algorithm, so the complexity of the super-encryption is also θ (n). VMPC algorithm processing time results quicker than on Two Square Cipher. And the processing time is directly proportional to the length of the plaintext and passwords.

  16. A New Structural-Differential Property of 5-Round AES

    DEFF Research Database (Denmark)

    Grassi, Lorenzo; Rechberger, Christian; Ronjom, Sondre

    2017-01-01

    AES is probably the most widely studied and used block cipher. Also versions with a reduced number of rounds are used as a building block in many cryptographic schemes, e.g. several candidates of the SHA-3 and CAESAR competition are based on it.So far, non-random properties which are independent ...... a random permutation with only 2 32 chosen texts that has a computational cost of 2(35.6) look-ups into memory of size 2 36 bytes which has a success probability greater than 99%....

  17. Secure transmission of images based on chaotic systems and cipher block chaining

    Science.gov (United States)

    Lakhani, Mahdieh Karimi; Behnam, Hamid; Karimi, Arash

    2013-01-01

    The ever-growing penetration of communication networks, digital and Internet technologies in our everyday lives has the transmission of text data, as well as multimedia data such as images and videos, possible. Digital images have a vast usage in a number of applications, including medicine and providing security authentication, for example. This applicability becomes evident when images, such as walking or people's facial features, are utilized in their identification. Considering the required security level and the properties of images, different algorithms may be used. After key generation using logistic chaos signals, a scrambling function is utilized for image agitation in both horizontal and vertical axes, and then a block-chaining mode of operation may be applied to encrypt the resultant image. The results demonstrate that using the proposed method drastically degrades the correlation between the image components and also the entropy is increased to an acceptable level. Therefore, the image will become greatly resistant to differential attacks. However, the increasing scrambling rounds and the decreasing number of bits of the blocks result in increasing the entropy and decreasing the correlation.

  18. Radiolabelling of RC-160: preliminary results

    International Nuclear Information System (INIS)

    Verdera, E.S.; Balter Binsky, H.S.; Robles, A.M.; Rodriguez, G.; Souto, B.; Laiz, J.; Oliver, P.; Leon, E.

    1998-01-01

    Vapreotide (RC-160) was labelled with 125 I using Chloramine-T and Iodogen methods and with 99m Tc by a direct method with sodium ditionite as reducing agent in the presence of ascorbic acid. Several methods of purification and quality control were evaluated. Yields of the reactions and of purification steps were calculated. The results obtained for the radioiodination reactions showed higher yields when limiting Chloramine-T method was used. Labelling of RC-160 with 99m Tc indicated better yields when high radioactivity concentration of the radionuclide was used. Stability of the products obtained was assessed at different post-labelling times by selected quality control methods: Sep-Pak cartridge as purification method and chromatography by RP-HPLC and ITLC-SG using saline solution as solvent. It was demonstrated that I-125-RC-160 and Tc-99m-RC-160 were stable during five weeks (at -20 deg. C) and 6 hours (at room temperature) respectively. Preliminary biodistribution of Tc-99m-RC-160 in normal rats and mice were done showing different biological behaviour compared with control animals injected with pertechnetate. In conclusion, RC-160 was successfully labelled with both radionuclides, with radiochemical purity higher than 95%. These results encourage further research work in animal models as well as to investigate the biochemical behaviour of radiolabelled peptide. (author)

  19. Formulation development of retrocyclin 1 analog RC-101 as an anti-HIV vaginal microbicide product.

    Science.gov (United States)

    Sassi, A B; Cost, M R; Cole, A L; Cole, A M; Patton, D L; Gupta, P; Rohan, L C

    2011-05-01

    RC-101 is a synthetic microbicide analog of retrocyclin, which has shown in vitro activity against X4 and R5 HIV-1. In an effort to develop a safe and effective RC-101 vaginal microbicide product, we assessed safety in ex vivo macaque and human models and efficacy using in vitro and ex vivo models. A polyvinyl-alcohol vaginal film containing RC-101 (100 μg/film) was developed. Formulation assessment was conducted by evaluating disintegration, drug content, mechanical properties, and stability. Efficacy was evaluated by in vitro peripheral blood mononuclear cells (PBMC) assay and ex vivo human ectocervical tissue explant model. Ex vivo safety studies were conducted by exposing RC-101 to an excised monkey reproductive tract and excised human ectocervical tissue. RC-101 100 μg films were shown to be safe to human and monkey tissue and effective against HIV-1 in vitro and ex vivo in human ectocervical tissue. The 90% inhibitory concentration (IC90) for RC-101 films at 2,000 μg (IC90=57.5 μM) using an ex vivo model was 10-fold higher than the IC90 observed using an in vitro model (IC90=5.0 μM). RC-101 films were stable for 1 month at 25°C, with in vitro bioactivity maintained for up to 6 months. RC-101 was developed in a quick-dissolve film formulation that was shown to be safe in an ex vivo model and effective in in vitro and ex vivo models. RC-101 film formulations were shown to maintain bioactivity for a period of 6 months. Findings from the present study contribute to the development of a safe and effective topical microbicide product.

  20. From global to heavy-light: 5-point conformal blocks

    International Nuclear Information System (INIS)

    Alkalaev, Konstantin; Belavin, Vladimir

    2016-01-01

    We consider Virasoro conformal blocks in the large central charge limit. There are different regimes depending on the behavior of the conformal dimensions. The most simple regime is reduced to the global sl(2,ℂ) conformal blocks while the most complicated one is known as the classical conformal blocks. Recently, Fitzpatrick, Kaplan, and Walters showed that the two regimes are related through the intermediate stage of the so-called heavy-light semiclassical limit. We study this idea in the particular case of the 5-point conformal block. To find the 5-point global block we use the projector technique and the Casimir operator approach. Furthermore, we discuss the relation between the global and the heavy-light limits and construct the heavy-light block from the global block. In this way we reproduce our previous results for the 5-point perturbative classical block obtained by means of the monodromy method.

  1. X-ray irradiation of RC-MAP pre-stored for various numbers of days. Effect of X-ray irradiation on RC-MAP and reuse of RC-MAP after irradiation

    International Nuclear Information System (INIS)

    Yamada, Naotomo; Nagumo, Fumio; Kawasaki, Seiji; Matsuzaki, Miwako; Tadano, Jutaro

    1995-01-01

    X-ray irradiation is currently in wide use as a means of preventing post-transfusion graft-versus-host disease (PT-GVHD). In this study, we evaluated the effects of X-ray irradiation on RC-MAP pre-stored for various numbers of days, and assessed how long irradiated RC-MAP can be stored. RC-MAP was irradiated at a dosage of 15 Gy at 1, 7, 14, 21 or 28 days after blood collection. These specimens were referred to as group I, II, III, IV and V (X-ray-irradiated groups), respectively. Non-irradiated RC-MAP was used as the control. Results showed that plasma K concentration increased after X-ray irradiation. It is therefore advisable that RC-MAPs be used immediately in infants and in renal failure. However, to maximize the efficiency of blood product use, it seemed possible that groups I and II could be used within two weeks after irradiation, and group III within one week. On the basis of this increase in K concentration, however, groups IV and V plasma should be used immediately after irradiation. (author)

  2. Understanding and applying cryptography and data security

    CERN Document Server

    Elbirt, Adam J

    2009-01-01

    Introduction A Brief History of Cryptography and Data Security Cryptography and Data Security in the Modern World Existing Texts Book Organization Symmetric-Key Cryptography Cryptosystem Overview The Modulo Operator Greatest Common Divisor The Ring ZmHomework ProblemsSymmetric-Key Cryptography: Substitution Ciphers Basic Cryptanalysis Shift Ciphers Affine Ciphers Homework ProblemsSymmetric-Key Cryptography: Stream Ciphers Random Numbers The One-Time Pad Key Stream GeneratorsReal-World ApplicationsHomework ProblemsSymmetric-Key Cryptography: Block Ciphers The Data Encryption StandardThe Advance

  3. 47 CFR 95.221 - (R/C Rule 21) How do I have my R/C transmitter serviced?

    Science.gov (United States)

    2010-10-01

    ... FCC certificated R/C transmitter (see R/C Rule 9) must be made in accord with the Technical... in order to: (1) Adjust a transmitter to an antenna; (2) Detect or measure radiation of energy other...

  4. The calcium-dependent protein kinase RcCDPK2 phosphorylates sucrose synthase at Ser11 in developing castor oil seeds.

    Science.gov (United States)

    Fedosejevs, Eric T; Gerdis, Suzanne A; Ying, Sheng; Pyc, Michal; Anderson, Erin M; Snedden, Wayne A; Mullen, Robert T; She, Yi-Min; Plaxton, William C

    2016-10-15

    Imported sucrose is cleaved by sucrose synthase (SUS) as a critical initial reaction in the biosynthesis of storage end-products by developing seeds. Although SUS is phosphorylated at a conserved seryl residue by an apparent CDPK (Ca 2+ -dependent protein kinase) in diverse plant tissues, the functions and mechanistic details of this process remain obscure. Thus, the native CDPK that phosphorylates RcSUS1 (Ricinus communis SUS1) at Ser 11 in developing COS (castor oil seeds) was highly purified and identified as RcCDPK2 by MS/MS. Purified RcSUS1-K (-kinase) and heterologously expressed RcCDPK2 catalyzed Ca 2+ -dependent Ser 11 phosphorylation of RcSUS1 and its corresponding dephosphopeptide, while exhibiting a high affinity for free Ca 2+ ions [K 0.5 (Ca 2+ ) < 0.4 µM]. RcSUS1-K activity, RcCDPK2 expression, and RcSUS1 Ser 11 phosphorylation peaked during early COS development and then declined in parallel. The elimination of sucrose import via fruit excision triggered RcSUS1 dephosphorylation but did not alter RcSUS1-K activity, suggesting a link between sucrose signaling and posttranslational RcCDPK2 control. Both RcCDPK2-mCherry and RcSUS1-EYFP co-localized throughout the cytosol when transiently co-expressed in tobacco suspension cells, although RcCDPK2-mCherry was also partially localized to the nucleus. Subcellular fractionation revealed that ∼20% of RcSUS1-K activity associates with microsomal membranes in developing COS, as does RcSUS1. In contrast with RcCDPK1, which catalyzes inhibitory phosphorylation of COS bacterial-type phosphoenolpyruvate carboxylase at Ser 451 , RcCDPK2 exhibited broad substrate specificity, a wide pH-activity profile centered at pH 8.5, and insensitivity to metabolite effectors or thiol redox status. Our combined results indicate a possible link between cytosolic Ca 2+ -signaling and the control of photosynthate partitioning during COS development. © 2016 The Author(s); published by Portland Press Limited on behalf of the

  5. Cryptanalysis of SIMON Variants with Connections

    DEFF Research Database (Denmark)

    Alizadeh, Javad; Alkhzaimi, Hoda A.; Aref, Mohammad Reza

    2014-01-01

    SIMON is a family of 10 lightweight block ciphers published by Beaulieu et al. from the United States National Security Agency (NSA). A cipher in this family with K-bit key and N-bit block is called SIMONN/K. We present several linear characteristics for reduced-round SIMON32/64 that can be used ...

  6. Fast encryption of image data using chaotic Kolmogorov flows

    Science.gov (United States)

    Scharinger, Josef

    1998-04-01

    To guarantee security and privacy in image and video archival applications, efficient bulk encryption techniques are necessary which are easily implementable in soft- and hardware and are able to cope with the vast amounts of data involved. Experience has shown that block-oriented symmetric product ciphers constitute an adequate design paradigm for resolving this task, since they can offer a very high level of security as well as very high encryption rates. In this contribution we introduce a new product cipher which encrypts large blocks of plain text by repeated intertwined application of substitution and permutation operations. While almost all of the current product ciphers use fixed permutation operations on small data blocks, our approach involves parametrizable permutations on large data blocks induced by specific chaotic systems. By combining these highly unstable dynamics with an adaption of a very fast shift register based pseudo-random number generator, we obtain a new class of computationally secure product ciphers which offer many features that make them superior to contemporary bulk encryption systems when aiming at efficient image and video data encryption.

  7. Fractional-order RC and RL circuits

    KAUST Repository

    Radwan, Ahmed Gomaa

    2012-05-30

    This paper is a step forward to generalize the fundamentals of the conventional RC and RL circuits in fractional-order sense. The effect of fractional orders is the key factor for extra freedom, more flexibility, and novelty. The conditions for RC and RL circuits to act as pure imaginary impedances are derived, which are unrealizable in the conventional case. In addition, the sensitivity analyses of the magnitude and phase response with respect to all parameters showing the locations of these critical values are discussed. A qualitative revision for the fractional RC and RL circuits in the frequency domain is provided. Numerical and PSpice simulations are included to validate this study. © Springer Science+Business Media, LLC 2012.

  8. Structural Test and Analysis of RC Slab After Fire Loading

    International Nuclear Information System (INIS)

    Chung, Chulhun; Im, Cho Rong; Park, Jaegyun

    2013-01-01

    In the present study the behavior of fire and the residual strength of fire-ignited RC slabs are investigated by experimental tests and numerical simulations. The fire tests of RC slabs were carried out in a furnace using the ISO 834 standard fire. The load capacity of the cooled RC slabs that were not loaded during the fire tests was evaluated by additional 3 point bending tests. The influence of the proportion of PP (polypropylene) fibers in the RC slabs on the structural behavior of the RC slabs after the fire loading was investigated. The results of the fire tests showed that the maximum temperature of concrete with PP fiber was lower than that of concrete without PP fiber. As the concrete was heated, the ultimate compressive strength decreased and the ultimate strain increased. The load-deflection relations of RC slabs after fire loading were compared by using existing stress-strain-temperature models. The comparison between the numerical analysis and the experimental tests showed that some numerical analyses were reliable and therefore, can be applied to evaluate the ultimate load of RC slabs after fire loading. The ultimate load capacity after cooling down the RC slabs without PP fiber showed a considerable reduction from that of the RC slabs with PP fiber

  9. Structural Test and Analysis of RC Slab After Fire Loading

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Chulhun; Im, Cho Rong; Park, Jaegyun [Dankook Univ., Yongin (Korea, Republic of)

    2013-04-15

    In the present study the behavior of fire and the residual strength of fire-ignited RC slabs are investigated by experimental tests and numerical simulations. The fire tests of RC slabs were carried out in a furnace using the ISO 834 standard fire. The load capacity of the cooled RC slabs that were not loaded during the fire tests was evaluated by additional 3 point bending tests. The influence of the proportion of PP (polypropylene) fibers in the RC slabs on the structural behavior of the RC slabs after the fire loading was investigated. The results of the fire tests showed that the maximum temperature of concrete with PP fiber was lower than that of concrete without PP fiber. As the concrete was heated, the ultimate compressive strength decreased and the ultimate strain increased. The load-deflection relations of RC slabs after fire loading were compared by using existing stress-strain-temperature models. The comparison between the numerical analysis and the experimental tests showed that some numerical analyses were reliable and therefore, can be applied to evaluate the ultimate load of RC slabs after fire loading. The ultimate load capacity after cooling down the RC slabs without PP fiber showed a considerable reduction from that of the RC slabs with PP fiber.

  10. Mouse RC/BTB2, a Member of the RCC1 Superfamily, Localizes to Spermatid Acrosomal Vesicles

    Science.gov (United States)

    Shen, Xuening; Nagarkatti-Gude, David R.; Hess, Rex A.; Henderson, Scott C.; Strauss, Jerome F.; Zhang, Zhibing

    2012-01-01

    Mouse RC/BTB2 is an unstudied protein of the RCC1 (Regulator of Chromosome Condensation) superfamily. Because of the significant remodeling of chromatin that occurs during spermiogenesis, we characterized the expression and localization of mouse RC/BTB2 in the testis and male germ cells. The Rc/btb2 gene yields two major transcripts: 2.3 kb Rc/btb2-s, present in most somatic tissues examined; and 2.5 kb Rc/btb2-t, which contains a unique non-translated exon in its 5′-UTR that is only detected in the testis. During the first wave of spermatogenesis, Rc/btb2-t mRNA is expressed from day 8 after birth, reaching highest levels of expression at day 30 after birth. The full-length protein contains three RCC1 domains in the N-terminus, and a BTB domain in the C-terminus. In the testis, the protein is detectable from day 12, but is progressively up-regulated to day 30 and day 42 after birth. In spermatids, some of the protein co-localizes with acrosomal markers sp56 and peanut lectin, indicating that it is an acrosomal protein. A GFP-tagged RCC1 domain is present throughout the cytoplasm of transfected CHO cells. However, both GFP-tagged, full-length RC/BTB2 and a GFP-tagged BTB domain localize to vesicles in close proximity to the nuclear membrane, suggesting that the BTB domain might play a role in mediating full-length RC/BTB2 localization. Since RCC1 domains associate with Ran, a small GTPase that regulates molecular trafficking, it is possible that RC/BTB2 plays a role in transporting proteins during acrosome formation. PMID:22768142

  11. Altitmeter for RC aircraft models

    OpenAIRE

    Švec, Jan

    2012-01-01

    Předmětem mé bakalářské práce je návrh výškoměru, který využívá pro záznam letové polohy modelu RC letadla vyhodnocování aktuálního atmosferického tlaku. Údaje jsou po dobu letu ukládány do paměti, odkud je možné je po skončení záznamu přes rozhraní USB uložit v PC. Software na PC zajišťuje komunikaci se zařízením a přepočet zaznamenaného tlaku na nadmořskou výšku RC modelu. The aim of my bachelor thesis is to design a altimeter, who uses to record the attitude of the model "RC plane" eval...

  12. Impact response of RC rock-shed girder with sand cushion under falling load

    International Nuclear Information System (INIS)

    Bhatti, Abdul Qadir; Kishi, Norimitsu

    2010-01-01

    Research highlights: → An applicability of FE model of RC girders with sand cushion has been investigated. → Experimental and numerical results of Impact force, reaction force and displacement have been performed. → Cracks obtained from numerical models are in good agreement with the experimental ones. → Reaction force-displacement loops agree well between numerical and experimental results. → The configuration of the hysteretic loop at failure of RC girders can be approximated by a parallelogram. - Abstract: In order to establish a proper finite element model of prototype RC girder with sand element for impact response analysis, dynamic response analysis of RC girders with sand cushion subjected to impact force due to weight falling from the height of H = 2.5, 5, 7.5 and 10 m was performed to improve the state of the art of protective design for real scale rock-sheds by using LS-DYNA code. An applicability of proposed model was discussed comparing with experimental results (e.g. impact force, reaction force and displacement waves). From this study, dynamic characteristics of impact response can be better simulated by using the proposed model. As a result, when the sand cushion was set up, the impact force, reaction force, mid-span displacement waves, distribution of reaction force-displacement loops, and crack patterns obtained from the numerical analysis are in good agreement with those from the experimental results.

  13. A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator

    Science.gov (United States)

    Tong, Xiaojun; Cui, Minggen; Wang, Zhu

    2009-07-01

    The design of the new compound two-dimensional chaotic function is presented by exploiting two one-dimensional chaotic functions which switch randomly, and the design is used as a chaotic sequence generator which is proved by Devaney's definition proof of chaos. The properties of compound chaotic functions are also proved rigorously. In order to improve the robustness against difference cryptanalysis and produce avalanche effect, a new feedback image encryption scheme is proposed using the new compound chaos by selecting one of the two one-dimensional chaotic functions randomly and a new image pixels method of permutation and substitution is designed in detail by array row and column random controlling based on the compound chaos. The results from entropy analysis, difference analysis, statistical analysis, sequence randomness analysis, cipher sensitivity analysis depending on key and plaintext have proven that the compound chaotic sequence cipher can resist cryptanalytic, statistical and brute-force attacks, and especially it accelerates encryption speed, and achieves higher level of security. By the dynamical compound chaos and perturbation technology, the paper solves the problem of computer low precision of one-dimensional chaotic function.

  14. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations (Extended Abstract)

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Knudsen, L.R.; Leander, Gregor

    2012-01-01

    show that the distribution of Fourier coefficients for the cipher over all keys is close to ideal. Lastly, we define a practical instance of the construction with t = 2 using AES referred to as AES2. Any attack on AES2 with complexity below 285 will have to make use of AES with a fixed known key...

  15. Defense in Depth Added to Malicious Activities Simulation Tools (MAST)

    Science.gov (United States)

    2015-09-01

    5 a. Triple Data Encryption Standard (3DES)..............................13 b. Advanced Encryption Standard ( AES ...10 Figure 4. DES Encryption , from [5] ................................................................................12 Figure 5. AES Encryption ...Associated Data AES Advanced Encryption System CBC Cipher Block Chaining DES Data Encryption Standard DOD Department of Defense DSA Digital Signature

  16. Delayed release formulation of the somatostatin analog RC-160 inhibits the growth hormone (GH) response to GH-releasing factor-(1-29)NH2 and decreases elevated prolactin levels in rats.

    Science.gov (United States)

    Bokser, L; Schally, A V

    1988-10-01

    Recently, we have developed a long-acting delivery system for our somatostatin (SS) analog RC-160 based on injectable microcapsules in poly-(D,L-lactide-coglycolide). We studied the capacity of this formulation to repeatedly block the GH secretion induced by administration of GRF-(1-29)NH2 (GRF) on different days. Male rats anesthetized with pentobarbital were injected iv with 2.5 micrograms/kg BW GRF-(1-29)NH2 or saline. Five minutes later, blood samples were taken for GH measurement, and the animals were injected im with RC-160 microcapsules at a dose calculated to release 25 micrograms/day of the analog for 7 days or with the vehicle. The GRF stimuli were repeated 48 h, 96 h, and 8 days after administration of SS analog in microcapsules. GRF administration increased GH levels at the four times tested (P less than 0.01) in the control group injected with vehicle, while RC-160 microcapsules inhibited the GH response for more than 96 h (P less than 0.01). The GH levels augmented by pentobarbital were also decreased by the RC-160 microcapsules (P less than 0.01). Animals treated with microcapsules showed smaller increases in their body weight than untreated rats (P less than 0.05). We also investigated the effect of RC-160 microcapsules on hyperprolactinemic female rats implanted with pituitary glands under the kidney capsules. High PRL levels in rats bearing pituitary grafts showed a significant decrease when measured 4 days after the administration of RC-160 microcapsules. These results demonstrate the efficacy of the long-acting delivery system of the SS analog RC-160 and suggest the possible clinical usefulness of this formulation for lowering GH and PRL levels.

  17. Experiment and simulation of double-layered RC plates under impact loadings. Part 1: Impact tests for double-layered RC plates

    International Nuclear Information System (INIS)

    Shirai, T.; Ueda, M.; Taniguchi, H.; Kambayashi, A.; Ohno, T.; Ishikawa, N.

    1993-01-01

    At a nuclear power plant facility, it should be of interest and important problem to ensure structures against impact loads induced by projectile impacts or plant-internal accidents. It has been well known that local damage consists of spalling of concrete from the impacted area and scabbing of concrete from the back face of the target together with projectile penetration into the target. There are several techniques for improving the impact resistance of RC slabs, that is, lining with a steel plate on the impacted and/or rear face of the slab, making the slab a double-layered composite slab with an elastic absorber and employing a fiber reinforced concrete or a high-strength concrete as the slab materials. Of the many measures available for withstanding impact loads, the use of a double-layered reinforced concrete (RC) slab with absorber is expected to have the higher resistance in reducing or preventing local damage. This paper presents the results of an experimental investigation on the impact resistance of double-layered RC plates subjected to the impact of projectile. In the experiment, the effects of two parameters; the combination of two RC plates having different thicknesses and the existence of an absorber in the middle layer, are mainly investigated. And, the effects of the concrete thickness (7,9 and 11 cm) and the concrete strength (a normal-:35MPa, a lightweight-:40MPa and a high-strength:57MPa) of target were also examined. RC plates, 0.6m-square, were used for test specimens. The projectile has a mass of 0.43kg, made of steel with a flat nose. An average projectile velocity was about 170m/sec. A rubber plate shaped into a square with the same size of RC plate was used for a double-layered specimen as an absorber which was put between two RC plates. It could be concluded that double-layering and presence of an absorber had a considerable effect on the increase of impact resistance of RC plate. In order to reduce local damage, it is more effective to

  18. ASC-1

    DEFF Research Database (Denmark)

    Jakimoski, Goce; Khajuria, Samant

    2011-01-01

    uses leak extraction from diÆerent AES rounds to compute the key material that is XOR-ed with the message to compute the ciphertext. Unlike LEX, the ASC-1 operates in a CFB fashion to compute an authentication tag over the encrypted message. We argue that ASC-1 is secure by reducingits (IND-CCA , INT......The goal of the modes of operation for authenticated encryption is to achieve faster encryption and message authentication by performing both the encryption and the message authentication in a single pass as opposed to the traditional encrypt-then-mac approach, which requires two passes....... Unfortunately, the use of a block cipher as a building block limits the performance of the authenticated encryption schemes to at most one message block per block cipher evaluation. In this paper, we propose the authenticated encryption scheme ASC-1 (Authenticating Stream Cipher One). Similarly to LEX, ASC-1...

  19. Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Khurram Khan

    2011-01-01

    Full Text Available Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withstand key stream attack. To improve its security, this paper proposes a novel chaotic map based block cryptosystem. At the same time, a secure architecture for camera sensor network is constructed. The network comprises a set of inexpensive camera sensors to capture the images, a sink node equipped with sufficient computation and storage capabilities and a data processing server. The transmission security between the sink node and the server is gained by utilizing the improved cipher. Both theoretical analysis and simulation results indicate that the improved algorithm can overcome the flaws and maintain all the merits of the original cryptosystem. In addition, computational costs and efficiency of the proposed scheme are encouraging for the practical implementation in the real environment as well as camera sensor network.

  20. Performance of RC columns with partial length corrosion

    International Nuclear Information System (INIS)

    Wang Xiaohui; Liang Fayun

    2008-01-01

    Experimental and analytical studies on the load capacity of reinforced concrete (RC) columns with partial length corrosion are presented, where only a fraction of the column length was corroded. Twelve simply supported columns were eccentrically loaded. The primary variables were partial length corrosion in tensile or compressive zone and the corrosion level within this length. The failure of the corroded column occurs in the partial length, mainly developed from or located nearby or merged with the longitudinal corrosion cracks. For RC column with large eccentricity, load capacity of the column is mainly influenced by the partial length corrosion in tensile zone; while for RC column with small eccentricity, load capacity of the column greatly decreases due to the partial length corrosion in compressive zone. The destruction of the longitudinally mechanical integrality of the column in the partial length leads to this great reduction of the load capacity of the RC column

  1. The Return of the Boomerang

    OpenAIRE

    Murphy, Sean

    2010-01-01

    The boomerang analysis, together with its offspring the amplified boomerang analysis and the rectangle analysis, are techniques that are widely used in the analysis of block ciphers. We give realistic examples which demonstrate that the boomerang analysis can commonly give probability values that are highly inaccurate. Thus any complexity estimates for the security of a block cipher based on the boomerang or rectangle analysis must be viewed extremely sceptically.

  2. Decommissioning of blocks 1 to 5 of the Greifswald NPS (KGR)

    International Nuclear Information System (INIS)

    Bauer, S.; King, A.J.; Koehler, G.; Bernhagen, A.; Friedrich, W.

    1992-01-01

    A study group has prepared a decommissioning and demolition concept for blocks 1 - 5 of the Greifswald NPS. In all, the Greifswald NPS comprises 8 double-blocks (some under construction) of the Russian reactor type WWER 440 (pressure water reactor).After differing operating times, the two oldest double-blocks 1/2 and 3/4 were finally shut down in 1990. The double blocks are almost identical. This document is divided into two parts, i.e. the technical concept which describes the technical procedure for decommissioning and demolishing blocks 1 - 5 and a development concept which contains costs, schedules and estimated manpower requirements. (Author)

  3. Dragon Stream Cipher for Secure Blackbox Cockpit Voice Recorder

    Science.gov (United States)

    Akmal, Fadira; Michrandi Nasution, Surya; Azmi, Fairuz

    2017-11-01

    Aircraft blackbox is a device used to record all aircraft information, which consists of Flight Data Recorder (FDR) and Cockpit Voice Recorder (CVR). Cockpit Voice Recorder contains conversations in the aircraft during the flight.Investigations on aircraft crashes usually take a long time, because it is difficult to find the aircraft blackbox. Then blackbox should have the ability to send information to other places. Aircraft blackbox must have a data security system, data security is a very important part at the time of information exchange process. The system in this research is to perform the encryption and decryption process on Cockpit Voice Recorder by people who are entitled by using Dragon Stream Cipher algorithm. The tests performed are time of data encryption and decryption, and avalanche effect. Result in this paper show us time encryption and decryption are 0,85 seconds and 1,84 second for 30 seconds Cockpit Voice Recorder data witn an avalanche effect 48,67 %.

  4. Experimental investigations on a cascaded steam-/organic-Rankine-cycle (RC/ORC) system for waste heat recovery (WHR) from diesel engine

    International Nuclear Information System (INIS)

    Yu, Guopeng; Shu, Gequn; Tian, Hua; Huo, Yongzhan; Zhu, Weijie

    2016-01-01

    Highlights: • A novel cascaded RC/ORC system was constructed for WHR of a heavy-duty diesel engine. • The RC/ORC system was experimentally investigated under engine operating conditions. • Good system stability and satisfying thermal states of working fluids were observed. • The power increment can reach up to 5.6% by equipping the novel cascaded RC/ORC system. - Abstract: A novel cascaded RC/ORC system that comprises a steam Rankine cycle as the high-temperature loop (H-RC) and an organic Rankine cycle as the low-temperature loop (L-ORC) was constructed and experimentally investigated to recover waste heat from exhaust gas of a heavy-duty diesel engine (DE). By monitoring key parameters of the RC/ORC system against time, good system stability and satisfying thermal states of working fluids were observed. Impacts that the engine operations have on this proposed waste-heat-recovery (WHR) system were studied, indicating that waste heat recovered from the gas increases gradually and greatly as the engine load increases, yet decreases slightly as the speed grows. At full loads at speeds lower than 2050 rpm, up to 101.5 kW of waste heat can be abstracted from the gas source, showing a promising heat transfer potential. Besides, observations of key exergy states as well as estimations and comparisons of potential output power were carried out stepwise. Results indicated that up to 12.7 kW of output power could be obtained by the novel RC/ORC system under practical estimations. Comparing to the basic diesel engine, the power increment reaches up to 5.6% by equipping the cascaded RC/ORC system.

  5. A new cryptosystem based on chaotic map and operations algebraic

    International Nuclear Information System (INIS)

    Yang Huaqian; Liao Xiaofeng; Wong, Kwok-wo; Zhang Wei; Wei Pengcheng

    2009-01-01

    Based on the study of some existing chaotic encryption algorithms, a new block cipher is proposed. The proposed cipher encrypts 128-bit plaintext to 128-bit ciphertext blocks, using a 128-bit key K and the initial value x 0 and the control parameter mu of logistic map. It consists of an initial permutation and eight computationally identical rounds followed by an output transformation. Round r uses a 128-bit roundkey K (r) to transform a 128-bit input C (r-1) , which is fed to the next round. The output after round 8 enters the output transformation to produce the final ciphertext. All roundkeys are derived from K and a 128-bit random binary sequence generated from a chaotic map. Analysis shows that the proposed block cipher does not suffer from the flaws of pure chaotic cryptosystems and possesses high security.

  6. CMOS-based active RC sinusoidal oscillator with four-phase quadrature outputs and single-resistance-controlled (SRC) tuning laws

    OpenAIRE

    Lahiri, Abhirup; Herencsár, Norbert

    2012-01-01

    This paper proposes a very compact CMOS realization of active RC sinusoidal oscillator capable of generating four quadrature voltage outputs. The oscillator is based on the cascade of lossless and lossy integrators in loop. The governing laws for the condition of oscillation (CO) and the frequency of oscillation (FO) are single-resistance-controlled (SRC) and which allow independent FO tuning. Unlike previously reported SRC-based sinusoidal oscillators based on the active building block (ABB)...

  7. Optical stream-cipher-like system for image encryption based on Michelson interferometer.

    Science.gov (United States)

    Yang, Bing; Liu, Zhengjun; Wang, Bo; Zhang, Yan; Liu, Shutian

    2011-01-31

    A novel optical image encryption scheme based on interference is proposed. The original image is digitally encoded into one phase-only mask by employing an improved Gerchberg-Saxton phase retrieval algorithm together with another predefined random phase mask which serves as the encryption key. The decryption process can be implemented optically based on Michelson interferometer by using the same key. The scheme can be regarded as a stream-cipher-like encryption system, the encryption and decryption keys are the same, however the operations are different. The position coordinates and light wavelength can also be used as additional keys during the decryption. Numerical simulations have demonstrated the validity and robustness of the proposed method.

  8. Analysis and optimization of RC delay in vertical nanoplate FET

    Science.gov (United States)

    Woo, Changbeom; Ko, Kyul; Kim, Jongsu; Kim, Minsoo; Kang, Myounggon; Shin, Hyungcheol

    2017-10-01

    In this paper, we have analyzed short channel effects (SCEs) and RC delay with Vertical nanoplate FET (VNFET) using 3-D Technology computer-aided design (TCAD) simulation. The device is based on International Technology Road-map for Semiconductor (ITRS) 2013 recommendations, and it has initially gate length (LG) of 12.2 nm, channel thickness (Tch) of 4 nm, and spacer length (LSD) of 6 nm. To obtain improved performance by reducing RC delay, each dimension is adjusted (LG = 12.2 nm, Tch = 6 nm, LSD = 11.9 nm). It has each characteristic in this dimension (Ion/Ioff = 1.64 × 105, Subthreshold swing (S.S.) = 73 mV/dec, Drain-induced barrier lowering (DIBL) = 60 mV/V, and RC delay = 0.214 ps). Furthermore, with long shallow trench isolation (STI) length and thick insulator thickness (Ti), we can reduce RC delay from 0.214 ps to 0.163 ps. It is about a 23.8% reduction. Without decreasing drain current, there is a reduction of RC delay as reducing outer fringing capacitance (Cof). Finally, when source/drain spacer length is set to be different, we have verified RC delay to be optimum.

  9. An under-designed RC frame: Seismic assessment through displacement based approach and possible refurbishment with FRP strips and RC jacketing

    Science.gov (United States)

    Valente, Marco; Milani, Gabriele

    2017-07-01

    Many existing reinforced concrete buildings in Southern Europe were built (and hence designed) before the introduction of displacement based design in national seismic codes. They are obviously highly vulnerable to seismic actions. In such a situation, simplified methodologies for the seismic assessment and retrofitting of existing structures are required. In this study, a displacement based procedure using non-linear static analyses is applied to a four-story existing RC frame. The aim is to obtain an estimation of its overall structural inadequacy as well as the effectiveness of a specific retrofitting intervention by means of GFRP laminates and RC jacketing. Accurate numerical models are developed within a displacement based approach to reproduce the seismic response of the RC frame in the original configuration and after strengthening.

  10. The Second ICASE/LaRC Industry Roundtable: Session Proceedings

    Science.gov (United States)

    Girimaji, Sharath

    1997-01-01

    The second ICASE/LaRC Industry Roundtable was held October 7-9, 1996 at the Williamsburg Hospitality House, Williamsburg, Virginia. Like the first roundtable in 1994, this meeting had two objectives: (1) to expose ICASE and LaRC scientists to industrial research agendas; and (2) to acquaint industry with the capabilities and technology available at ICASE, LaRC and academic partners of ICASE. Nineteen sessions were held in three parallel tracks. Of the 170 participants, over one third were affiliated with various industries. Proceedings from the different sessions are summarized in this report.

  11. Extended substitution-diffusion based image cipher using chaotic standard map

    Science.gov (United States)

    Kumar, Anil; Ghose, M. K.

    2011-01-01

    This paper proposes an extended substitution-diffusion based image cipher using chaotic standard map [1] and linear feedback shift register to overcome the weakness of previous technique by adding nonlinearity. The first stage consists of row and column rotation and permutation which is controlled by the pseudo-random sequences which is generated by standard chaotic map and linear feedback shift register, second stage further diffusion and confusion is obtained in the horizontal and vertical pixels by mixing the properties of the horizontally and vertically adjacent pixels, respectively, with the help of chaotic standard map. The number of rounds in both stage are controlled by combination of pseudo-random sequence and original image. The performance is evaluated from various types of analysis such as entropy analysis, difference analysis, statistical analysis, key sensitivity analysis, key space analysis and speed analysis. The experimental results illustrate that performance of this is highly secured and fast.

  12. A monolithic constant-fraction discriminator using distributed R-C delay-line shaping

    International Nuclear Information System (INIS)

    Simpson, M.L.; Young, G.R.; Xu, M.

    1995-01-01

    A monolithic, CMOS, constant-fraction discriminator (CFD) was fabricated in the Orbit Semiconductor, 1.2 μ N-well process. This circuit uses an on-chip, distributed, R-C delay-line to realize the constant-fraction shaping. The delay-line is constructed from a narrow, 500-μ serpentine layer of polysilicon above a wide, grounded, second layer of polysilicon. This R-C delay-line generates about 1.1 ns of delay for 5 ns risetime signals with a slope degradation of only ≅ 15% and an amplitude reduction of about 6.1%. The CFD also features an automatic walk adjustment. The entire circuit, including the delay line, has a 200 μ pitch and is 950 μ long. The walk for a 5 ns risetime signal was measured as ± 100 ps over the 100:1 dynamic range from -15 mV to -1.5 mV. to -1.5 V. The CFD consumes 15 mW

  13. Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012

    OpenAIRE

    Roy, Arnab; Venkatesh, Srinivas Vivek

    2013-01-01

    Masking is a well-known technique used to prevent block cipher implementations from side-channel attacks. Higher-order side channel attacks (e.g. higher-order DPA attack) on widely used block cipher like AES have motivated the design of efficient higher-order masking schemes. Indeed, it is known that as the masking order increases, the difficulty of side-channel attack increases exponentially. However, the main problem in higher-order masking is to design an efficient and secure technique for...

  14. On the distribution of linear biases: Three instructive examples

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed; Beelen, Peter; Leander, Gregor

    2012-01-01

    , we often tend to embed a security margin - from an efficiency perspective nothing else than wasted performance. The aim of this paper is to stimulate research on these foundations of block ciphers. We do this by presenting three examples of ciphers that behave differently to what is normally assumed...

  15. ANALISIS KEAMANAN DATA PADA BLOCK CIPHER ALGORITMA KRIPTOGRAFI RSA

    Directory of Open Access Journals (Sweden)

    Fadhillah Azmi

    2017-01-01

    Full Text Available Komunikasi adalah proses dasar dari pertukaran informasi. Efektifitas komunikasikomputer secara umum adalah melalui internet atau beberapa saluran komunikasi lainnya.Tujuan utama tulisan ini adalah berdasarkan pada analisis hasil yang diberikan Weinermengatakan bahwa jika private key d digunakan dalam algoritma kriptografi RSA kurang darin292, maka sistem tersebut kurang aman. Di sini penulis menganalisa pada hasil yang diberikanoleh Weiner dan mencoba untuk meningkatkan range dari private key d sampai n0.5. Karena nadalah perkalian p dan q, yang mana bilangan relative prima. Sehingga mempengaruhi kinerjaenkripsi algoritma yang lebih aman.

  16. A numerical design approach for single amplifier, Active-RC Butterworth filter of order 5

    OpenAIRE

    Gaunholt, Hans

    2007-01-01

    A design method is presented for the design of all pole lowpass active-RC filters applying operational amplifiers. The operational amplifier model used is the integrator model: omegat/s where omegat is the unity gain frequency. The design method is used for the design of a fifth order Butterworth filter applying just one operational amplifier coupled as a unity gain amplifier. It is shown that the influence from the real operational amplifier may be reduced by trimming just one resistor in th...

  17. Design of RC frames for pre-selected collapse mechanism and ...

    Indian Academy of Sciences (India)

    In this study, total energy of RC frames is calculated and .... curvature relations of RC beam and column members are required for both ..... Case study ..... Turkish Seismic Design Code 2007 Ministry of Public Works and Settlement, Ankara.

  18. A case of hyperkalemia after transfusion of irradiated red cell concentrate in mannitol-adenine-phosphate (RC-MAP)

    International Nuclear Information System (INIS)

    Fukui, Akira; Yokota, Kimio; Aoki, Masanori; Sari, Atsuo

    1998-01-01

    A 72-year-old male, 45 kg in weight, underwent anterior and posterior fixations of the lumbar vertebra. Preanesthetic blood chemistry was within normal range. Following transfusion of 400 ml of RC-MAP in two hours (11 days after blood collection and 2 days after irradiation at a dose of 20 Gy), and then another 100 ml of 400 ml RC-MAP (12 days after blood collection and 2 days after irradiation at a dose of 20 Gy), the patient's serum kalium value increased from 4.8 to 5.5 mEq/l. Even though the transfusion was immediately discontinued, the level continued to rise to 6.0 mEq/l. It subsequently fell to the normal level with glucose-insulin therapy. The hyperkalemia in this case could have been attributable to the period of storage after irradiation, the transfusion of salvaged autologous blood, and the storage state of RC-MAP. However, since the kalium values of RC-MAP and the salvaged autologous blood were not measured in this case, the exact cause was unknown. In conclusion, hyperkalemia can occur in patients during transfusion of irradiated blood. Therefore, kalium levels should be monitored carefully. (author)

  19. The role of relational capital (RC in green supply chain management (GSCM

    Directory of Open Access Journals (Sweden)

    Claudia Viviane Viegas

    2015-09-01

    Full Text Available Green Supply Chain Management (GSCM is an emergent issue in operations management. It is addressed to intra and inter-organizational practices adoption in order to promote sustainability in supply chains. Relational Capital (RC, also an emergent issue, plays a relevant role to resize views based solely in transactions costs and resources to a relationship view leaned on governance for information, trust and longevity in relationships, looking for positive results for all the chain’s participants. This article reviews and criticizes seminal literature on intangible assets in order to rescue RC features and link them to GSCM development. Through exploratory and descriptive methods, recent studies on RC and GSCM are identified with respect their descriptors – ways in which RC is understood and employed in GSCM; focus – goals and main use of RC; and directionality – if developments of RC in GSCM are addressed from producers to their suppliers and respective clients, or if suppliers and clients also address results of RC. It is concluded that, usually, there is unidirectionality in the application of such efforts: improvement initiatives go from the producer to the supplier or client development, but processes through which environmental practices of suppliers and clients influence the performance of GSCM are poor explored.

  20. Probable Chemical Hypoxia Effects on Progress of CNV Through Induction of Promoter CpG Demethylation and Overexpression of IL17RC in Human RPE Cells.

    Science.gov (United States)

    Alivand, Mohammad Reza; Sabouni, Farzaneh; Soheili, Zahra-Soheila

    2016-09-01

    To survey the changes of promoter CpG methylation status and mRNA expression of IL17RC (interleukin 17 receptor C) gene in retinal pigment epithelium (RPE) cells under chemical hypoxia condition for choroidal neovascularization (CNV) modeling in vitro. RPE cells were cultured in both untreated as a control group and treated by cobalt chloride media as a hypoxia group for various concentrations (100-150μM) and times (24-36 hrs.) To confirm chemical hypoxia condition, mRNA expression of HIF (Hypoxia Inducible Factor) -1α, -2α, and Vascular Endothelial Growth Factor (VEGF) was compared between two groups by Real-time PCR. Also, in normoxia and hypoxia conditions, IL17RC expression changes and promoter CpG methylation status were evaluated by Real-time PCR and methylation-specific PCR (MSP) techniques, respectively. Overexpression of HIF-1α, HIF-2α, and VEGF was significant in hypoxia versus normoxia conditions. Our data showed overexpression of IL17RC (2.1- to 6.3-fold) and decreasing of its promoter methylation in comparison with hypoxia and normoxia conditions. It was found that there are significant association between promoter methylation status and expression of IL17RC in chemical hypoxia condition. Therefore, methylation of IL17RC could play as a marker in CNV and degeneration of RPE cells in vitro. Additionally, HIF-α and methylation phenomena may be considered as critical targets for blocking in angiogenesis of age-related degeneration in future studies.

  1. Advanced field-solver techniques for RC extraction of integrated circuits

    CERN Document Server

    Yu, Wenjian

    2014-01-01

    Resistance and capacitance (RC) extraction is an essential step in modeling the interconnection wires and substrate coupling effect in nanometer-technology integrated circuits (IC). The field-solver techniques for RC extraction guarantee the accuracy of modeling, and are becoming increasingly important in meeting the demand for accurate modeling and simulation of VLSI designs. Advanced Field-Solver Techniques for RC Extraction of Integrated Circuits presents a systematic introduction to, and treatment of, the key field-solver methods for RC extraction of VLSI interconnects and substrate coupling in mixed-signal ICs. Various field-solver techniques are explained in detail, with real-world examples to illustrate the advantages and disadvantages of each algorithm. This book will benefit graduate students and researchers in the field of electrical and computer engineering, as well as engineers working in the IC design and design automation industries. Dr. Wenjian Yu is an Associate Professor at the Department of ...

  2. A hybrid Rankine cycle (HyRC) with ambient pressure combustion (APC)

    International Nuclear Information System (INIS)

    Wu, Lijun; Thimsen, David; Clements, Bruce; Zheng, Ligang; Pomalis, Richard

    2014-01-01

    The main losses in thermal power generation include heat in exhaust flue gas, heat rejected through steam condensation of low-pressure turbine, and exergy destruction in heat exchange process etc. To the extent that the heat losses are significantly greater in temperature than either air or water coolant resources, these losses also represent exergy losses which might be exploited to improve plant capacity and efficiency. This paper presents a hybrid Rankine cycle (HyRC) with an ambient pressure combustion (APC) boiler to address the recovery potential of these losses within the steam Rankine cycle (SRC). The APC–HyRC concept employs an organic Rankine cycle (ORC) to supplement SRC and to reduce cycle energy losses to the atmosphere since organic fluids are capable of lowering cycle condensation temperature when a very low temperature heat sink is available. The case studies based on a 399 MW SRC unit show that the APC–HyRC configurations have better thermodynamic performance than its base case SRC at a cycle condensation temperature of 30 °C and below. The best APC–HyRC configuration generates up to 14% more power than the baseline steam cycle which is a 5.45% increase in overall gross efficiency with a cycle condensation temperature at 4 °C. - Highlights: • A hybrid Rankine cycle with water and organic fluid is presented. • Heat losses in exhaust flue gas and exhaust steam are reduced. • Exergy losses in regeneration process are reduced. • Efficiency improvements are made to the conventional steam Rankine cycle. • Issues in design/construction of greenfield and repowering project are discussed

  3. Observation of damage process in RC beams under cucle bending by acoustic emission

    International Nuclear Information System (INIS)

    Shigeishi, Mitsuhiro; Ohtsu, Masayasu; Tsuji, Nobuyuki; Yasuoka, Daisuke

    1997-01-01

    Reinforced concrete (RC) structures are generally applied to construction of buildings and bridges, and are imposed on cyclic loading incessantly. It is considered that detected acoustic emission (AE) waveforms are associated with the damage degree and the fracture mechanisms of RC structures. Therefor, the cyclic bending tests are applied to damaged RC beam specimens. To evaluate the interior of the damaged RC beams, the AE source kinematics are determined by 'SiGMA' procedure for AE moment tensor analysis. By using 'SiGMA' procedure, AE source kinematics, such as source locations, crack types, crack orientations and crack motions, can be identified. The results show the applicability to observation of the fracture process under cyclic bending load and evaluation the degree of damage of RC beam.

  4. Design and Analysis of Symmetric Primitives

    DEFF Research Database (Denmark)

    Lauridsen, Martin Mehl

    . In the second part, we delve into the matter of the various aspects of designing a symmetric cryptographic primitive. We start by considering generalizations of the widely acclaimed Advanced Encryption Standard (AES) block cipher. In particular, our focus is on a component operation in the cipher which permutes...... analyze and implement modes recommended by the National Institute of Standards and Technology (NIST), as well as authenticated encryption modes from the CAESAR competition, when instantiated with the AES. The data processed in our benchmarking has sizes representative to that of typical Internet traffic...... linear cryptanalysis. We apply this model to the standardized block cipher PRESENT. Finally, we present very generic attacks on two authenticated encryption schemes, AVALANCHE and RBS, by pointing out severe design flaws that can be leveraged to fully recover the secret key with very low complexity...

  5. Multi-level nonlinear modeling verification scheme of RC high-rise wall buildings

    OpenAIRE

    Alwaeli, W.; Mwafy, A.; Pilakoutas, K.; Guadagnini, M.

    2017-01-01

    Earthquake-resistant reinforced concrete (RC) high-rise wall buildings are designed and detailed to respond well beyond the elastic range under the expected earthquake ground motions. However, despite their considerable section depth, in terms of analysis, RC walls are still often treated as linear elements, ignoring the effect of deformation compatibility. Due to the limited number of available comprehensive experimental studies on RC structural wall systems subjected to cycling loading, few...

  6. R$_{b}$ - R$_{c}$ crisis and new physics

    CERN Document Server

    Bhattacharya, G; Hou Wei Shu; Bhattacharyya, Gautam; Branco, Gustavo C; Hou, Wei Shu

    1996-01-01

    The experimental values of R_b and R_c are the only data which do not seem to agree with Standard Model predictions. Although it is still premature to draw any definite conclusions, it is timely to look for new physics which could explain the excess in R_b and deficit in R_c. We investigate this problem in a simple extension of the Standard Model, where a charge +2/3 isosinglet quark is added to the standard spectrum. Upon the further introduction of an extra scalar doublet, one finds a solution with interesting consequences.

  7. CD45RC isoform expression identifies functionally distinct T cell subsets differentially distributed between healthy individuals and AAV patients.

    Directory of Open Access Journals (Sweden)

    Laurence Ordonez

    Full Text Available In animal models of anti-neutrophil cytoplasmic antibody (ANCA-associated vasculitis (AAV, the proportion of CD45RC T cell subsets is important for disease susceptibility. Their human counterparts are, however, functionally ill defined. In this report, we studied their distribution in healthy controls (HC, AAV patients and in Systemic lupus erythematous (SLE patients as disease controls. We showed that CD45RC expression level on human CD4 and CD8 T cells identifies subsets that are highly variable among individuals. Interestingly, AAV patients exhibit an increased proportion of CD45RC(low CD4 T cells as compared to HC and SLE patients. This increase is stable over time and independent of AAV subtype, ANCA specificity, disease duration, or number of relapses. We also analyzed the cytokine profile of purified CD4 and CD8 CD45RC T cell subsets from HC, after stimulation with anti-CD3 and anti-CD28 mAbs. The CD45RC subsets exhibit different cytokine profiles. Type-1 cytokines (IL-2, IFN-gamma and TNF-alpha were produced by all CD45RC T cell subsets, while the production of IL-17, type-2 (IL-4, IL-5 and regulatory (IL-10 cytokines was restricted to the CD45RC(low subset. In conclusion, we have shown that CD45RC expression divides human T cells in functionally distinct subsets that are imbalanced in AAV. Since this imbalance is stable over time and independent of several disease parameters, we hypothesize that this is a pre-existing immune abnormality involved in the etiology of AAV.

  8. Research on the Fatigue Flexural Performance of RC Beams Attacked by Salt Spray

    Science.gov (United States)

    Mao, Jiang-hong; Xu, Fang-yuan; Jin, Wei-liang; Zhang, Jun; Wu, Xi-xi; Chen, Cai-sheng

    2018-04-01

    The fatigue flexural performance of RC beams attacked by salt spray was studied. A testing method involving electro osmosis, electrical accelerated corrosion and salt spray was proposed. This corrosion process method effectively simulates real-world salt spray and fatigue loading exerted by RC components on sea bridges. Four RC beams that have different stress amplitudes were tested. It is found that deterioration by corrosion and fatigue loading reduces the fatigue life of the RC and decreases the ability of deformation. The fatigue life and deflection ability could be reduced by increasing the stress amplitude and the corrosion duration time. The test result demonstrates that this experimental method can couple corrosion deterioration and fatigue loading reasonably. This procedure may be applied to evaluate the fatigue life and concrete durability of RC components located in a natural salt spray environment.

  9. Holomorphic blocks and the 5d AGT correspondence

    International Nuclear Information System (INIS)

    Pasquetti, Sara

    2017-01-01

    We review the holomorphic block factorisation of partition functions of supersymmetric theories on compact manifolds in various dimensions. We then show how to interpret 3d and 5d partition functions as correlation functions with underlying symmetry given by a deformation of the Virasoro algebra. (topical review)

  10. The RC Circuit: An Approach with Fourier Transforms In this article ...

    Indian Academy of Sciences (India)

    CLASSROOM. Mitrajyoti Ghosh. 83, Mitrapara 2nd Lane, Harinavi,. Kolkata 700148, West Bengal,. India. Email: mijospeakingnow@gmail.com. The RC Circuit: An Approach with Fourier Transforms. In this article we shall mathematically analyse the Resistor-. Capacitor (RC) circuit with the help of Fourier transforms. (FT).

  11. Ultimate capacity and influenced factors analysis of nuclear RC containment subjected to internal pressure

    International Nuclear Information System (INIS)

    Song Chenning; Hou Gangling; Zhou Guoliang

    2014-01-01

    Ultimate compressive bearing capacity, influenced factors and its rules of nuclear RC containment are key problems of safety assessment, accident treatment and structure design, etc. Ultimate compressive bearing capacity of nuclear RC containment is shown by concrete damaged plasticity model and steel double liner model of ABAQUS. The study shows that the concrete of nuclear RC containment cylinder wall becomes plastic when the internal pressure is up to 0.87 MPa, the maximum tensile strain of steel liner exceeds 3000 × 10 6 and nuclear RC containment reaches ultimate status when the internal pressure is up to 1.02 MPa. The result shows that nuclear RC containment is in elastic condition under the design internal pressure and the bearing capacity meets requirement. Prestress and steel liner play key parts in the ultimate internal pressure and failure mode of nuclear RC containment. The study results have value for the analysis of ultimate compressive bearing capacity, structure design and safety assessment. (authors)

  12. 75 FR 1356 - RC2 Corporation, Provisional Acceptance of a Settlement Agreement and Order

    Science.gov (United States)

    2010-01-11

    ... primarily at toy stores and various retailers nationwide, and secondarily through RC2's e-commerce websites... various retailers nationwide, and secondarily through RC2's e-commerce Web sites or as `sub-components' of...(e). Published below is a provisionally-accepted Settlement Agreement with RC2 Corporation...

  13. A 500-600 MHz GaN power amplifier with RC-LC stability network

    Science.gov (United States)

    Ma, Xinyu; Duan, Baoxing; Yang, Yintang

    2017-08-01

    A 500-600 MHz high-efficiency, high-power GaN power amplifier is designed and realized on the basis of the push-pull structure. The RC-LC stability network is proposed and applied to the power amplifier circuit for the first time. The RC-LC stability network can significantly reduce the high gain out the band, which eliminates the instability of the power amplifier circuit. The developed power amplifier exhibits 58.5 dBm (700 W) output power with a 17 dB gain and 85% PAE at 500-600 MHz, 300 μs, 20% duty cycle. It has the highest PAE in P-band among the products at home and abroad. Project supported by the National Key Basic Research Program of China (No. 2014CB339901).

  14. Expanding Pseudorandom Functions

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2002-01-01

    Given any weak pseudorandom function, we present a general and efficient technique transforming such a function to a new weak pseudorandom function with an arbitrary length output. This implies, among other things, an encryption mode for block ciphers. The mode is as efficient as known (and widely...... used) encryption modes as CBC mode and counter (CTR) mode, but is provably secure against chosen-plaintext attack (CPA) already if the underlying symmetric cipher is secure against known-plaintext attack (KPA). We prove that CBC, CTR and Jutla’s integrity aware modes do not have this property....... In particular, we prove that when using a KPA secure block cipher, then: CBC mode is KPA secure, but need not be CPA secure, Jutla’s modes need not be CPA secure, and CTR mode need not be even KPA secure. The analysis is done in a concrete security framework....

  15. Assembly of photosynthetic reaction center with ABA tri-block polymersomes: highlights on the protein localization.

    KAUST Repository

    Tangorra, Roberto Rocco

    2015-07-07

    The reconstitution of the integral membrane protein photosynthetic reaction center (RC) in polymersomes, i. e. artificial closed vesicles, was achieved by the micelle-to-vesicle transition technique, a very mild protocol based on size exclusion chromatography often used to drive the incorporation of proteins contemporarily to liposomes formation. An optimized protocol was used to successfully reconstitute the protein in a fully active state in polymersomes formed by the tri-block copolymers PMOXA22-PDMS61-PMOXA22. The RC is very sensitive to its solubilizing environment and was used to probe the positioning of the protein in the vesicles. According to charge-recombination experiments and to the enzymatic activity assay, the RC is found to accommodate in the PMOXA22 region of the polymersome, facing the water bulk solution, rather than in the PDMS61 transmembrane-like region. Furthermore, polymersomes were found to preserve protein integrity efficiently as the biomimetic lipid bilayers but show a much longer temporal stability than lipid based vesicles.

  16. Assembly of photosynthetic reaction center with ABA tri-block polymersomes: highlights on the protein localization.

    KAUST Repository

    Tangorra, Roberto Rocco; Operamolla, Alessandra; Milano, Francesco; Hassan Omar, Omar; Henrard, John; Comparelli, Roberto; Italiano, Francesca; Agostiano, Angela; De Leo, Vincenzo; Marotta, Roberto; Falqui, Andrea; Farinola, Gianluca; Trotta, Massimo

    2015-01-01

    The reconstitution of the integral membrane protein photosynthetic reaction center (RC) in polymersomes, i. e. artificial closed vesicles, was achieved by the micelle-to-vesicle transition technique, a very mild protocol based on size exclusion chromatography often used to drive the incorporation of proteins contemporarily to liposomes formation. An optimized protocol was used to successfully reconstitute the protein in a fully active state in polymersomes formed by the tri-block copolymers PMOXA22-PDMS61-PMOXA22. The RC is very sensitive to its solubilizing environment and was used to probe the positioning of the protein in the vesicles. According to charge-recombination experiments and to the enzymatic activity assay, the RC is found to accommodate in the PMOXA22 region of the polymersome, facing the water bulk solution, rather than in the PDMS61 transmembrane-like region. Furthermore, polymersomes were found to preserve protein integrity efficiently as the biomimetic lipid bilayers but show a much longer temporal stability than lipid based vesicles.

  17. Limit analysis on FRP-strengthened RC members

    Directory of Open Access Journals (Sweden)

    D. De Domenico

    2014-07-01

    Full Text Available Reinforced concrete (RC members strengthened with externally bonded fiber-reinforced-polymer (FRP plates are numerically investigated by a plasticity-based limit analysis approach. The key-concept of the present approach is to adopt proper constitutive models for concrete, steel reinforcement bars (re-bars and FRP strengthening plates according to a multi-yield-criteria formulation. This allows the prediction of concrete crushing, steel bars yielding and FRP rupture that may occur at the ultimate limit state. To simulate such limitstate of the analysed elements, two iterative methods performing linear elastic analyses with adaptive elastic parameters and finite elements (FEs description are employed. The peak loads and collapse mechanisms predicted for FRP-plated RC beams are validated by comparison with the corresponding experimental findings.

  18. Out-of-plane ultimate shear strength of RC mat-slab foundations

    International Nuclear Information System (INIS)

    Kumagai, Hitoshi; Nukui, Yasushi; Imamura, Akira; Terayama, Takeshi; Hagiwara, Tetsuya; Kojima, Isao

    2011-01-01

    There have been few studies on the out-of-plane shear in RC mat-slab foundations, and the reasonable method has been demanded to estimate ultimate shear strength of RC mat-slab foundations in the nuclear facilities. In the previous study, the out-of-plane loading tests on the 20 square slab specimens had been performed to collect the fundamental data. In this study, the test results were successfully predicted by 3D non-linear Finite Element Analysis. It has been confirmed that the ultimate shear stress in the slab specimen can be estimated by the Arakawa's formula, which is commonly used to estimate the shear strength of RC beams. (author)

  19. MASH Test 3-11 on the T131RC Bridge Rail

    Science.gov (United States)

    2012-10-01

    Texas Department of Transportation (TxDOT) currently uses the TxDOT Type T101RC Bridge Rail, : a steel post and beam bridge rail anchored to the top of concrete curbs. The T101RC Bridge Rail is : 27 inches in height and can be anchored to the top of ...

  20. Noise analysis of gate electrode work function engineered recessed channel (GEWE-RC) MOSFET

    International Nuclear Information System (INIS)

    Agarwala, Ajita; Chaujar, Rishu

    2012-01-01

    This paper discusses the noise assessment, using ATLAS device simulation software, of a gate electrode work function engineered recessed channel (GEWE-RC) MOSFET involving an RC and GEWE design integrated onto a conventional MOSFET. Furthermore, the behaviour of GEWE-RC MOSFET is compared with that of a conventional MOSFET having the same device parameters. This paper thus optimizes and predicts the feasibility of a novel design, i.e., GEWE-RC MOSFET for high-performance applications where device and noise reduction is a major concern. The noise metrics taken into consideration are: minimum noise figure and optimum source impedance. The statistical tools auto correlation and cross correlation are also analysed owing to the random nature of noise.

  1. Evaluation of reuterin production in urogenital probiotic Lactobacillus reuteri RC-14.

    Science.gov (United States)

    Cadieux, Peter; Wind, Anette; Sommer, Philip; Schaefer, Laura; Crowley, Kate; Britton, Robert A; Reid, Gregor

    2008-08-01

    Classified as a distinct species in 1980, Lactobacillus reuteri strains have been used in probiotic formulations for intestinal and urogenital applications. In the former, the primary mechanism of action of L. reuteri SD2112 (ATCC 55730) has been purported to be its ability to produce the antibiotic 3-hydroxypropionaldehyde (3-HPA), also known as reuterin. In the vagina, it has been postulated that probiotic Lactobacillus reuteri RC-14 does not require reuterin production but mediates a restoration of the normal microbiota via hydrogen peroxide, biosurfactant, lactic acid production, and immune modulation. The aim of the present study was to determine whether strain RC-14 produced reuterin. Using PCR and DNA dot blot analyses, numerous Lactobacillus species, including RC-14, were screened for the presence of the gene encoding the large subunit of glycerol dehydratase (gldC), the enzyme responsible for reuterin production. In addition, lactobacilli were grown in glycerol-based media and both high-performance liquid chromatography and a colorimetric assay were used to test for the presence of reuterin. L. reuteri RC-14 was determined to be negative for gldC sequences, as well as for the production of reuterin when cultured in the presence of glycerol. These findings support that the probiotic effects of L. reuteri RC-14, repeatedly demonstrated during numerous studies of the intestine and vagina, are independent of reuterin production.

  2. Study on labelling methods of 125I-RC-160 and its biodistribution in animals

    International Nuclear Information System (INIS)

    Wang Jing; Wang Xiqing; Wang Liangang; Li Fujun; Deng Jinglan

    2002-01-01

    A method for the iodination of peptide RC-160 with high efficiency was developed. RC-160 was iodinated with N-bromosuccinimide (NBS) as oxidant, the conventional chloramine T (Ch-T) method was used as control. The labelling condition of NBS method was optimized and radiolabelled conjugate 125 I-RC-160 was assessed as follows: no further purification was needed, the measured labelling yield of 125 I-RC-160 was 92% and the specific activity was 1.95 x 10 12 Bq/m mol. The yield increased as the amount of NBS increased. The optimal ratio of RC-160 (μg): 125 I (MBq): NBS(μg) was 3:7.4:1. For Ch-T method, the labelling yield is 56% and specific activity was 0.65 x 10 12 Bq/m mol; but after purification by SepPak-C 18 , the labelling yield may reach as high as 92%. 1h after injection, radioactivity in blood decreased by 87.2%. No obvious concentration of 125 I-RC-160 in thyroid or kidney was observed

  3. Tomographic reconstruction of storm time RC ion distribution from ENA images on board multiple spacecraft

    Science.gov (United States)

    Ma, Shu-Ying; Yan, Wei-Nan; Xu, Liang

    2015-11-01

    A quantitative retrieval of 3-D distribution of energetic ions as energetic neutral atoms (ENA) sources is a challenging task. In this paper the voxel computerized tomography (CT) method is initially applied to reconstruct the 3-D distribution of energetic ions in the magnetospheric ring current (RC) region from ENA emission images on board multiple spacecraft. To weaken the influence of low-altitude emission (LAE) on the reconstruction, the LAE-associated ENA intensities are corrected by invoking the thick-target approximation. To overcome the divergence in iteration due to discordant instrument biases, a differential ENA voxel CT method is developed. The method is proved reliable and advantageous by numerical simulation for the case of constant bias independent of viewing angle. Then this method is implemented with ENA data measured by the Two Wide-angle Imaging Neutral-atom Spectrometers mission which performs stereoscopic ENA imaging. The 3-D spatial distributions and energy spectra of RC ion flux intensity are reconstructed for energies of 4-50 keV during the main phase of a major magnetic storm. The retrieved ion flux distributions seem to correspond to an asymmetric partial RC, located mainly around midnight favoring the postmidnight with L = 3.5-7.0 in the equatorial plane. The RC ion distributions with magnetic local time depend on energy, with major equatorial flux peak for lower energy located east of that for higher energy. In comparison with the ion energy spectra measured by Time History of Events and Macroscale Interactions during Substorms-D satellite flying in the RC region, the retrieved spectrum from remotely sensed ENA images are well matched with the in situ measurements.

  4. Improved Asymmetric Cipher Based on Matrix Power Function with Provable Security

    Directory of Open Access Journals (Sweden)

    Eligijus Sakalauskas

    2017-01-01

    Full Text Available The improved version of the author’s previously declared asymmetric cipher protocol based on matrix power function (MPF is presented. Proposed modification avoids discrete logarithm attack (DLA which could be applied to the previously declared protocol. This attack allows us to transform the initial system of MPF equations to so-called matrix multivariate quadratic (MMQ system of equations, which is a system representing a subclass of multivariate quadratic (MQ systems of equations. We are making a conjecture that avoidance of DLA in protocol, presented here, should increase its security, since an attempt to solve the initial system of MPF equations would appear to be no less complex than solving the system of MMQ equations. No algorithms are known to solve such a system of equations. Security parameters and their secure values are defined. Security analysis against chosen plaintext attack (CPA and chosen ciphertext attack (CCA is presented. Measures taken to prevent DLA attack increase the security of this protocol with respect to the previously declated protocol.

  5. RC Circuits: Some Computer-Interfaced Experiments.

    Science.gov (United States)

    Jolly, Pratibha; Verma, Mallika

    1994-01-01

    Describes a simple computer-interface experiment for recording the response of an RC network to an arbitrary input excitation. The setup is used to pose a variety of open-ended investigations in network modeling by varying the initial conditions, input signal waveform, and the circuit topology. (DDR)

  6. Strut and tie modeling for RC short beams with corroded stirrups

    Directory of Open Access Journals (Sweden)

    Ahmed K. El-Sayed

    Full Text Available Corrosion of steel reinforcement is one of the major problems that shorten the service life of reinforced concrete (RC structures. Steel stirrups, due to their location as an outer reinforcement, are more susceptible to corrosion problems and damage. However, there is limited research work in the literature on the effects of stirrup corrosion on the shear strength of RC beams. This paper attempts to evaluate analytically the residual shear strength of RC short beams with corrosion-damaged stirrups. The shear strength of short or deep beams are generally determined using the strut and tie model. The corrosion effects were implemented in the model to make it capable of predicting the residual shear capacity of RC beams with corroded stirrups. The effect of corrosion is implemented considering the reduction in geometry of the concrete cross section due to spalling and reduction in effective compressive strength of concrete due to corrosion cracks. The proposed strut and tie model which accounts for the corrosion effects was verified using the experimental data available in the literature, and good agreement was found.

  7. Numerical study on shear resisting mechanism for corroded RC box culverts

    International Nuclear Information System (INIS)

    Matsuo, Toyofumi; Matsumura, Takuro; Iwamori, Akiyuki

    2013-01-01

    This paper discusses the effects of reinforcing steel corrosion on the shear resisting mechanism of RC box culverts and the applicability of the material degradation model in a finite element method. First, in FEM analyses, loss of reinforcement section area and initial tension strain due to reinforcement corrosion, and deteriorated bond characteristics between reinforcement and concrete, were considered. Second, cyclic loading tests using full-scale corroded specimens were numerically analyzed. The analyzed crack patterns and load-displacement relationships up to the maximum load were observed to be in close agreement with the experiment results within the average corrosion ratio of 10% of primary reinforcement. The fact that corrosion cracks can importantly affect the progression of shear cracks and shear strength of RC beams was also found. On the other hand, we established that RC box culverts being statically indeterminate structures, sectional forces are redistributed after cracking damage, and local material deterioration has a minor effect on shear capacity. Furthermore, a parametric study was carried out for corroded RC box culverts using parameters such as size, steel corrosion location, and corrosion level. (author)

  8. Fractional RC and LC Electrical Circuits

    Directory of Open Access Journals (Sweden)

    Gómez-Aguilar José Francisco

    2014-04-01

    Full Text Available In this paper we propose a fractional differential equation for the electrical RC and LC circuit in terms of the fractional time derivatives of the Caputo type. The order of the derivative being considered is 0 < ɣ ≤1. To keep the dimensionality of the physical parameters R, L, C the new parameter σ is introduced. This parameter characterizes the existence of fractional structures in the system. A relation between the fractional order time derivative ɣ and the new parameter σ is found. The numeric Laplace transform method was used for the simulation of the equations results. The results show that the fractional differential equations generalize the behavior of the charge, voltage and current depending of the values of ɣ. The classical cases are recovered by taking the limit when ɣ = 1. An analysis in the frequency domain of an RC circuit shows the application and use of fractional order differential equations.

  9. Fatigue behavior of RC T-beams

    Directory of Open Access Journals (Sweden)

    Omar A. Farghal

    2014-09-01

    Full Text Available The objective of this research is to study the fatigue performance of reinforced concrete (RC T-beams strengthened in shear with Carbon Fiber Reinforced Polymer (CFRP composite. Experiments were conducted on RC beams with and without CFRP sheets bonded on their web surfaces and subjected to static and cycling loading. The obtained results showed that the strengthened beams could survive one million cycles of cyclic loading (=50% of maximum static load with no apparent signs of damage (premature failure demonstrating the effectiveness of CFRP strengthening system on extending the fatigue life of structures. Also, for beams having the same geometry, the applied strengthening technique can significantly enhance the cycling load particularly, in case of beams provided with U-jacket sheets. Moreover, although the failure mode for the different beams was a brittle one, the strengthened beams provided with U-jacket sheets approved an acceptable enhancement in the structural ductility.

  10. CHARACTERIZATIONS ON BENDING EFFECT ON CUSTOMIZED SPLITTERS USING VARIOUS RADII OF ELLIPTICAL-SHAPED BLOCKS

    Directory of Open Access Journals (Sweden)

    L. S. SUPIAN

    2016-11-01

    Full Text Available Macro-bending effect unto polymer optical fiber (POF based splitters study is done to analyse the performance and characterizations using several bending radii of geometrical blocks that hold a customized prepared polymer fiber splitter. A pair of etched fibers with similar core diameters are attached to the ellipse-shaped blocks built using matching refractive index material where the blocks were built with various bending radii. The tapered fibers were lapped closely with some forces exerted upon them in order to stimulate the splitting of modes between the two fibers. This study is done by experimental set-up where each of the splitter ports is connected with optical power meter to measure the power output while pressure is exerted. Characterization is executed in order to investigate and analyse which bending radius gives the most optimize splitting ratio with considerable low loss for the particular splitter prepared. As for normal force of 0.3 lbF, the optimum splitting ratio with low loss is specified having bending radius, Rc, of 13 mm whilst for external force of 3.0 lbF, bending radius is found to be 19 mm. Small bending radius stimulates the radiation of rays into the second fiber while larger Rc gives longer coupling length that optimize the splitting ratios. Efficiencies between simulated values and experimental values are also analysed.

  11. Dexmedetomidine as an adjuvant to 0.5% ropivacaine in ultrasound-guided axillary brachial plexus block.

    Science.gov (United States)

    Koraki, E; Stachtari, C; Kapsokalyvas, I; Stergiouda, Z; Katsanevaki, A; Trikoupi, A

    2018-06-01

    The aim of this study was to elucidate the effect of dexmedetomidine added to ropivacaine on the onset and duration of sensory and motor block and duration of analgesia of ultrasound-guided axillary brachial plexus block. Thirty-seven ASA physical status I-II patients with elective forearm and hand surgery under ultrasound-guided axillary brachial plexus block were randomly divided into 2 groups. Patients in ropivacaine-dexmedetomidine group (group RD, n = 19) received 15 mL of 0.5% ropivacaine with 100 μg (1 mL) dexmedetomidine, and patients in ropivacaine group (group R, n = 18) received 15 mL of 0.5% ropivacaine with 1 mL of normal saline. Onset time and duration of sensory and motor block and duration of analgesia were assessed. Duration of sensory block (U-value = 35, P block (P = .001) and duration of analgesia (P block in group RD was significantly faster than in group R (U-value = 65.5, P = .001). Onset time of motor block showed no significant difference between the 2 groups (U-value = 116.5, P = .096). Adverse reactions were reported only in group RD (bradycardia in 2 and hypotension in 3 patients). Our study indicated that dexmedetomidine 100 μg as adjuvant on ultrasound-guided axillary plexus block significantly prolonged the duration of sensory block and analgesia, as well as accelerated the time to onset of sensory block. These results should be weighed against the increased risks of motor block prolongation, transient bradycardia and hypotension and allow for attentive optimism, only if prolonged clinical trials provide a definitive answer. © 2017 John Wiley & Sons Ltd.

  12. Cracking and Deformation Modelling of Tensile RC Members Using Stress Transfer Approach

    Directory of Open Access Journals (Sweden)

    Ronaldas Jakubovskis

    2016-12-01

    Full Text Available The paper presents a modeling technique for bond, cracking and deformation analysis of RC members. The proposed mod-eling technique is not restricted by the geometrical dimensions of the analyzed member and may be applied for various load-ing conditions. Tensile as well as bending RC members may be analyzed using the proposed technique. Adequacy of the modeling strategy was evaluated by the developed numerical discrete crack algorithm, which allows modeling deformation and cracking behavior of tensile RC members. Comparison of experimental and numerical results proved the applicability of the proposed modeling strategy.

  13. Perbandingan Algoritma Enkripsi GGHN(8,8 dan RC4 Untuk Video Conference

    Directory of Open Access Journals (Sweden)

    Satriyo Satriyo

    2012-01-01

    Full Text Available Encryption is a solutions to secure the information transmitted through the medium of communication that can not be intercepted by unauthorized parties. This study implemented two algorithms i.e. RC4 and GGHN (8.8 in video conference. This study compared the speed  of  both  encryption  and  decryption  of  the  encryption  algorithm,  and  perform  measurements  of  bandwidth .  From  the  results  of measurements of the speed can be concluded that the RC4 algorithm is 1.53 times and 1.34 times faster than GGHN(8,8 for encryption and  decryption  audio  data.  The  encryption  and  decryption  video  data  RC4  are  1.44  times  and  1.09  times  faster  than  GHN(8,8. Bandwidth  usage  for  video  conferencing  without  encryption  and  bandwidth  usage  on  a  video  conference  with  RC4  encryption  and GGHN (8.8 is the same.Keywords: Video Conference; RC4; GGHN(8,8; Real Time Protocol.

  14. Upgrading the seismic capacity of existing RC buildings using buckling restrained braces

    Directory of Open Access Journals (Sweden)

    Hamdy Abou-Elfath

    2017-06-01

    Full Text Available Many existing RC buildings do not meet the lateral strength requirements of current seismic codes and are vulnerable to significant damage or collapse in the event of future earthquakes. In the past few decades, buckling-restrained braces have become increasingly popular as a lateral force resisting system because of their capability of improving the strength, the stiffness and the energy absorbing capacity of structures. This study evaluates the seismic upgrading of a 6-story RC-building using single diagonal buckling restrained braces. Seismic evaluation in this study has been carried out by static pushover analysis and time history earthquake analysis. Ten ground motions with different PGA levels are used in the analysis. The mean plus one standard deviation values of the roof-drift ratio, the maximum story drift ratio, the brace ductility factors and the member strain responses are used as the basis for the seismic performance evaluations. The results obtained in this study indicate that strengthening of RC buildings with buckling restrained braces is an efficient technique as it significantly increases the PGA capacity of the RC buildings. The results also indicate the increase in the PGA capacity of the RC building with the increase in the amount of the braces.

  15. Estimation methods of deformational behaviours of RC beams under the unrestrained condition at elevated temperatures

    International Nuclear Information System (INIS)

    Kanezu, Tsutomu; Nakano, Takehiro; Endo, Tatsumi

    1986-01-01

    The estimation methods of free deformations of reinforced concrete (RC) beams at elevated temperatures are investigated based on the concepts of ACI's and CEB/FIP's formulas, which are well used to estimate the flexural deformations of RC beams at normal temperature. Conclusions derived from the study are as follows. 1. Features of free deformations of RC beams. (i) The ratios of the average compressive strains on the top fiber of RC beams to the calculated ones at the cracked section show the inclinations that the ratios once drop after cracking and then remain constant according to temperature rises. (ii) Average compressive strains might be estimated by the average of the calculated strains at the perfect bond section and the cracked section of RC beam. (iii) The ratios of the average tensile strains on the level of reinforcements to the calculated ones at the cracked section are inclined to approach the value of 1.0 monotonically according to temperature rises. The changes of the average tensile strains are caused by the deterioration of bond strength and cracking due to the increase of the differences of expansive strains between reinforcement and concrete. 2. Estimation methods of free deformations of RC beams. (i) In order to estimate the free deformations of RC beams at elevated temperatures, the basic concepts of ACI's and CEB/FIP's formulas are adopted, which are well used to estimate the M-φ relations of RC beams at normal temperature. (ii) It was confirmed that the suggested formulas are able to estimate the free deformations of RC beams, that is, the longitudinal deformation and the curvature, at elevated temperatures. (author)

  16. Risk Quantification for Sustaining Coastal Military Installation Asset and Mission Capabilities (RC-1701)

    Science.gov (United States)

    2014-06-06

    5a. CONTRACT NUMBER Risk Quantification for Sustaining Coastal Military Installation Asset and Mission Capabilities (RC-1701) 5b. GRANT NUMBER...Planetary Boundary Layer (PBL) wind model TC96 (Thompson and Cardone 1996), 2) Surge has been simulated using the ADvanced CIRCulation model ADCIRC...coefficient, and h is the depth of the PBL (Thompson and Cardone 1996). The cyclone pressure is defined by an axisymmetrical exponential pressure or by

  17. Generation of equivalent forms of operational trans-conductance amplifier-RC sinusoidal oscillators: the nullor approach

    Directory of Open Access Journals (Sweden)

    Raj Senani

    2014-06-01

    Full Text Available It has been shown in two earlier papers published from this study that corresponding to a given single-operational trans-conductance amplifier (single-OTA-RC and dual-OTA-RC sinusoidal oscillators, there are three other structurally distinct equivalent forms having the same characteristic equation, one of which employs both grounded capacitors (GC. In this study, an earlier nullor-based theory of generating equivalent op-amp oscillator circuits, proposed by the first author, is extended to derive equivalent OTA-RC circuits which discloses the existence of an additional number of equivalent forms for the same given OTA-RC oscillators than those predicted by the quoted earlier works, and thereby considerably enlarging the set of equivalents of a given OTA-RC oscillator. Furthermore, the presented nullor-based theory of generating equivalent OTA-RC oscillators results in three additional interesting outcomes: (i the revelation that corresponding to any given OTA-RC oscillator there are two ‘both-GC’ oscillators (and not merely one, as derived in the quoted earlier works; (ii the availability of explicit current outputs in several of the derived equivalents and (iii the realisability explicit-current-output ‘quadrature oscillators’ in some of the generated equivalent oscillators. The workability of the generated equivalent OTA-RC oscillators has been verified by SPICE simulations, based on CMOS OTAs using 0.18 µm CMOS technology process parameters, and some sample results are given.

  18. Experimental investigation of the seismic performance of the R/C frames with reinforced masonry infills

    Science.gov (United States)

    Tanjung, Jafril; Maidiawati, Nugroho, Fajar

    2017-10-01

    Intensive studies regarding the investigation of seismic performance of reinforced concrete (R/C) frames which are infilled with brick masonry walls have been carried out by several researchers within the last three-decades. According to authors' field and experimentally experiences conclude that the unreinforced brick masonry infills significantly contributes to increase the seismic performance of the R/C frame structure. Unfortunately, the presence of brick masonry infill walls causes several undesirable effects such as short column, soft-storey, torsion and out of plane collapse. In this study, a strengthening technique for the brick masonry infills were experimentally investigated to improve the seismic performance of the R/C frame structures. For this purpose, four experimental specimens have been prepared, i.e. one of bare R/C frame (BF), one of R/C frame infilled with unreinforced brick-masonry wall (IFUM) and two of R/C frames were infilled with reinforced brick-masonry wall (IFRM-1 and IFRM-2). The bare frame and R/C frame infilled with unreinforced brick-masonry wall represents the typical R/C buildings' construction in Indonesia assuming the brick-masonry wall as the non-structural elements. The brick-masonry wall infills in specimens IFRM-1 and IFRM-2 were strengthened by using embedded ϕ4 plain steel bar on their diagonal and center of brick-masonry wall, respectively. All specimens were laterally pushed-over. The lateral loading and its lateral displacement, failure mechanism and their crack pattern were recorded during experimental works. Comparison of the experimental results of these four specimens conclude that the strengthening of the brick-masonry infills wall gave the significantly increasing of the seismic performance of the R/C frame. The seismic performance was evaluated based on the lateral strength of the R/C specimen. The embedded plain steel bar on brick-masonry also reduces the diagonal crack on the brick-masonry wall. It seems that

  19. Shear Strengthening of RC Beams Using Sprayed Glass Fiber Reinforced Polymer

    Directory of Open Access Journals (Sweden)

    Sayed Mohamad Soleimani

    2012-01-01

    Full Text Available The effectiveness of externally bonded sprayed glass fiber reinforced polymer (Sprayed GFRP in shear strengthening of RC beams under quasi-static loading is investigated. Different techniques were utilized to enhance the bond between concrete and Sprayed GFRP, involving the use of through bolts and nuts paired with concrete surface preparation through sandblasting and through the use of a pneumatic chisel prior to Sprayed GFRP application. It was found that roughening the concrete surface using a pneumatic chisel and using through bolts and nuts were the most effective techniques. Also, Sprayed GFRP applied on 3 sides (U-shaped was found to be more effective than 2-sided Sprayed GFRP in shear strengthening. Sprayed GFRP increased the shear load-carrying capacity and energy absorption capacities of RC beams. It was found that the load-carrying capacity of strengthened RC beams was related to an effective strain of applied Sprayed GFRP. This strain was related to Sprayed GFRP configuration and the technique used to enhance the concrete-FRP bond. Finally, an equation was proposed to calculate the contribution of Sprayed GFRP in the shear strength of an RC beam.

  20. Construction of secure and fast hash functions using nonbinary error-correcting codes

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Preneel, Bart

    2002-01-01

    constructions based on block ciphers such as the Data Encryption Standard (DES), where the key size is slightly smaller than the block size; IDEA, where the key size is twice the block size; Advanced Encryption Standard (AES), with a variable key size; and to MD4-like hash functions. Under reasonable...

  1. Development of an Improved Crack Propagation Model for Corrosion-Induced Cover Cracking in RC Structures

    Science.gov (United States)

    Hilyati, S.; Nizam, Z. M.; Zurisman, M. A. A.; Azhar, A. T. S.

    2017-06-01

    During the last two decades, reinforced concrete (RC) has been extensively used in most of the world as one of the common construction material due to its advantages and durability. However, RC structures exposed to marine environments are subjected to chloride attack. Chlorides from seawater penetrate into RC structures are not only causing severe corrosion problems but also affect the durability and serviceability of such structures. This paper investigates the influence of transverse reinforcement and spacing of reinforcing bars on concrete cover cracking of two-way RC slab specimens using accelerated corrosion tests. The experimental program involved the testing of four RC slab specimens and was generally designed to observe the crack width and the time of crack to propagate. An improved model for predicting the timing of crack propagation based on the experimental data was then developed.

  2. Superconductivity in REO0.5F0.5BiS2 with high-entropy-alloy-type blocking layers

    Science.gov (United States)

    Sogabe, Ryota; Goto, Yosuke; Mizuguchi, Yoshikazu

    2018-05-01

    We synthesized new REO0.5F0.5BiS2 (RE: rare earth) superconductors with high-entropy-alloy-type (HEA-type) REO blocking layers. The lattice constant a systematically changed in the HEA-type samples with the RE concentration and the RE ionic radius. A sharp superconducting transition was observed in the resistivity measurements for all the HEA-type samples, and the transition temperature of the HEA-type samples was higher than that of typical REO0.5F0.5BiS2. The sharp superconducting transition and the enhanced superconducting properties of the HEA-type samples may indicate the effectiveness of the HEA states of the REO blocking layers in the REO0.5F0.5BiS2 system.

  3. Retrieval of ion distributions in RC from TWINS ENA images by CT technique

    Science.gov (United States)

    Ma, S.; Yan, W.; Xu, L.; Goldstein, J.; McComas, D. J.

    2010-12-01

    The Two Wide-angle Imaging Neutral-atom Spectrometers (TWINS) mission is the first constellation to employ imagers on two separate spacecraft to measure energetic neutral atoms (ENA) produced by charge exchange between ring current energetic ions and cold exospheric neutral atoms. By applying the 3-D volumetric pixel (voxel) computed tomography (CT) inversion method to TWINS images, parent ion populations in the ring current (RC) and auroral regions are retrieved from their ENA signals. This methodology is implemented for data obtained during the main phase of a moderate geomagnetic storm on 11 October 2008. For this storm the two TWINS satellites were located in nearly the same meridian plane at vantage points widely separated in magnetic local time, and both more than 5 RE geocentric distance from the Earth. In the retrieval process, the energetic ion fluxes to be retrieved are assumed being isotropic with respect to pitch angle. The ENA data used in this study are differential fluxes averaged over 12 sweeps (corresponding to an interval of 16 min.) at different energy levels ranging throughout the full 1--100 keV energy range of TWINS. The ENA signals have two main components: (1) a low-latitude/ high-altitude signal from trapped RC ions and (2) a low-altitude signal from precipitating ions in the auroral/subauroral ionosphere. In the retrieved ion distributions, the main part of the RC component is located around midnight toward dawn sector with L from 3 to 7 or farther, while the subauroral low-altitude component is mainly at pre-midnight. It seems that the dominant energy of the RC ions for this storm is at the lowest energy level of 1-2 keV, with another important energy band centered about 44 keV. The low-altitude component is consistent with in situ observations by DMSP/SSJ4. The result of this study demonstrates that with satellite constellations such as TWINS, using all-sky ENA imagers deployed at multiple vantage points, 3-D distribution of RC ion

  4. Hill Cipher and Least Significant Bit for Image Messaging Security

    Directory of Open Access Journals (Sweden)

    Muhammad Husnul Arif

    2016-02-01

    Full Text Available Exchange of information through cyberspace has many benefits as an example fast estimated time, unlimited physical distance and space limits, etc. But in these activities can also pose a security risk for confidential information. It is necessary for the safety that can be used to protect data transmitted through the Internet. Encryption algorithm that used to encrypt message to be sent (plaintext into messages that have been randomized (ciphertext is cryptography and steganography algorithms. In application of cryptographic techniques that will be used is Hill Cipher. The technique is combined with steganography techniques Least Significant Bit. The result of merging techniques can maintain the confidentiality of messages because people who do not know the secret key used will be difficult to get the message contained in the stego-image and the image that has been inserted can not be used as a cover image. Message successfully inserted and extracted back on all samples with a good image formats * .bmp, * .png , * .jpg at a resolution of 512 x 512 pixels , 256 x 256 pixels. MSE and PSNR results are not influenced file format or file size, but influenced by dimensions of image. The larger dimensions of the image, then the smaller MSE that means error of image gets smaller.

  5. GR712RC- Dual-Core Processor- Product Status

    Science.gov (United States)

    Sturesson, Fredrik; Habinc, Sandi; Gaisler, Jiri

    2012-08-01

    The GR712RC System-on-Chip (SoC) is a dual core LEON3FT system suitable for advanced high reliability space avionics. Fault tolerance features from Aeroflex Gaisler’s GRLIB IP library and an implementation using Ramon Chips RadSafe cell library enables superior radiation hardness.The GR712RC device has been designed to provide high processing power by including two LEON3FT 32- bit SPARC V8 processors, each with its own high- performance IEEE754 compliant floating-point-unit and SPARC reference memory management unit.This high processing power is combined with a large number of serial interfaces, ranging from high-speed links for data transfers to low-speed control buses for commanding and status acquisition.

  6. Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2010-01-01

    functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle...

  7. Deformation Analysis of RC Ties Externally Strengthened with FRP Sheets

    Science.gov (United States)

    Gribniak, V.; Arnautov, A. K.; Kaklauskas, G.; Jakstaite, R.; Tamulenas, V.; Gudonis, E.

    2014-11-01

    The current study has two objectives: to validate the ability of the Atena finite-element software to estimate the deformations of reinforced concrete (RC) elements strengthened with fiber-reinforced polymer (FRP) sheets and to assess the effect of FRP-to-concrete bond strength on the results of numerical simulation. It is shown that the bond strength has to be selected according to the overall stiffness of the composite element. The numerical results found are corroborated experimentally by tensile tests of RC elements strengthened with basalt FRP sheets.

  8. The effect of X-ray irradiation on changes of blood chemistry in RC-MAP and CPD-whole blood after irradiation

    International Nuclear Information System (INIS)

    Hirose, Tetsuhito; Katayama, Norihumi; Okamoto, Yukiharu; Tsuda, Tadaaki; Ota, Kiichiro; Nishioka, Shingo; Tsumura, Michiyo

    1997-01-01

    The Japanese Welfare Ministry recommended to irradiate transfused blood in order to inactivate lymphocytes, thereby preventing from transfusion associated graft-versus-host disease (PT-GVHD). But an adequate dose of irradiation applied to various kinds of transfused blood has not yet known. We investigated the effect of a irradiation dose of 15 Gy (gray) on changes of plasma K, GOT, BUN and total protein (T.P) in RC-MAP (MAP) and CPD added whole blood (CPD) after days of storage of irradiation. There was a significant increase of potassium (K) in plasma in irradiated RC-MAP, compared with those in non-irradiated RC-MAP, after storage from day 2. Plasma K level in irradiated CPD increased more than those in non-irradiated CPD after storage at day 5. No different increases in plasma GOT, BUN and T.P levels were not shown in irradiated RC-MAP and CPD. Our data led to a conclusion that a adequate irradiated dose seemed to be different in various kinds of transfused blood to inactivate lymphocyte for the prevention of PT-GVHD. (author)

  9. Observations on out-of-plane behaviour of URM walls in buildings with RC slabs

    OpenAIRE

    Tondelli, Marco; Beyer, Katrin

    2014-01-01

    In Switzerland many new residential buildings are constructed as unreinforced masonry (URM) structures or as mixed structures where URM walls are coupled with reinforced concrete (RC) walls by RC slabs. At present the boundary conditions of URM walls subjected to out-of-plane accelerations are still not well quantified. In the framework of a large research activity on RC-URM wall structures a shake-table test on a four-storey mixed structure was performed. The test specimen, which was built a...

  10. Breaking teleprinter ciphers at Bletchley Park an edition of I.J. Good, D. Michie and G. Timms : general report on tunny with emphasis on statistical methods (1945)

    CERN Document Server

    Diffie, W; Field, J

    2015-01-01

    This detailed technical account of breaking Tunny is an edition of a report written in 1945, with extensive modern commentary Breaking Teleprinter Ciphers at Bletchley Park gives the full text of the General Report on Tunny (GRT) of 1945, making clear how the ideas, notation and the specially designed machines that were used differ from what was generally accepted in 1945, and, where a modern reader might be misled, from what is understood now. The editors of this book clarify the sometimes slightly strange language of the GRT and explain the text within a variety of contexts in several separate historical story lines, some only implicit in the GRT itself. The first story, told by the authors of the GRT, describes how, using specially designed machines, including from 1944 the "Colossus", the British broke the enciphered teleprinter messages sent by the highest command levels of the Germany Army. The cipher machines the Germans used were the Loren SZ 40 series, called "Tunny" by the British. The second stor...

  11. Preformulation and stability in biological fluids of the retrocyclin RC-101, a potential anti-HIV topical microbicide

    Directory of Open Access Journals (Sweden)

    Conrads Thomas P

    2011-07-01

    Full Text Available Abstract Background RC-101, a cationic peptide retrocyclin analog, has in vitro activity against HIV-1. Peptide drugs are commonly prone to conformational changes, oxidation and hydrolysis when exposed to excipients in a formulation or biological fluids in the body, this can affect product efficacy. We aimed to investigate RC-101 stability under several conditions including the presence of human vaginal fluids (HVF, enabling the efficient design of a safe and effective microbicide product. Stability studies (temperature, pH, and oxidation were performed by HPLC, Circular Dichroism, and Mass Spectrometry (LC-MS/MS. Additionally, the effect of HVF on formulated RC-101 was evaluated with fluids collected from healthy volunteers, or from subjects with bacterial vaginosis (BV. RC-101 was monitored by LC-MS/MS for up to 72 h. Results RC-101 was stable at pH 3, 4, and 7, at 25 and 37°C. High concentrations of hydrogen peroxide resulted in less than 10% RC-101 reduction over 24 h. RC-101 was detected 48 h after incubation with normal HVF; however, not following incubation with HVF from BV subjects. Conclusions Our results emphasize the importance of preformulation evaluations and highlight the impact of HVF on microbicide product stability and efficacy. RC-101 was stable in normal HVF for at least 48 h, indicating that it is a promising candidate for microbicide product development. However, RC-101 stability appears compromised in individuals with BV, requiring more advanced formulation strategies for stabilization in this environment.

  12. Energy transfer dynamics in an RC-LH1-PufX tubular photosynthetic membrane

    International Nuclear Information System (INIS)

    Hsin, J; Sener, M; Schulten, K; Struempfer, J; Qian, P; Hunter, C N

    2010-01-01

    Light absorption and the subsequent transfer of excitation energy are the first two steps in the photosynthetic process, carried out by protein-bound pigments, mainly bacteriochlorophylls (BChls), in photosynthetic bacteria. BChls are anchored in light-harvesting (LH) complexes, such as light-harvesting complex I (LH1), which directly associates with the reaction center (RC), forming the RC-LH1 core complex. In Rhodobacter sphaeroides, RC-LH1 core complexes contain an additional protein, PufX, and assemble into dimeric RC-LH1-PufX core complexes. In the absence of LH complex II (LH2), the former complexes can aggregate into a helically ordered tubular photosynthetic membrane. We have examined the excitation transfer dynamics in a single RC-LH1-PufX core complex dimer using the hierarchical equations of motion for dissipative quantum dynamics that accurately, yet in a computationally costly manner, treat the coupling between BChls and their protein environment. A widely employed description, the generalized Foerster (GF) theory, was also used to calculate the transfer rates of the same excitonic system in order to verify the accuracy of this computationally cheap method. Additionally, in light of the structural uncertainties in the Rba. sphaeroides RC-LH1-PufX core complex, geometrical alterations were introduced into the BChl organization. It is shown that the energy transfer dynamics are not affected by the considered changes in the BChl organization and that the GF theory provides accurate transfer rates. An all-atom model for a tubular photosynthetic membrane is then constructed on the basis of electron microscopy data, and the overall energy transfer properties of this membrane are computed.

  13. Energy transfer dynamics in an RC-LH1-PufX tubular photosynthetic membrane

    Energy Technology Data Exchange (ETDEWEB)

    Hsin, J; Sener, M; Schulten, K [Department of Physics and Beckman Institute, University of Illinois at Urbana-Champaign, Urbana (United States); Struempfer, J [Center for Biophysics and Computational Biology and Beckman Institute, University of Illinois at Urbana-Champaign, Urbana (United States); Qian, P; Hunter, C N, E-mail: kschulte@ks.uiuc.ed [Department of Molecular Biology and Biotechnology, University of Sheffield, Sheffield S10 2TN (United Kingdom)

    2010-08-15

    Light absorption and the subsequent transfer of excitation energy are the first two steps in the photosynthetic process, carried out by protein-bound pigments, mainly bacteriochlorophylls (BChls), in photosynthetic bacteria. BChls are anchored in light-harvesting (LH) complexes, such as light-harvesting complex I (LH1), which directly associates with the reaction center (RC), forming the RC-LH1 core complex. In Rhodobacter sphaeroides, RC-LH1 core complexes contain an additional protein, PufX, and assemble into dimeric RC-LH1-PufX core complexes. In the absence of LH complex II (LH2), the former complexes can aggregate into a helically ordered tubular photosynthetic membrane. We have examined the excitation transfer dynamics in a single RC-LH1-PufX core complex dimer using the hierarchical equations of motion for dissipative quantum dynamics that accurately, yet in a computationally costly manner, treat the coupling between BChls and their protein environment. A widely employed description, the generalized Foerster (GF) theory, was also used to calculate the transfer rates of the same excitonic system in order to verify the accuracy of this computationally cheap method. Additionally, in light of the structural uncertainties in the Rba. sphaeroides RC-LH1-PufX core complex, geometrical alterations were introduced into the BChl organization. It is shown that the energy transfer dynamics are not affected by the considered changes in the BChl organization and that the GF theory provides accurate transfer rates. An all-atom model for a tubular photosynthetic membrane is then constructed on the basis of electron microscopy data, and the overall energy transfer properties of this membrane are computed.

  14. Implementation Of Secure 6LoWPAN Communications For Tactical Wireless Sensor Networks

    Science.gov (United States)

    2016-09-01

    Adapted from [20]. .........................................40  Table 2.  Power Draw and Duration Time to Perform AES -128 Encryption . Adapted from... Encryption Standard AES -CCM Advanced Encryption Standard-Counter with Cipher Block Chaining-Message Authentication Code AH Authenticated Header BEB...Authentication Code ( AES - CCM) is the suggested method within the 6LoWPAN standard [5]. Within the encryption method, an Initialization Vector (IV) is used

  15. SEISMICALLY RETROFITTING AND UPGRADING RC-MRF BY USING EXPANDED METAL PANELS

    OpenAIRE

    Phung Ngoc, Dung

    2011-01-01

    Reinforced concrete moment resisting frames (RC-MRFs) have been widely used as the main structural resisting systems for over 30 years based on their capacity in resisting both gravity loads and lateral forces like winds or earthquakes and on low cost of construction. However, there have been still many existing RC-MRFs not designed according to any modern seismic code. This may lead to some undesired failures under a rather low intensity earthquake. There are several existing retrofitting sy...

  16. IL-17A, IL-17RC polymorphisms and IL17 plasma levels in Tunisian patients with rheumatoid arthritis

    Science.gov (United States)

    Chahbi, Mayssa; Haouami, Youssra; Sfar, Imen; Abdelmoula, Leila; Ben Abdallah, Taieb; Gorgi, Yousr

    2018-01-01

    Background Interleukin-17 (IL-17), a cytokine mainly secreted by Th17 cells, seems to play a significant role in the pathogenesis of rheumatoid arthritis (RA). Functional genetic polymorphisms in IL-17 and its receptor genes can influence either qualitatively or quantitatively their functions. Therefore, we aimed to study the impact of IL17-A and IL17RC polymorphisms on plasma level of IL-17 and RA susceptibility and severity. Methods In this context, IL-17A*rs2275913 and IL-17RC*rs708567 polymorphisms were investigated together with the quantification of IL17 plasma level in 115 RA patients and 91 healthy control subjects matched in age, sex and ethnic origin. Results There were no statistically significant associations between IL-17A and IL-17RC studied polymorphisms and RA susceptibility. In contrast, IL-17A plasma levels were significantly higher in patients (55.07 pg/ml) comparatively to controls (4.75 pg/ml), p<10E-12. A ROC curve was used to evaluate the performance of plasma IL-17 in detecting RA. Given 100% specificity, the highest sensitivity of plasma IL-17A was 61.7% at a cut-off value of 18.25 pg/ml; p < 10E-21, CI = [0.849–0.939]. Analytic results showed that the IgM-rheumatoid factor and anti-CCP antibodies were significantly less frequent in patients with the IL-17RC*A/A genotype than those carrying *G/G and *G/A genotypes; p = 0.013 and p = 0.015, respectively. Otherwise, IL-17 plasma levels’ analysis showed a significant association with the activity of RA (DAS28≥5.1 = 74.71 pg/ml vs. DAS28<5.1 = 11.96 pg/ml), p<10E-6. Conclusion IL-17A*rs2275913 (G/A) and IL-17RC*rs708567 (G/A) polymorphisms did not seem to influence RA susceptibility in Tunisian population. This result agrees with those reported previously. Plasma IL-17A level seems to be predictive of severe RA occurrence. PMID:29584788

  17. An experimental investigation for external RC shear wall applications

    Science.gov (United States)

    Kaltakci, M. Y.; Ozturk, M.; Arslan, M. H.

    2010-09-01

    The strength and rigidity of most reinforced concrete (RC) buildings in Turkey, which are frequently hit by destructive earthquakes, is not at a sufficient level. Therefore, the result of earthquakes is a significant loss of life and property. The strengthening method most commonly preferred for these type of RC buildings is the application of RC infilled walls (shear walls) in the frame openings of the building. However, since the whole building has to be emptied and additional heavy costs arise during this type of strengthening, users prefer not to strengthen their buildings despite the heavy risk they are exposed to. Therefore, it is necessary to develop easier-to-apply and more effective methods for the rapid strengthening of housing and the heavily-used public buildings which cannot be emptied during the strengthening process (such as hospitals and schools). This study empirically analyses the different methods of a new system which can meet this need. In this new system, named "external shear wall application", RC shear walls are applied on the external surface of the building, along the frame plane rather than in the building. To this end, 7 test samples in 1/2 and 1/3 geometrical scale were designed to analyse the efficiency of the strengthening technique where the shear wall leans on the frame from outside of the building (external shear wall application) and of the strengthening technique where a specific space is left between the frame and the external shear wall by using a coupling beam to connect elements (application of external shear wall with coupling beam). Test results showed that the maximum lateral load capacity, initial rigidity and energy dissipation behaviours of the samples strengthened with external shear wall were much better than those of the bare frames.

  18. An experimental investigation for external RC shear wall applications

    Directory of Open Access Journals (Sweden)

    M. Y. Kaltakci

    2010-09-01

    Full Text Available The strength and rigidity of most reinforced concrete (RC buildings in Turkey, which are frequently hit by destructive earthquakes, is not at a sufficient level. Therefore, the result of earthquakes is a significant loss of life and property. The strengthening method most commonly preferred for these type of RC buildings is the application of RC infilled walls (shear walls in the frame openings of the building. However, since the whole building has to be emptied and additional heavy costs arise during this type of strengthening, users prefer not to strengthen their buildings despite the heavy risk they are exposed to. Therefore, it is necessary to develop easier-to-apply and more effective methods for the rapid strengthening of housing and the heavily-used public buildings which cannot be emptied during the strengthening process (such as hospitals and schools. This study empirically analyses the different methods of a new system which can meet this need. In this new system, named "external shear wall application", RC shear walls are applied on the external surface of the building, along the frame plane rather than in the building. To this end, 7 test samples in 1/2 and 1/3 geometrical scale were designed to analyse the efficiency of the strengthening technique where the shear wall leans on the frame from outside of the building (external shear wall application and of the strengthening technique where a specific space is left between the frame and the external shear wall by using a coupling beam to connect elements (application of external shear wall with coupling beam. Test results showed that the maximum lateral load capacity, initial rigidity and energy dissipation behaviours of the samples strengthened with external shear wall were much better than those of the bare frames.

  19. Shear Strengthening of RC Deep Beam Using Externally Bonded GFRP Fabrics

    Science.gov (United States)

    Kumari, A.; Patel, S. S.; Nayak, A. N.

    2018-06-01

    This work presents the experimental investigation of RC deep beams wrapped with externally bonded Glass Fibre Reinforced Polymer (GFRP) fabrics in order to study the Load versus deflection behavior, cracking pattern, failure modes and ultimate shear strength. A total number of five deep beams have been casted, which is designed with conventional steel reinforcement as per IS: 456 (Indian standard plain and reinforced concrete—code for practice, Bureau of Indian Standards, New Delhi, 2000). The spans to depth ratio for all RC deep beams have been kept less than 2 as per the above specification. Out of five RC deep beams, one without retrofitting serves as a reference beam and the rest four have been wrapped with GFRP fabrics in multiple layers and tested with two point loading condition. The first cracking load, ultimate load and the shear contribution of GFRP to the deep beams have been observed. A critical discussion is made with respect to the enhancement of the strength, behaviour and performance of retrofitted deep beams in comparison to the deep beam without GFRP in order to explore the potential use of GFRP for strengthening the RC deep beams. Test results have demonstrated that the deep beams retrofitted with GFRP shows a slower development of the diagonal cracks and improves shear carrying capacity of the RC deep beam. A comparative study of the experimental results with the theoretical ones predicted by various researchers available in the literatures has also been presented. It is observed that the ultimate load of the beams retrofitted with GFRP fabrics increases with increase of number of GFRP layers up to a specific number of layers, i.e. 3 layers, beyond which it decreases.

  20. ECE diagnostics for RTO/RC ITER

    International Nuclear Information System (INIS)

    Vayakis, G.; Bartlett, D.V.; Costley, A.E.

    2001-01-01

    This paper presents the current status of the Electron Cyclotron Emission (ECE) diagnostic on the Reduced Technical Objectives/Reduced Cost International Thermonuclear Experimental Reactor (RTO/RC ITER). It discusses the implications of the new machine design on the measurement requirements, the ability of the diagnostic technique to meet these, and the changes in the implementation imposed by the new layout. Finally, it outlines the physics studies, design and R and D work required prior to the detailed design and construction of the diagnostic. Key results are: (i) that the localisation of the measurement is similar to that in ITER-FDR (40-100 mm in X-mode, 60-200 mm in O-mode for the reference scenario), so that the relative spatial resolution degrades in this, smaller, machine, and (ii) the expected effect of transport barriers on the temperature profile in the high temperature region will be poorly resolved, because the effect of the temperature gradient on the outboard side is to degrade the resolution to (∼250 mm in X-mode, ∼350 mm in O-mode). Nevertheless ECE will be able to make a unique and useful contribution to the RTO/RC ITER measurement set

  1. Enhanced resistance to stripe rust disease in transgenic wheat expressing the rice chitinase gene RC24.

    Science.gov (United States)

    Huang, Xuan; Wang, Jian; Du, Zhen; Zhang, Chen; Li, Lan; Xu, Ziqin

    2013-10-01

    Stripe rust is a devastating fungal disease of wheat worldwide which is primarily caused by Puccinia striiformis f. sp tritici. Transgenic wheat (Triticum aestivum L.) expressing rice class chitinase gene RC24 were developed by particle bombardment of immature embryos and tested for resistance to Puccinia striiformis f.sp tritici. under greenhouse and field conditions. Putative transformants were selected on kanamycin-containing media. Polymease chain reaction indicated that RC24 was transferred into 17 transformants obtained from bombardment of 1,684 immature embryos. Integration of RC24 was confirmed by Southern blot with a RC24-labeled probe and expression of RC24 was verified by RT-PCR. Nine transgenic T1 lines exhibited enhanced resistance to stripe rust infection with lines XN8 and BF4 showing the highest level of resistance. Southern blot hybridization confirmed the stable inheritance of RC24 in transgenic T1 plants. Resistance to stripe rust in transgenic T2 and T3 XN8 and BF4 plants was confirmed over two consecutive years in the field. Increased yield (27-36 %) was recorded for transgenic T2 and T3 XN8 and BF4 plants compared to controls. These results suggest that rice class I chitinase RC24 can be used to engineer stripe rust resistance in wheat.

  2. A proposal for seismic evaluation index of mid-rise existing RC buildings in Afghanistan

    Science.gov (United States)

    Naqi, Ahmad; Saito, Taiki

    2017-10-01

    Mid-rise RC buildings gradually rise in Kabul and entire Afghanistan since 2001 due to rapid increase of population. To protect the safety of resident, Afghan Structure Code was issued in 2012. But the building constructed before 2012 failed to conform the code requirements. In Japan, new sets of rules and law for seismic design of buildings had been issued in 1981 and severe earthquake damage was disclosed for the buildings designed before 1981. Hence, the Standard for Seismic Evaluation of RC Building published in 1977 has been widely used in Japan to evaluate the seismic capacity of existing buildings designed before 1981. Currently similar problem existed in Afghanistan, therefore, this research examined the seismic capacity of six RC buildings which were built before 2012 in Kabul by applying the seismic screening procedure presented by Japanese standard. Among three screening procedures with different capability, the less detailed screening procedure, the first level of screening, is applied. The study founds an average seismic index (IS-average=0.21) of target buildings. Then, the results were compared with those of more accurate seismic evaluation procedures of Capacity Spectrum Method (CSM) and Time History Analysis (THA). The results for CSM and THA show poor seismic performance of target buildings not able to satisfy the safety design limit (1/100) of the maximum story drift. The target buildings are then improved by installing RC shear walls. The seismic indices of these retrofitted buildings were recalculated and the maximum story drifts were analyzed by CSM and THA. The seismic indices and CSM and THA results are compared and found that building with seismic index larger than (IS-average =0.4) are able to satisfy the safety design limit. Finally, to screen and minimize the earthquake damage over the existing buildings, the judgement seismic index (IS-Judgment=0.5) for the first level of screening is proposed.

  3. Direct Observation of Energy Detrapping in LH1-RC Complex by Two-Dimensional Electronic Spectroscopy.

    Science.gov (United States)

    Ma, Fei; Yu, Long-Jiang; Hendrikx, Ruud; Wang-Otomo, Zheng-Yu; van Grondelle, Rienk

    2017-01-18

    The purple bacterial core light harvesting antenna-reaction center (LH1-RC) complex is the simplest system able to achieve the entire primary function of photosynthesis. During the past decade, a variety of photosynthetic proteins were studied by a powerful technique, two-dimensional electronic spectroscopy (2DES). However, little attention has been paid to LH1-RC, although its reversible uphill energy transfer, trapping, and backward detrapping processes, represent a crucial step in the early photosynthetic reaction dynamics. Thus, in this work, we employed 2DES to study two LH1-RC complexes of Thermochromatium (Tch.) tepidum. By direct observation of detrapping, the complex reversible process was clearly identified and an overall scheme of the excitation evolution in LH1-RC was obtained.

  4. Modeling of R/C Servo Motor and Application to Underactuated Mechanical Systems

    Science.gov (United States)

    Ishikawa, Masato; Kitayoshi, Ryohei; Wada, Takashi; Maruta, Ichiro; Sugie, Toshiharu

    An R/C servo motor is a compact package of a DC geard-motor associated with a position servo controller. They are widely used in small-sized robotics and mechatronics by virtue of their compactness, easiness-to-use and high/weight ratio. However, it is crucial to clarify their internal model (including the embedded position servo) in order to improve control performance of mechatronic systems using R/C servo motors, such as biped robots or underactuted sysyems. In this paper, we propose a simple and realistic internal model of the R/C servo motors including the embedded servo controller, and estimate their physical parameters using continuous-time system identification method. We also provide a model of reference-to-torque transfer function so that we can estimate the internal torque acting on the load.

  5. Prestress Loss of CFL in a Prestressing Process for Strengthening RC Beams

    Directory of Open Access Journals (Sweden)

    Xinyan Guo

    2017-01-01

    Full Text Available A prestressing system was designed to strengthen reinforced concrete (RC beams with prestressed carbon fiber laminate (CFL. During different prestressing processes, prestress loss was measured using strain gauges attached on the surface of CFL along the length direction. The prestress loss was 50–68% of the whole prestress loss, which is typically associated with CFL slipping between the grip anchors. Approximately 20–27% of the prestress loss was caused by the elastic shortening of the RC beam. An analytical model using linear-elastic theory was constructed to calculate the prestress loss caused by CFL slipping between the anchors and the elastic shortening of the strengthened beams. The compared results showed that the analytical model of prestress loss can describe the experimental data well. Methods of reducing the prestress loss were also suggested. Compared to other experiments, the prestressing system proposed by this research group was effective because the maximum percentage of prestress loss was 14.9% and the average prestress loss was 12.5%.

  6. Development of a hysteresis model for R/C columns subjected to bi-axial lateral loading

    International Nuclear Information System (INIS)

    Dutta, Sekhar Chandra; Chowdhury, Rajib; Roy, Raghupati; Reddy, G. Rami

    2003-01-01

    Recent investigations on dynamic response of reinforced concrete (R/C) structures have confirmed that the R/C structural members undergo much more inelastic deformation in each of the two mutually perpendicular directions under bi-directional seismic loading, than that observed only under unidirectional ground motion. To predict the seismic response of R/C structure with fair accuracy demands, a faithful model that can incorporate the effect of biaxial bending interaction in column. This model should not have high computational demand but should adequately reflect the stiffness degrading and strength deterioration characteristics of R/C structural members. Present study is an effort to develop such a bi-directional hysteresis model accounting the effect of interaction between lateral loadings in two orthogonal directions. The development of the present model is based on the yield surface approach and it can incorporate both strength and stiffness degradation characteristics, which is unavoidable in R/C structures during cyclic loading. The performance of the proposed model/ is demonstrated through the prediction of available experimental results of a reinforced concrete column, subjected to biaxial loading. (author)

  7. A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm

    Science.gov (United States)

    Nofriansyah, Dicky; Defit, Sarjon; Nurcahyo, Gunadi W.; Ganefri, G.; Ridwan, R.; Saleh Ahmar, Ansari; Rahim, Robbi

    2018-01-01

    Cybercrime is one of the most serious threats. Efforts are made to reduce the number of cybercrime is to find new techniques in securing data such as Cryptography, Steganography and Watermarking combination. Cryptography and Steganography is a growing data security science. A combination of Cryptography and Steganography is one effort to improve data integrity. New techniques are used by combining several algorithms, one of which is the incorporation of hill cipher method and Morse code. Morse code is one of the communication codes used in the Scouting field. This code consists of dots and lines. This is a new modern and classic concept to maintain data integrity. The result of the combination of these three methods is expected to generate new algorithms to improve the security of the data, especially images.

  8. KOMBINASI ALGORITMA AES, RC4 DAN ELGAMAL DALAM SKEMA HYBRID UNTUK KEAMANAN DATA

    Directory of Open Access Journals (Sweden)

    Adi Widarma

    2016-01-01

    Full Text Available Abstrak — Pengiriman atau pertukaran data adalah hal yang sering terjadi dalam dunia teknologi informasi. Data yang dikirim kadang sering berisi data informasi yang penting bahkan sangat rahasia dan harus dijaga keamanannya. Untuk menjaga keamanan data, dapat dilakukan dengan menggunakan teknik kriptografi. Algoritma AES dan RC4 adalah salah satu dari algoritma simetri. Kelemahan dari algoritma simetri adalah proses enkripsi dan dekripsi menggunakan kunci yang sama. Untuk mengatasi tersebut dilakukan dengan menggunakan algoritma Elgamal. Algoritma Elgamal adalah termasuk algoritma asimetri. Algoritma Elgamal  digunakan untuk mengamankan kunci dari algoritma AES dan RC4. Peningkatan keamanan pesan dan kunci dilakukan dengan algoritma hybrid. Algoritma hybrid dengan mengkombinasikan beberapa algoritma baik algoritma simetri maupun algortima asimetri akan menambah keamanan sehingga menjadi lebih aman dan powerful (Jain & Agrawal 2014. Penelitian ini akan dilakukan metode hybrid yaitu mengkombinasikan beberapa algoritma kriptografi dengan menggunakan algoritma Advanced Encryption Standard (AES dan RC4 untuk kerahasiaan data serta algoritma Elgamal digunakan untuk enkripsi dan dekripsi kunci. Kata Kunci :  kriptograpi, algoritma AES, RC4, Elgamal, hybrid

  9. A pipelined FPGA implementation of an encryption algorithm based on genetic algorithm

    Science.gov (United States)

    Thirer, Nonel

    2013-05-01

    With the evolution of digital data storage and exchange, it is essential to protect the confidential information from every unauthorized access. High performance encryption algorithms were developed and implemented by software and hardware. Also many methods to attack the cipher text were developed. In the last years, the genetic algorithm has gained much interest in cryptanalysis of cipher texts and also in encryption ciphers. This paper analyses the possibility to use the genetic algorithm as a multiple key sequence generator for an AES (Advanced Encryption Standard) cryptographic system, and also to use a three stages pipeline (with four main blocks: Input data, AES Core, Key generator, Output data) to provide a fast encryption and storage/transmission of a large amount of data.

  10. Deformation and velocity measurements at elevated temperature in a fractured 0.5 M block of tuff

    International Nuclear Information System (INIS)

    Blair, S.C.; Berge, P.A.

    1996-01-01

    This paper presents preliminary results of laboratory tests conducted on small block samples of Topopah Spring tuff, in support of the Yucca Mountain Site Characterization Project. The overall objective of these tests is to investigate the thermal-mechanical, thermal-hydrological, and thermal-chemical response of the rock to conditions similar to the near-field environment (NFE) of a potential nuclear waste repository. We present preliminary results of deformation and elastic wave velocity measurements on a 0.5-m-scale block of Topopah Spring tuff tested in uniaxial compression to 8.5 MPa and at temperatures to 85 degree C. The Young's modulus was found to be about 7 to 31 GPa for vertical measurements parallel to the stress direction across parts of the block containing no fractures or a few fractures, and 0.5 to 0.9 GPA for measurements across individual fractures, at ambient temperature and 8.5 MPa maximum stress. During stress cycles between 5 and 8.5 MPa, the deformation modulus values for the matrix with fractures were near 15-20 GPa at ambient temperature but dropped to about 10 GPa at 85 degree C. Compressional wave velocities were found to be about 3.6 to 4.7 km/s at ambient temperature and stress. After the stress was cycled, velocities dropped to values as low as 2.6 km/s in the south end of the block where vertical cracks developed. Heating the block to about 85 degree C raised velocities to as much as 5.6 km/s in the upper third of the block

  11. RC Beams Strengthened with Mechanically Fastened Composites: Experimental Results and Numerical Modeling

    Directory of Open Access Journals (Sweden)

    Enzo Martinelli

    2014-03-01

    Full Text Available The use of mechanically-fastened fiber-reinforced polymer (MF-FRP systems has recently emerged as a competitive solution for the flexural strengthening of reinforced concrete (RC beams and slabs. An overview of the experimental research has proven the effectiveness and the potentiality of the MF-FRP technique which is particularly suitable for emergency repairs or when the speed of installation and immediacy of use are imperative. A finite-element (FE model has been recently developed by the authors with the aim to simulate the behavior of RC beams strengthened in bending by MF-FRP laminates; such a model has also been validated by using a wide experimental database collected from the literature. By following the previous study, the FE model and the assembled database are considered herein with the aim of better exploring the influence of some specific aspects on the structural response of MF-FRP strengthened members, such as the bearing stress-slip relationship assumed for the FRP-concrete interface, the stress-strain law considered for reinforcing steel rebars and the cracking process in RC members resulting in the well-known tension stiffening effect. The considerations drawn from this study will be useful to researchers for the calibration of criteria and design rules for strengthening RC beams through MF-FRP laminates.

  12. Hypomethylation of IL17RC Promoter Associates with Age-related Macular Degeneration

    Science.gov (United States)

    Wei, Lai; Liu, Baoying; Tuo, Jingsheng; Shen, Defen; Chen, Ping; Li, Zhiyu; Liu, Xunxian; Ni, Jia; Dagur, Pradeep; Sen, H. Nida; Jawad, Shayma; Ling, Diamond; Park, Stanley; Chakrabarty, Sagarika; Meyerle, Catherine; Agron, Elvira; Ferris, Frederick L.; Chew, Emily Y.; McCoy, J. Philip; Blum, Emily; Francis, Peter J.; Klein, Michael L.; Guymer, Robyn H.; Baird, Paul N.; Chan, Chi-Chao; Nussenblatt, Robert B.

    2012-01-01

    SUMMARY Age related macular degeneration (AMD) is the leading cause of irreversible blindness in the elderly population worldwide. While recent studies have demonstrated strong genetic associations of single nucleotide polymorphisms within a number of genes and AMD, other modes of regulation are also likely to play a role in its etiology. We identified a significantly decreased level of methylation on the IL17RC promoter in AMD patients. Further, we showed that hypomethylation of the IL17RC promoter in AMD patients led to an elevated expression of its protein and mRNA in peripheral blood as well as in the affected retina and choroid, suggesting that the DNA methylation pattern and expression of IL17RC may potentially serve as a biomarker for the diagnosis of AMD and likely plays a role in disease pathogenesis. PMID:23177625

  13. Practical security analysis of a quantum stream cipher by the Yuen 2000 protocol

    International Nuclear Information System (INIS)

    Hirota, Osamu

    2007-01-01

    There exists a great gap between one-time pad with perfect secrecy and conventional mathematical encryption. The Yuen 2000 (Y00) protocol or αη scheme may provide a protocol which covers from the conventional security to the ultimate one, depending on implementations. This paper presents the complexity-theoretic security analysis on some models of the Y00 protocol with nonlinear pseudo-random-number-generator and quantum noise diffusion mapping (QDM). Algebraic attacks and fast correlation attacks are applied with a model of the Y00 protocol with nonlinear filtering like the Toyocrypt stream cipher as the running key generator, and it is shown that these attacks in principle do not work on such models even when the mapping between running key and quantum state signal is fixed. In addition, a security property of the Y00 protocol with QDM is clarified. Consequently, we show that the Y00 protocol has a potential which cannot be realized by conventional cryptography and that it goes beyond mathematical encryption with physical encryption

  14. Effects of Calcium Ions on the Thermostability and Spectroscopic Properties of the LH1-RC Complex from a New Thermophilic Purple Bacterium Allochromatium tepidum.

    Science.gov (United States)

    Kimura, Yukihiro; Lyu, Shuwen; Okoshi, Akira; Okazaki, Koudai; Nakamura, Natsuki; Ohashi, Akira; Ohno, Takashi; Kobayashi, Manami; Imanishi, Michie; Takaichi, Shinichi; Madigan, Michael T; Wang-Otomo, Zheng-Yu

    2017-05-18

    The light harvesting-reaction center (LH1-RC) complex from a new thermophilic purple sulfur bacterium Allochromatium (Alc.) tepidum was isolated and characterized by spectroscopic and thermodynamic analyses. The purified Alc. tepidum LH1-RC complex showed a high thermostability comparable to that of another thermophilic purple sulfur bacterium Thermochromatium tepidum, and spectroscopic characteristics similar to those of a mesophilic bacterium Alc. vinosum. Approximately 4-5 Ca 2+ per LH1-RC were detected by inductively coupled plasma atomic emission spectroscopy and isothermal titration calorimetry. Upon removal of Ca 2+ , the denaturing temperature of the Alc. tepidum LH1-RC complex dropped accompanied by a blue-shift of the LH1 Q y absorption band. The effect of Ca 2+ was also observed in the resonance Raman shift of the C3-acetyl νC═O band of bacteriochlorophyll-a, indicating changes in the hydrogen-bonding interactions between the pigment and LH1 polypeptides. Thermodynamic parameters for the Ca 2+ -binding to the Alc. tepidum LH1-RC complex indicated that this reaction is predominantly driven by the largely favorable electrostatic interactions that counteract the unfavorable negative entropy change. Our data support a hypothesis that Alc. tepidum may be a transitional organism between mesophilic and thermophilic purple bacteria and that Ca 2+ is one of the major keys to the thermostability of LH1-RC complexes in purple bacteria.

  15. Centrifuge modeling of rocking-isolated inelastic RC bridge piers.

    Science.gov (United States)

    Loli, Marianna; Knappett, Jonathan A; Brown, Michael J; Anastasopoulos, Ioannis; Gazetas, George

    2014-12-01

    Experimental proof is provided of an unconventional seismic design concept, which is based on deliberately underdesigning shallow foundations to promote intense rocking oscillations and thereby to dramatically improve the seismic resilience of structures. Termed rocking isolation , this new seismic design philosophy is investigated through a series of dynamic centrifuge experiments on properly scaled models of a modern reinforced concrete (RC) bridge pier. The experimental method reproduces the nonlinear and inelastic response of both the soil-footing interface and the structure. To this end, a novel scale model RC (1:50 scale) that simulates reasonably well the elastic response and the failure of prototype RC elements is utilized, along with realistic representation of the soil behavior in a geotechnical centrifuge. A variety of seismic ground motions are considered as excitations. They result in consistent demonstrably beneficial performance of the rocking-isolated pier in comparison with the one designed conventionally. Seismic demand is reduced in terms of both inertial load and deck drift. Furthermore, foundation uplifting has a self-centering potential, whereas soil yielding is shown to provide a particularly effective energy dissipation mechanism, exhibiting significant resistance to cumulative damage. Thanks to such mechanisms, the rocking pier survived, with no signs of structural distress, a deleterious sequence of seismic motions that caused collapse of the conventionally designed pier. © 2014 The Authors Published by John Wiley & Sons Ltd.

  16. DEVELOPMENT OF A NEW ALGORITHM FOR KEY AND S-BOX GENERATION IN BLOWFISH ALGORITHM

    Directory of Open Access Journals (Sweden)

    TAYSEER S. ATIA

    2014-08-01

    Full Text Available Blowfish algorithm is a block cipher algorithm, its strong, simple algorithm used to encrypt data in block of size 64-bit. Key and S-box generation process in this algorithm require time and memory space the reasons that make this algorithm not convenient to be used in smart card or application requires changing secret key frequently. In this paper a new key and S-box generation process was developed based on Self Synchronization Stream Cipher (SSS algorithm where the key generation process for this algorithm was modified to be used with the blowfish algorithm. Test result shows that the generation process requires relatively slow time and reasonably low memory requirement and this enhance the algorithm and gave it the possibility for different usage.

  17. 3-D Image Encryption Based on Rubik's Cube and RC6 Algorithm

    Science.gov (United States)

    Helmy, Mai; El-Rabaie, El-Sayed M.; Eldokany, Ibrahim M.; El-Samie, Fathi E. Abd

    2017-12-01

    A novel encryption algorithm based on the 3-D Rubik's cube is proposed in this paper to achieve 3D encryption of a group of images. This proposed encryption algorithm begins with RC6 as a first step for encrypting multiple images, separately. After that, the obtained encrypted images are further encrypted with the 3-D Rubik's cube. The RC6 encrypted images are used as the faces of the Rubik's cube. From the concepts of image encryption, the RC6 algorithm adds a degree of diffusion, while the Rubik's cube algorithm adds a degree of permutation. The simulation results demonstrate that the proposed encryption algorithm is efficient, and it exhibits strong robustness and security. The encrypted images are further transmitted over wireless Orthogonal Frequency Division Multiplexing (OFDM) system and decrypted at the receiver side. Evaluation of the quality of the decrypted images at the receiver side reveals good results.

  18. Modern Cryptanalysis Techniques for Advanced Code Breaking

    CERN Document Server

    Swenson, Christopher

    2008-01-01

    As an instructor at the University of Tulsa, Christopher Swenson could find no relevant text for teaching modern cryptanalysis?so he wrote his own. This is the first book that brings the study of cryptanalysis into the 21st century. Swenson provides a foundation in traditional cryptanalysis, examines ciphers based on number theory, explores block ciphers, and teaches the basis of all modern cryptanalysis: linear and differential cryptanalysis. This time-honored weapon of warfare has become a key piece of artillery in the battle for information security.

  19. Seismic Performance of Multi-Span RC Railway Bridges

    DEFF Research Database (Denmark)

    Georgakis, Christos; Barrau, Xavier

    2008-01-01

    Presently, there is no clear method for determining the optimal railway bridge design for a particular ground type and expected seismic intensity. Four main types of RC bridge dominate the current multi-span railway bridge design trends – the Simply Supported Beam, Continuous Box-Girder (CBG), CBG...

  20. Information and Announcements

    Indian Academy of Sciences (India)

    Information and Announcements. lfijRefresher Course in ... Classical encrypton techniques, block ciphers and DES, AES, confidentiality using symmetric encryption, message ... network security', W Stallings, PHI, III Ed. (2004). Recent trends in ...

  1. The snap-back effect of an RC-IGBT and its simulations

    International Nuclear Information System (INIS)

    Zhang Wenliang; Tian Xiaoli; Zhu Yangjun; Tan Jingfei

    2013-01-01

    The RC-IGBT (reverse conducting insulated gate bipolar transistor) is a new kind of power semiconductor device which has many advantages such as smaller chip size, higher power density, lower manufacturing cost, softer turn off behavior, and better reliability. However, its performance has a number of drawbacks, such as the snap-back effect. In this paper, an introduction about the snap-back effect of the RC-IGBT is given firstly. Then the physical explanations are presented with two simplified models. After that, some numerical simulations are carried out to verify the correctness of the models. (semiconductor devices)

  2. Effect of warming bupivacaine 0.5% on ultrasound-guided axillary plexus block. Randomized prospective double-blind study.

    Science.gov (United States)

    Trabelsi, W; Ben Gabsia, A; Lebbi, A; Sammoud, W; Labbène, I; Kchelfi, S; Ferjani, M

    2017-02-01

    To evaluate the effect of warming bupivacaine 0.5% on ultrasound-guided axillary brachial plexus block. Prospective, randomized, double-blind. Eighty patients undergoing elective or emergency surgery beyond the distal third of the upper limb were divided into two groups of 40 patients: the warm group received 15mL bupivacaine 0.5% heated to 37°C; the cold group received 15mL 0.5% bupivacaine stored for at least 24hours in the lower compartment of a refrigerator at 13-15°C. Onset and duration of sensory and motor blocks were evaluated every 5minutes for 40minutes. Postoperative pain was evaluated at 1, 3, 6, 12 and 24hours. Effective analgesia time was recorded as the interval between anesthetic injection and the first analgesia requirement (VAS>30mm). Time to onset of sensory and motor block was significantly shorter in the warm group, and mean duration of sensory and motor block and of postoperative analgesia significantly longer. Warming bupivacaine 0.5% to 37°C accelerated onset of sensory and motor block and extended action duration. Copyright © 2016 Elsevier Masson SAS. All rights reserved.

  3. Investigation on Strengthening Approaches Adopted for Poorly Detailed RC Corbels

    Directory of Open Access Journals (Sweden)

    Ram Chandra Neupane

    2017-05-01

    Full Text Available Poor detailing of the position of bearing pad over reinforced concrete (RC corbel may lead to premature failure, which is undesired and structurally vulnerable. An appropriate retrofitting solution is necessary to ensure the functionality of such RC corbels. Considering the growing popularity of external carbon fiber-reinforced polymer (CFRP in retrofitting, this research examines the effectiveness of an externally wrapped unidirectional CFRP sheet and compares its performance against traditional retrofitting methods. Moreover, it is intended to fulfill the lack of extensive research on external CFRP application for corbel strengthening. A total of eight medium-scale corbel specimens were tested on vertical load. Observed premature failure due to placing the bearing pad near the edge of corbel was verified and the effectiveness of the proposed structural strengthening solutions was studied. Experimental results show that although the loading capacity of the damaged corbel due to the poor detailing of bearing pad position could not be fully recovered, the external CFRP wrapping method demonstrated superior performance over RC jacketing and was able to prevent localized failure. Further study based on non-linear 3D finite element analysis (FEA was carried out to identify the governing parameters of each retrofitting solution. Numerical studies suggested important parameters of various retrofitting alternatives for higher capacity assurance.

  4. Investigation on the thermographic detection of corrosion in RC structures

    Science.gov (United States)

    Tantele, Elia A.; Votsis, Renos A.; Kyriakides, Nicholas; Georgiou, Panagiota G.; Ioannou, Fotia G.

    2017-09-01

    Corrosion of the steel reinforcement is the main problem of reinforced concrete (RC) structures. Over the past decades, several methods have been developed aiming to detect the corrosion process early in order to minimise the structural damage and consequently the repairing costs. Emphasis was given in developing methods and techniques of non-destructive nature providing fast on-the-spot detection and covering large areas rather that concentrating on single locations. This study, investigates a non-destructive corrosion detection technique for reinforced concrete, which is based on infrared thermography and the difference in thermal characteristics of corroded and non-corroded steel rebars. The technique is based on the principle that corrosion products have poor heat conductivity, and they inhibit the diffusion of heat that is generated in the reinforcing bar due to heating. For the investigation RC specimens, have been constructed in the laboratory using embedded steel bars of different corrosion states. Afterward, one surface of the specimens was heated using an electric device while thermal images were captured at predefined time instants on the opposite surface with an IR camera. The test results showed a clear difference between the thermal characteristics of the corroded and the non-corroded samples, which demonstrates the potential of using thermography in corrosion detection in RC structures.

  5. 77 FR 57477 - Delegation of Certain Functions and Authority Under Section 5(a) of the Tom Lantos Block Burmese...

    Science.gov (United States)

    2012-09-17

    ...--Delegation of Certain Functions and Authority Under Section 5(a) of the Tom Lantos Block Burmese Junta's Anti... 5(a) of the Tom Lantos Block Burmese Junta's Anti-Democratic Efforts Act of 2008 Memorandum for the... section 5(a)(2) of the Tom Lantos Block Burmese Junta's Anti- Democratic Efforts Act of 2008 (Public Law...

  6. Interfacial stresses in damaged RC beams strengthened with externally bonded CFRP plate

    International Nuclear Information System (INIS)

    Benrahou, K.H.; Adda bedia, E.A.; Benyoucef, S.; Tounsi, A.; Benguediab, M.

    2006-01-01

    A theoretical method to predict the interfacial stresses in the adhesive layer of damaged reinforced concrete beams strengthened with externally bonded carbon fiber-reinforced polymer (CFRP) plate is presented. The adopted model is developed including the adherend shear deformations by assuming a linear shear stress through the depth of the RC beam [A. Tounsi, Int. J. Solids Struct., in press], while all existing solutions neglect this effect [e.g. S. Benyoucef, A. Tounsi, S.A. Meftah, E.A. Adda Bedia, Compos. Interfaces, in press; S.T. Smith, J.G. Teng, Eng. Struct. 23 (7) (2001) 857-871; T.M. Roberts, Struct. Eng. 67 (12) (1989) 229-233; A. Tounsi, S. Benyoucef, Int. J. Adhes. Adhes., in press; T. Stratford, J. Cadei, Construct. Building Mater. 20 (2006) 34-35]. In addition, in the present study the anisotropic damage model is adopted to describe the damage of the RC beams. It is shown that the damage has a significant effect on the interfacial stresses in FRP-damaged RC beam

  7. A new NASA LaRC Multi-Purpose Prepregging Unit

    Science.gov (United States)

    Wilkinson, S. P.; Marchello, J. M.; Dixon, D.; Johnston, N. J.

    1993-01-01

    A multi-purpose prepregging machine has been designed and built for NASA Langley Research Center. The machine has numerous advantages over existing units due to its various modular components. Each of these can be used individually or simultaneously depending on the required prepregging method. A reverse roll coater provides the ability to prepare thin films from typical hot-melt thermoset formulations. Also, if necessary, the design allows direct fiber impregnation within the reverse roll coater gap. Included in the impregnation module is a solution dip tank allowing the fabrication of thermoplastic prepregs from solution. The proceeding modules within the unit consist of four nip stations, two hot-plates, a hot-sled option and a high temperature oven. This paper describes the advantages of such a modular construction and discusses the various processing combinations available to the prepregger. A variety of high performance prepreg material systems were produced on IM7 (Hercules) carbon fiber. These included LaRC RP46, a PMR-type resin processed from methanol and two polyamide acids, LaRC IA and LaRC ITPI, prpregged from N-methyl pyrrolidinone (NMP). Parameters involved in the production of these prepreg materials are presented as are the mechanical properties of the resulting good quality laminates. A brief introduction into the existing prepregging science is presented. Topics relating to solution prepregging are identified with a focus on the current research effort and its future development.

  8. Ion distributions in RC at different energy levels retrieved from TWINS ENA images by voxel CT tech

    Science.gov (United States)

    Ma, S. Y.; McComas, David; Xu, Liang; Goldstein, Jerry; Yan, Wei-Nan

    2012-07-01

    Distributions of energetic ions in the RC regions in different energy levels are retrieved by using 3-D voxel CT inversion method from ENA measurements onboard TWINS constellation during the main phase of a moderate geomagnetic storm. It is assumed that the ion flux distribution in the RC is anisotropic in regard to pitch angle which complies with the adiabatic invariance of the magnetic moment as ion moving in the dipole magnetic mirror field. A semi-empirical model of the RC ion distribution in the magnetic equator is quoted to form the ion flux distribution shape at off-equatorial latitudes by mapping. For the concerned time interval, the two satellites of the TWINS flying in double Molnia orbits were located in nearly the same meridian plane at vantage points widely separated in magnetic local time, and both more than 5 RE geocentric distance from the Earth. The ENA data used in this study are differential fluxes averaged over 12 sweeps (corresponding to an interval of 16 min.) at different energy levels ranging from about 1 to 100 keV. The retrieved ion distributions show that in total the main part of the RC is located in the region with L value larger than 4, tending to increase at larger L. It reveals that there are two distinct dominant energy bands at which the ion fluxes are significantly larger magnitude than at other energy levels, one is at lower level around 2 keV and the other at higher level of 30-100 keV. Furthermore, it is very interesting that the peak fluxes of the RC ions at the two energy bands occurred in different magnetic local time, low energy ions appear preferentially in after midnight, while the higher energy ions mainly distributed around midnight and pre-midnight. This new profile is worthy of further study and needs to be demonstrated by more cases.

  9. The RC Circuit: An Approach with Fourier Transforms

    Indian Academy of Sciences (India)

    The RC Circuit: An Approach with Fourier Transforms. Classroom Volume 21 Issue 11 November 2016 pp 1029-1042 ... But a lot of things, (including the complex impedanceitself, and some insight into complex analysis) can be understoodbetter if we use the FT approach to solve the differentialequations that come up in ...

  10. Hypomethylation of the IL17RC Promoter Associates with Age-Related Macular Degeneration

    Directory of Open Access Journals (Sweden)

    Lai Wei

    2012-11-01

    Full Text Available Age-related macular degeneration (AMD is the leading cause of irreversible blindness in the elderly population worldwide. Although recent studies have demonstrated strong genetic associations between AMD and SNPs in a number of genes, other modes of regulation are also likely to play a role in the etiology of this disease. We identified a significantly decreased level of methylation on the IL17RC promoter in AMD patients. Furthermore, we showed that hypomethylation of the IL17RC promoter in AMD patients led to an elevated expression of its protein and messenger RNA in peripheral blood as well as in the affected retina and choroid, suggesting that the DNA methylation pattern and expression of IL17RC may potentially serve as a biomarker for the diagnosis of AMD and likely plays a role in disease pathogenesis.

  11. DISTRIBUTED RC NETWORKS WITH RATIONAL TRANSFER FUNCTIONS,

    Science.gov (United States)

    A distributed RC circuit analogous to a continuously tapped transmission line can be made to have a rational short-circuit transfer admittance and...one rational shortcircuit driving-point admittance. A subcircuit of the same structure has a rational open circuit transfer impedance and one rational ...open circuit driving-point impedance. Hence, rational transfer functions may be obtained while considering either generator impedance or load

  12. A study on shear behavior of R/C beams subjected to long-term heating

    International Nuclear Information System (INIS)

    Maruta, M.; Yamazaki, M.

    1993-01-01

    In nuclear power plants, many structural members are subjected to long term heating. There are few experimental data available on the behavior especially in shear of reinforced concrete (R/C) members subjected to long term heating. This paper describes a study aimed at experimentally determining the shear behavior of R/C members in nuclear power plant facilities following sustained heating at high temperatures

  13. Nonlinear analysis of RC cylindrical tank and subsoil accounting for a low concrete strength

    Directory of Open Access Journals (Sweden)

    Lewiński Paweł M.

    2017-01-01

    Full Text Available The paper discusses deformational and incremental approaches to a nonlinear FE analysis of soil-structure interaction including the description of behaviour of the RC structure and the subsoil under short-term loading. Two kinds of constitutive models for ground and structure were adopted for a nonlinear interaction analysis of the RC cylindrical tank with subsoil. The constitutive laws for concrete and subsoil were developed in compliance with the deformational and flow theories of plasticity. Moreover, a non-linear elastic-brittle-plastic analysis of RC axi-symmetric structures using finite element iterative techniques is presented. The results of the two types of FE analysis of soil-structure interaction are compared taking into account a low concrete strength of tank structure.

  14. Image Encryption Using Stream Cipher Based on Nonlinear Combination Generator with Enhanced Security

    Directory of Open Access Journals (Sweden)

    Belmeguenaï Aîssa

    2013-03-01

    Full Text Available The images are very largely used in our daily life; the security of their transfer became necessary. In this work a novel image encryption scheme using stream cipher algorithm based on nonlinear combination generator is developed. The main contribution of this work is to enhance the security of encrypted image. The proposed scheme is based on the use the several linear feedback shifts registers whose feedback polynomials are primitive and of degrees are all pairwise coprimes combined by resilient function whose resiliency order, algebraic degree and nonlinearity attain Siegenthaler’s and Sarkar, al.’s bounds. This proposed scheme is simple and highly efficient. In order to evaluate performance, the proposed algorithm was measured through a series of tests. These tests included visual test and histogram analysis, key space analysis, correlation coefficient analysis, image entropy, key sensitivity analysis, noise analysis, Berlekamp-Massey attack, correlation attack and algebraic attack. Experimental results demonstrate the proposed system is highly key sensitive, highly resistance to the noises and shows a good resistance against brute-force, statistical attacks, Berlekamp-Massey attack, correlation attack, algebraic attack and a robust system which makes it a potential candidate for encryption of image.

  15. Pitting corrosion and structural reliability of corroding RC structures: Experimental data and probabilistic analysis

    International Nuclear Information System (INIS)

    Stewart, Mark G.; Al-Harthy, Ali

    2008-01-01

    A stochastic analysis is developed to assess the temporal and spatial variability of pitting corrosion on the reliability of corroding reinforced concrete (RC) structures. The structure considered herein is a singly reinforced RC beam with Y16 or Y27 reinforcing bars. Experimental data obtained from corrosion tests are used to characterise the probability distribution of pit depth. The RC beam is discretised into a series of small elements and maximum pit depths are generated for each reinforcing steel bar in each element. The loss of cross-sectional area, reduction in yield strength and reduction in flexural resistance are then inferred. The analysis considers various member spans, loading ratios, bar diameters and numbers of bars in a given cross-section, and moment diagrams. It was found that the maximum corrosion loss in a reinforcing bar conditional on beam collapse was no more than 16%. The probabilities of failure considering spatial variability of pitting corrosion were up to 200% higher than probabilities of failure obtained from a non-spatial analysis after 50 years of corrosion. This shows the importance of considering spatial variability in a structural reliability analysis for deteriorating structures, particularly for corroding RC beams in flexure

  16. The Tension-Stiffening Contribution of NSM CFRP to the Behavior of Strengthened RC Beams

    Directory of Open Access Journals (Sweden)

    Ahmad Azim Shukri

    2015-07-01

    Full Text Available Tension stiffening is a characteristic behavior of reinforced concrete (RC beams which is directly affected by the bond-slip property of steel bar and concrete interfaces. A beam strengthened with a near-surface mounted (NSM technique would be even more affected by tension stiffening, as the NSM reinforcement also possess a bond-slip property. Yet assessing how much the tension stiffening of NSM contributes to the behavior of RC beams is difficult due to the fact that bond-slip effects cannot be directly incorporated into a strain-based moment-curvature analysis. As such, the tension stiffening is typically incorporated through various empirical formulations, which can require a great deal of testing and calibrations to be done. In this paper a relatively new method, which can be called the mechanics-based segmental approach, is used to directly simulate the tension stiffening effect of NSM reinforcements on RC beams, without the need for empirical formulations to indirectly simulate the tension stiffening. Analysis shows that the tension stiffening of NSM fiber reinforced polymer (FRP contributes a significant portion to the stiffness and strength of the strengthened RC beam not only during serviceability, but at all load levels.

  17. The Tension-Stiffening Contribution of NSM CFRP to the Behavior of Strengthened RC Beams.

    Science.gov (United States)

    Shukri, Ahmad Azim; Darain, Kh Mahfuz Ud; Jumaat, Mohd Zamin

    2015-07-08

    Tension stiffening is a characteristic behavior of reinforced concrete (RC) beams which is directly affected by the bond-slip property of steel bar and concrete interfaces. A beam strengthened with a near-surface mounted (NSM) technique would be even more affected by tension stiffening, as the NSM reinforcement also possess a bond-slip property. Yet assessing how much the tension stiffening of NSM contributes to the behavior of RC beams is difficult due to the fact that bond-slip effects cannot be directly incorporated into a strain-based moment-curvature analysis. As such, the tension stiffening is typically incorporated through various empirical formulations, which can require a great deal of testing and calibrations to be done. In this paper a relatively new method, which can be called the mechanics-based segmental approach, is used to directly simulate the tension stiffening effect of NSM reinforcements on RC beams, without the need for empirical formulations to indirectly simulate the tension stiffening. Analysis shows that the tension stiffening of NSM fiber reinforced polymer (FRP) contributes a significant portion to the stiffness and strength of the strengthened RC beam not only during serviceability, but at all load levels.

  18. Damage Localization and Quantification of Earthquake Excited RC-Frames

    DEFF Research Database (Denmark)

    Skjærbæk, P.S.; Nielsen, Søren R.K.; Kirkegaard, Poul Henning

    In the paper a recently proposed method for damage localization and quantification of RC-structures from response measurements is tested on experimental data. The method investigated requires at least one response measurement along the structure and the ground surface acceleration. Further, the t...

  19. Regulatory Phosphorylation of Bacterial-Type PEP Carboxylase by the Ca2+-Dependent Protein Kinase RcCDPK1 in Developing Castor Oil Seeds.

    Science.gov (United States)

    Ying, Sheng; Hill, Allyson T; Pyc, Michal; Anderson, Erin M; Snedden, Wayne A; Mullen, Robert T; She, Yi-Min; Plaxton, William C

    2017-06-01

    Phosphoenolpyruvate carboxylase (PEPC) is a tightly controlled cytosolic enzyme situated at a crucial branch point of central plant metabolism. In developing castor oil seeds ( Ricinus communis ) a novel, allosterically desensitized 910-kD Class-2 PEPC hetero-octameric complex, arises from a tight interaction between 107-kD plant-type PEPC and 118-kD bacterial-type (BTPC) subunits. The native Ca 2+ -dependent protein kinase (CDPK) responsible for in vivo inhibitory phosphorylation of Class-2 PEPC's BTPC subunit's at Ser-451 was highly purified from COS and identified as RcCDPK1 (XP_002526815) by mass spectrometry. Heterologously expressed RcCDPK1 catalyzed Ca 2+ -dependent, inhibitory phosphorylation of BTPC at Ser-451 while exhibiting: ( i ) a pair of Ca 2+ binding sites with identical dissociation constants of 5.03 μM, ( ii ) a Ca 2+ -dependent electrophoretic mobility shift, and ( iii ) a marked Ca 2+ -independent hydrophobicity. Pull-down experiments established the Ca 2+ -dependent interaction of N-terminal GST-tagged RcCDPK1 with BTPC. RcCDPK1-Cherry localized to the cytosol and nucleus of tobacco bright yellow-2 cells, but colocalized with mitochondrial-surface associated BTPC-enhanced yellow fluorescent protein when both fusion proteins were coexpressed. Deletion analyses demonstrated that although its N-terminal variable domain plays an essential role in optimizing Ca 2+ -dependent RcCDPK1 autophosphorylation and BTPC transphosphorylation activity, it is not critical for in vitro or in vivo target recognition. Arabidopsis ( Arabidopsis thaliana ) CPK4 and soybean ( Glycine max ) CDPKβ are RcCDPK1 orthologs that effectively phosphorylated castor BTPC at Ser-451. Overall, the results highlight a potential link between cytosolic Ca 2+ signaling and the posttranslational control of respiratory CO 2 refixation and anaplerotic photosynthate partitioning in support of storage oil and protein biosynthesis in developing COS. © 2017 American Society of Plant

  20. Numerical model of RC beam response to corrosion

    Science.gov (United States)

    German, Magdalena; Pamin, Jerzy

    2018-01-01

    The chloride-induced corrosion of reinforcement used to be represented by Tuutti's model with initiation and propagation phases. During the initiation phase chlorides penetrate the concrete cover and accumulate around reinforcement bars. The chloride concentration in concrete increases until it reaches a chloride threshold value, causing deterioration of the passive layer of reinforcement. Then the propagation phase begins. During the propagation phase steel has no natural anti-corrosion protection, a corrosion current flows and this induces the production of rust. A growing volume of corrosion products generates stresses in concrete, which leads to cracking, splitting, delamination and loss of strength. The mechanical response of RC elements to reinforcement corrosion has mostly been examined on the basis of a 2D cross-section analysis. However, with this approach it is not possible to represent both corrosion and static loading. In the paper a 3D finite element model of an RC beam with the two actions applied is presented. Rust is represented as an interface between steel and concrete, considering the volumetric expansion of rust.

  1. Experimental study on behavior of RC panels covered with steel plates subjected to missile impact

    International Nuclear Information System (INIS)

    Jun Hashimoto; Katsuki Takiguchi; Koshiro Nishimura; Kazuyuki Matsuzawa; Mayuko Tsutsui; Yasuhiro Ohashi; Isao Kojima; Haruhiko Torita

    2005-01-01

    This paper describes an experimental study on the behavior of concrete panels with steel plate subjected to missile impact. Two tests were carried out, divided in accordance with the types of projectile, non-deformable and deformable. In all, 40 specimens of 750 mm square were prepared. The panel specimen was suspended vertically by two steel wire ropes to allow free movement after projectile impact, and was subjected to a projectile. As a result, it is confirmed that a RC panel with steel plate on its back side has higher impact resistance performance than a RC panel and that thickness of concrete panel, thickness of steel plate and the impact velocity of the projectile have a great effect on the failure modes of steel concrete panels. Moreover, based on the experimental results, the quantitative evaluation method for impact resistance performance of RC panels covered with steel plates is examined. The formula for perforation velocity of a half steel concrete panel, proposed in accordance with the bulging height, is effective to evaluate the impact resistance performance of RC panels with steel plates. (authors)

  2. Biochemical and Molecular Characterization of RcSUS1, a Cytosolic Sucrose Synthase Phosphorylated in Vivo at Serine 11 in Developing Castor Oil Seeds*

    Science.gov (United States)

    Fedosejevs, Eric T.; Ying, Sheng; Park, Joonho; Anderson, Erin M.; Mullen, Robert T.; She, Yi-Min; Plaxton, William C.

    2014-01-01

    Sucrose synthase (SUS) catalyzes the UDP-dependent cleavage of sucrose into UDP-glucose and fructose and has become an important target for improving seed crops via metabolic engineering. A UDP-specific SUS homotetramer composed of 93-kDa subunits was purified to homogeneity from the triacylglyceride-rich endosperm of developing castor oil seeds (COS) and identified as RcSUS1 by mass spectrometry. RcSUS1 transcripts peaked during early development, whereas levels of SUS activity and immunoreactive 93-kDa SUS polypeptides maximized during mid-development, becoming undetectable in fully mature COS. The cytosolic location of the enzyme was established following transient expression of RcSUS1-enhanced YFP in tobacco suspension cells and fluorescence microscopy. Immunological studies using anti-phosphosite-specific antibodies revealed dynamic and high stoichiometric in vivo phosphorylation of RcSUS1 at its conserved Ser-11 residue during COS development. Incorporation of 32Pi from [γ-32P]ATP into a RcSUS1 peptide substrate, alongside a phosphosite-specific ELISA assay, established the presence of calcium-dependent RcSUS1 (Ser-11) kinase activity. Approximately 10% of RcSUS1 was associated with COS microsomal membranes and was hypophosphorylated relative to the remainder of RcSUS1 that partitioned into the soluble, cytosolic fraction. Elimination of sucrose supply caused by excision of intact pods of developing COS abolished RcSUS1 transcription while triggering the progressive dephosphorylation of RcSUS1 in planta. This did not influence the proportion of RcSUS1 associated with microsomal membranes but instead correlated with a subsequent marked decline in SUS activity and immunoreactive RcSUS1 polypeptides. Phosphorylation at Ser-11 appears to protect RcSUS1 from proteolysis, rather than influence its kinetic properties or partitioning between the soluble cytosol and microsomal membranes. PMID:25313400

  3. Seismic performance of masonry-infilled RC frames

    Directory of Open Access Journals (Sweden)

    Mircea Bârnaure

    2016-09-01

    Full Text Available The masonry infill of RC frames structures is generally considered as non-structural. The design of the concrete frames is often made by ignoring the influence of the masonry infill, which is only accounted for its mass. The experience on buildings submitted to earthquakes shows that masonry infill walls completely change the behaviour of bare frames due to increased initial stiffness and low deformability. The way in which masonry infills affect the RC frames members is difficult to predict, as different failure modes can occur either in the masonry or in the surrounding frame. In addition to local effects, the position of the masonry infills at different levels can lead to structural irregularity, with a strong influence on the global seismic response of the building. Less infilled stories, also called soft stories, have a particularly unfavourable behaviour under seismic loads, as frame members at these levels are more susceptible to failure. This paper analyses the differences in the behaviour of bare and infilled frames through numerical modelling. Nonlinear push-over analyses of infilled frames are carried out under in-plane vertical and lateral loading. The infill panels are modelled as equivalent single diagonal struts. Several force-displacements laws are considered for these diagonals.

  4. Comparative Analysis of Existing RC Columns Jacketed with CFRP or FRCC

    Directory of Open Access Journals (Sweden)

    Marta Del Zoppo

    2018-03-01

    Full Text Available Reinforced concrete (RC columns typical of existing structures often exhibit premature failures during seismic events (i.e., longitudinal bars buckling and shear interaction mechanisms due to the poor quality concrete and the absence of proper seismic details in the potential plastic hinge region. The Fiber Reinforced Polymers (FRP externally bonded reinforcement is known to be a valid technique to improve the shear capacity or the ductility of existing RC columns. However, few experimental tests have proven its effectiveness in the case of columns affected by shear interaction mechanisms. In this work, the behavior of existing RC columns with border line behavior between flexure and shear have been investigated in the case of poor quality concrete and light FRP strengthening with local jacketing and medium quality concrete and strong FRP strengthening with local jacketing, in order to highlight the effect of concrete strength on the effectiveness of the retrofit intervention. As an alternative to FRP jacketing; the effectiveness of the Fiber Reinforced Cementitious Composite (FRCC jacketing for the seismic strengthening of columns with highly deteriorated concrete cover or columns already damaged by an earthquake is also evaluated. Six full-scale RC columns have been tested under cyclic loading: one was used as a control specimen; four were strengthened in the potential plastic hinge region with carbon FRP (CFRP; and one was fully jacketed with FRCC. The comparison between poor and medium quality concrete columns showed that the CFRP local jacketing is more effective in the case of poor quality concrete. The FRCC jacketing appears to be a sound repair strategy and a suitable alternative to the FRP jacketing in case of poor quality; however, more experimental research is needed for improving this retrofit technique.

  5. Scientific Performance Analysis of the SYZ Telescope Design versus the RC Telescope Design

    Science.gov (United States)

    Ma, Donglin; Cai, Zheng

    2018-02-01

    Recently, Su et al. propose an innovative design, referred as the “SYZ” design, for China’s new project of a 12 m optical-infrared telescope. The SYZ telescope design consists of three aspheric mirrors with non-zero power, including a relay mirror below the primary mirror. SYZ design yields a good imaging quality and has a relatively flat field curvature at Nasmyth focus. To evaluate the science-compatibility of this three-mirror telescope, in this paper, we thoroughly compare the performance of SYZ design with that of Ritchey–Chrétien (RC) design, a conventional two-mirror telescope design. Further, we propose the Observing Information Throughput (OIT) as a metric for quantitatively evaluating the telescopes’ science performance. We find that although a SYZ telescope yields a superb imaging quality over a large field of view, a two-mirror (RC) telescope design holds a higher overall throughput, a better diffraction-limited imaging quality in the central field of view (FOV < 5‧) which is better for the performance of extreme Adaptive Optics (AO), and a generally better scientific performance with a higher OIT value. D. Ma & Z. Cai contributed equally to this paper.

  6. Tune Up: Automotive Mechanics Instructional Program. Block 5.

    Science.gov (United States)

    O'Brien, Ralph D.

    The fifth of six instructional blocks in automotive mechanics, the lessons and supportive information in the document provide a guide for teachers in planning an instructional program in automotive tune-ups at the secondary and post secondary level. The material, as organized, is a suggested sequence of instruction within each block. Each lesson…

  7. KOMBINASI ALGORITMA AES, RC4 DAN ELGAMAL DALAM SKEMA HYBRID UNTUK KEAMANAN DATA

    Directory of Open Access Journals (Sweden)

    Adi Widarma

    2016-01-01

    Full Text Available Pengiriman atau pertukaran data adalah hal yang sering terjadi dalam dunia teknologi informasi. Data yang dikirim kadang sering berisi data informasi yang penting bahkan sangat rahasia dan harus dijaga keamanannya. Untuk menjaga keamanan data, dapat dilakukan dengan menggunakan teknik kriptografi. Algoritma AES dan RC4 adalah salah satu dari algoritma simetri. Kelemahan dari algoritma simetri adalah proses enkripsi dan dekripsi menggunakan kunci yang sama. Untuk mengatasi tersebut dilakukan dengan menggunakan algoritma Elgamal. Algoritma Elgamal adalah termasuk algoritma asimetri. Algoritma Elgamal digunakan untuk mengamankan kunci dari algoritma AES dan RC4. Peningkatan keamanan pesan dan kunci dilakukan dengan algoritma hybrid. Algoritma hybrid dengan mengkombinasikan beberapa algoritma baik algoritma simetri maupun algortima asimetri akan menambah keamanan sehingga menjadi lebih aman dan powerful (Jain & Agrawal 2014. Penelitian ini akan dilakukan metode hybrid yaitu mengkombinasikan beberapa algoritma kriptografi dengan menggunakan algoritma Advanced Encryption Standard (AES dan RC4 untuk kerahasiaan data serta algoritma Elgamal digunakan untuk enkripsi dan dekripsi kunci.

  8. RC-3095, a Selective Gastrin-Releasing Peptide Receptor Antagonist, Does Not Protect the Lungs in an Experimental Model of Lung Ischemia-Reperfusion Injury

    Directory of Open Access Journals (Sweden)

    Vera L. Oliveira-Freitas

    2015-01-01

    Full Text Available RC-3095, a selective GRPR antagonist, has been shown to have anti-inflammatory properties in different models of inflammation. However, its protective effect on lungs submitted to lung ischemia-reperfusion injury has not been addressed before. Then, we administrated RC-3095 intravenously before and after lung reperfusion using an animal model of lung ischemia-reperfusion injury (LIRI by clamping the pulmonary hilum. Twenty Wistar rats were subjected to an experimental model in four groups: SHAM, ischemia-reperfusion (IR, RC-Pre, and RC-Post. The final mean arterial pressure significantly decreased in IR and RC-Pre compared to their values before reperfusion (P<0.001. The RC-Post group showed significant decrease of partial pressure of arterial oxygen at the end of the observation when compared to baseline (P=0.005. Caspase-9 activity was significantly higher in the RC-Post as compared to the other groups (P<0.013. No significant differences were observed in eNOS activity among the groups. The groups RC-Pre and RC-Post did not show any significant decrease in IL-1β (P=0.159 and TNF-α (P=0.260, as compared to IR. The histological score showed no significant differences among the groups. In conclusion, RC-3095 does not demonstrate a protective effect in our LIRI model. Additionally, its use after reperfusion seems to potentiate cell damage, stimulating apoptosis.

  9. nRC: non-coding RNA Classifier based on structural features.

    Science.gov (United States)

    Fiannaca, Antonino; La Rosa, Massimo; La Paglia, Laura; Rizzo, Riccardo; Urso, Alfonso

    2017-01-01

    Non-coding RNA (ncRNA) are small non-coding sequences involved in gene expression regulation of many biological processes and diseases. The recent discovery of a large set of different ncRNAs with biologically relevant roles has opened the way to develop methods able to discriminate between the different ncRNA classes. Moreover, the lack of knowledge about the complete mechanisms in regulative processes, together with the development of high-throughput technologies, has required the help of bioinformatics tools in addressing biologists and clinicians with a deeper comprehension of the functional roles of ncRNAs. In this work, we introduce a new ncRNA classification tool, nRC (non-coding RNA Classifier). Our approach is based on features extraction from the ncRNA secondary structure together with a supervised classification algorithm implementing a deep learning architecture based on convolutional neural networks. We tested our approach for the classification of 13 different ncRNA classes. We obtained classification scores, using the most common statistical measures. In particular, we reach an accuracy and sensitivity score of about 74%. The proposed method outperforms other similar classification methods based on secondary structure features and machine learning algorithms, including the RNAcon tool that, to date, is the reference classifier. nRC tool is freely available as a docker image at https://hub.docker.com/r/tblab/nrc/. The source code of nRC tool is also available at https://github.com/IcarPA-TBlab/nrc.

  10. NoRC Recruitment by H2A.X Deposition at rRNA Gene Promoter Limits Embryonic Stem Cell Proliferation

    Directory of Open Access Journals (Sweden)

    Boris Eleuteri

    2018-05-01

    Full Text Available Summary: Embryonic stem cells (ESCs display an abbreviated cell cycle, resulting in a short doubling time and rapid proliferation. The histone variant H2A.X is critical for proliferation of stem cells, although mechanistic insights have remained obscure. Here, we show that H2A.X defines the rate of mouse ESC proliferation independently of the DNA damage response pathway, and it associates with three major chromatin-modifying complexes. Our functional and biochemical analyses demonstrate that H2A.X-associated factors mediate the H2A.X-dependent effect on ESC proliferation and involve the nucleolar remodeling complex (NoRC. A specific H2A.X deposition at rDNA promoters determines the chromatin recruitment of the NoRC, histone modifications, the rRNA transcription, and the rate of proliferation. Collectively, our results suggest that NoRC assembly by H2A.X deposition at rRNA promoters silences transcription, and this represents an important regulatory component for ESC proliferation. : Histone variant H2A.X defines the rate of embryonic stem cell proliferation. Eleuteri et al. identify H2A.X-interacting proteins, and they show that H2A.X deposition at rDNA promoters assembles the NoRC, which represses rRNA transcription and determines the rate of self-renewal. Keywords: ribosomal biogenesis, rRNA, rDNA, stem cells, TIP5, SNF2H, SPT16, BRG1, H2A.X, G1, cell cycle, cell cycle arrest, proliferation

  11. E-Block: A Tangible Programming Tool with Graphical Blocks

    OpenAIRE

    Danli Wang; Yang Zhang; Shengyong Chen

    2013-01-01

    This paper designs a tangible programming tool, E-Block, for children aged 5 to 9 to experience the preliminary understanding of programming by building blocks. With embedded artificial intelligence, the tool defines the programming blocks with the sensors as the input and enables children to write programs to complete the tasks in the computer. The symbol on the programming block's surface is used to help children understanding the function of each block. The sequence information is transfer...

  12. Problems and their solutions in practical application of Eurocodes in seismic design of RC structures

    Directory of Open Access Journals (Sweden)

    Milev Jordan

    2016-01-01

    Full Text Available The main purpose of the paper is to present practical application of Eurocodes in the field of RC structures design. The selected examples represent the main problems in practical application of Eurocodes for seismic analysis and design of RC Structures in Bulgarian construction practice. The analysis is focused on some structural and economic problems as well as on some contradictions in Eurocode 8 itself. Special attention is paid to the practical solution of the following problems: recognition of torsionally flexible systems, stiffness reduction of RC elements for linear analysis dimensions and detailing of confined boundary areas of shear walls, detailing of wall structures, etc. Those problems appear during the practical design of some buildings in Bulgaria. Several proposals for solving some problems defined in the paper are presented through some practical examples. Some conclusions are made for further application of Eurocode 8 in the design and construction practice. The importance of some rules and procedures in Eurocode 8 is supported by the examples of damaged RC members during the past earthquakes. The problems of Eurocode 8 and their solutions are illustrated through the experience of Bulgarian construction practice.

  13. Study on shear strengthening of RC continuous T-beams using different layers of CFRP strips

    Energy Technology Data Exchange (ETDEWEB)

    Alferjani, M. B. S.; Samad, A. A. Abdul; Mohamad, Noridah [Faculty of Civil and Environmental Engineering, Universiti Tun Hussein Onn Malaysia, Batu Pahat (Malaysia); Elrawaff, Blkasem S.; Elzaroug, Omer [Faculty of Civil Engineering Omar Al Mukhtar University, Bayda, Libya, Africa (Libya)

    2015-05-15

    Carbon fiber reinforced polymer (CFRP) laminates are externally bonded to reinforced concrete (RC) members to provide additional strength such as flexural, shear, etc. However, this paper presents the results of an experimental investigation for enhancing the shear capacity of reinforced concrete (RC) continuous T- beams using different layers of CFRP wrapping schemes. A total of three concrete beams were tested and various sheet configurations and layouts were studied to determine their effects on ultimate shear strength and shear capacity of the beams. One beam was kept as control beams, while other beams were strengthened with externally bonded CFRP strips with three side bonding and one or two layers of CFRP strips. From the test results, it was found that all schemes were found to be effective in enhancing the shear strength of RC beams. It was observed that the strength increases with the number of sheet layers provided the most effective strengthening for RC continuous T- beam. Beam strengthened using this scheme showed 23.21% increase in shear capacity as compared to the control beam. Two prediction models available in literature were used for computing the contribution of CFRP strips and compared with the experimental results.

  14. Cryptanalysis of Two Fault Countermeasure Schemes

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey

    2015-01-01

    function with some additional randomness and computes the value of the function. The second called the unmasking function, is computed securely using a different register and undoes the effect of the masking with random bits. We will show that there exists a weakness in the way in which both these schemes...... is meant for the protection of block ciphers like AES. The second countermeasure was proposed in IEEE-HOST 2015 and protects the Grain-128 stream cipher. The design divides the output function used in Grain-128 into two components. The first called the masking function, masks the input bits to the output...

  15. Summary of LaRC 2-inch Erectable Joint Hardware Heritage Test Data

    Science.gov (United States)

    Dorsey, John T.; Watson, Judith J.

    2016-01-01

    As the National Space Transportation System (STS, also known as the Space Shuttle) went into service during the early 1980's, NASA envisioned many missions of exploration and discovery that could take advantage of the STS capabilities. These missions included: large orbiting space stations, large space science telescopes and large spacecraft for manned missions to the Moon and Mars. The missions required structures that were significantly larger than the payload volume available on the STS. NASA Langley Research Center (LaRC) conducted studies to design and develop the technology needed to assemble the large space structures in orbit. LaRC focused on technology for erectable truss structures, in particular, the joint that connects the truss struts at the truss nodes. When the NASA research in large erectable space structures ended in the early 1990's, a significant amount of structural testing had been performed on the LaRC 2-inch erectable joint that was never published. An extensive set of historical information and data has been reviewed and the joint structural testing results from this historical data are compiled and summarized in this report.

  16. Behavior of Insulated Carbon-FRP-Strengthened RC Beams Exposed to Fire

    Science.gov (United States)

    Sayin, B.

    2014-09-01

    There are two main approaches to improving the fire resistance of fiber-reinforced polymer (FRP) systems. While the most common method is to protect or insulate the FRP system, an other way is to use fibers and resins with a better fire performance. This paper presents a numerical investigation into the five protection behavior of insulated carbon-fiber-reinforced-polymer (CFRP)-strengthened reinforced concrete (RC) beams. The effects of external loading and thermal expansion of materials at elevated temperatures are taken into consideration in a finite-element model. The validity of the numerical model is demonstrated with results from an existing experimental study on insulated CFRP-strengthened RC beams. Conclusions of this investigation are employed to predict the structural behavior of CFRP-strengthened concrete structures.

  17. Analysis of an Irregular RC Multi-storeyed Building Subjected to Dynamic Loading

    Science.gov (United States)

    AkashRaut; Pachpor, Prabodh; Dautkhani, Sanket

    2018-03-01

    Many buildings in the present scenario have irregular configurations both in plan and elevation. This in future may subject to devastating earthquakes. So it is necessary to analyze the structure. The present paper is made to study three type of irregularity wiz vertical, mass and plan irregularity as per clause 7.1 of IS 1893 (part1)2002 code. The paper discusses the analysis of RC (Reinforced Concrete) Buildings with vertical irregularity. The study as a whole makes an effort to evaluate the effect of vertical irregularity on RC buildings for which comparison of three parameters namely shear force, bending moment and deflection are taken into account.

  18. Derivation of the human embryonic stem cell line RCe012-A (RC-8

    Directory of Open Access Journals (Sweden)

    P.A. De Sousa

    2016-03-01

    Full Text Available The human embryonic stem cell line RCe012-A (RC-8 was derived from a frozen and thawed day 5 embryo cultivated to the blastocyst stage. The embryo was voluntarily donated as unsuitable and surplus to fertility requirements following ethics committee approved informed consent under licence from the UK Human Fertilisation and Embryology Authority. The cell line shows normal pluripotency marker expression and differentiation to the three germ layers in vitro. It has a normal 46XX female karyotype and microsatellite PCR identity, HLA and blood group typing data is available.

  19. The efficacy of adding dexamethasone, midazolam, or epinephrine to 0.5% bupivacaine in supraclavicular brachial plexus block.

    Science.gov (United States)

    El-Baradey, Ghada F; Elshmaa, Nagat S

    2014-11-01

    The aim was to assess the effectiveness of adding either dexamethasone or midazolam in comparison with epinephrine addition to 0.5% bupivacaine in supraclavicular brachial plexus block. This is a prospective randomized controlled observer-blinded study. This study was carried out in Tanta University Hospital on 60 patients of both sexes; American Society of Anesthesiologists physical Status I and II, age range from 18 to 45 years undergo elective surgery to upper limb. All patients were anesthetized with ultrasound guided supraclavicular brachial plexus block and randomly divided into three groups (each group 20 patients) Group E (epinephrine): 30 mL bupivacaine 0.5%with 1:200,000 epinephrine (5 μg/mL). Group D (dexamethasone): 30 mL bupivacaine 0.5% and dexamethasone 8 mg. Group M (midazolam): 30 ml bupivacaine 0.5% and midazolam 50 μg/kg. The primary outcome measures were onset and duration of sensory and motor block and time to first analgesic request. The windows version of SPSS 11.0.1 (SPSS Inc., Chicago, IL, USA) was used for statistical analysis. Data were presented in form of mean ± standard deviation multiple analysis of variance (ANOVA) was used to compare the three groups and Scheffe test was used after ANOVA. Power of significance P < 0.05 was considered to be statistically significant. Onset of sensory and motor block was significantly rapid (P < 0.05) in Groups D and M in comparison with Group E. Time of administration of rescue analgesic, duration of sensory and motor block showed significant increase (P < 0.05) in Group D in comparison with Group M which showed significant increase (P < 0.05) in comparison with Group E. In comparison with epinephrine and midazolam addition of dexamethasone to bupivacaine had rapid onset of block and longer time to first analgesic request with fewer side-effects.

  20. Paravertebral Block Plus Thoracic Wall Block versus Paravertebral Block Alone for Analgesia of Modified Radical Mastectomy: A Retrospective Cohort Study.

    Directory of Open Access Journals (Sweden)

    Nai-Liang Li

    Full Text Available Paravertebral block placement was the main anesthetic technique for modified radical mastectomy in our hospital until February 2014, when its combination with blocks targeting the pectoral musculature was initiated. We compared the analgesic effects of paravertebral blocks with or without blocks targeting the pectoral musculature for modified radical mastectomy.We retrospectively collected data from a single surgeon and anesthesiologist from June 1, 2012, to May 31, 2015. Intraoperative sedatives and analgesic requirements, time to the first analgesic request, postoperative analgesic doses, patient satisfaction, and complications were compared.Fifty-four patients received a paravertebral block alone (PECS 0, and 46 received a paravertebral block combined with blocks targeting the pectoral musculature (PECS 1. The highest intraoperative effect-site concentration of propofol was significantly lower in the PECS 1 group than in the PECS 0 group [2.3 (1.5, 2.8 vs 2.5 (1.5, 4 μg/mL, p = 0.0014]. The intraoperative rescue analgesic dose was significantly lower in the PECS 1 group [0 (0, 25 vs 0 (0, 75 mg of ketamine, p = 0.0384]. Furthermore, the PECS 1 group had a significantly longer time to the first analgesic request [636.5 (15, 720 vs 182.5 (14, 720 min, p = 0.0001]. After further adjustment for age, body mass index, American Society of Anesthesiologists Physical Status classification, chronic pain history, incidence of a superficial cervical plexus block placement, and operation duration, blocks targeting the pectoral musculature were determined to be the only significant factor (hazard ratio, 0.36; 95% confidence interval, 0.23-0.58; p < 0.0001. Very few patients used potent analgesics including morphine and ketorolac; the cumulative use of morphine or ketorolac was similar in the study groups. However, the incidence of all analgesic use, namely morphine, ketorolac, acetaminophen, and celecoxib, was significantly lower in the PECS 1 group [3.5

  1. Physical-layer security analysis of PSK quantum-noise randomized cipher in optically amplified links

    Science.gov (United States)

    Jiao, Haisong; Pu, Tao; Xiang, Peng; Zheng, Jilin; Fang, Tao; Zhu, Huatao

    2017-08-01

    The quantitative security of quantum-noise randomized cipher (QNRC) in optically amplified links is analyzed from the perspective of physical-layer advantage. Establishing the wire-tap channel models for both key and data, we derive the general expressions of secrecy capacities for the key against ciphertext-only attack and known-plaintext attack, and that for the data, which serve as the basic performance metrics. Further, the maximal achievable secrecy rate of the system is proposed, under which secrecy of both the key and data is guaranteed. Based on the same framework, the secrecy capacities of various cases can be assessed and compared. The results indicate perfect secrecy is potentially achievable for data transmission, and an elementary principle of setting proper number of photons and bases is given to ensure the maximal data secrecy capacity. But the key security is asymptotically perfect, which tends to be the main constraint of systemic maximal secrecy rate. Moreover, by adopting cascaded optical amplification, QNRC can realize long-haul transmission with secure rate up to Gb/s, which is orders of magnitude higher than the perfect secrecy rates of other encryption systems.

  2. Chaos based video encryption using maps and Ikeda time delay system

    Science.gov (United States)

    Valli, D.; Ganesan, K.

    2017-12-01

    Chaos based cryptosystems are an efficient method to deal with improved speed and highly secured multimedia encryption because of its elegant features, such as randomness, mixing, ergodicity, sensitivity to initial conditions and control parameters. In this paper, two chaos based cryptosystems are proposed: one is the higher-dimensional 12D chaotic map and the other is based on the Ikeda delay differential equation (DDE) suitable for designing a real-time secure symmetric video encryption scheme. These encryption schemes employ a substitution box (S-box) to diffuse the relationship between pixels of plain video and cipher video along with the diffusion of current input pixel with the previous cipher pixel, called cipher block chaining (CBC). The proposed method enhances the robustness against statistical, differential and chosen/known plain text attacks. Detailed analysis is carried out in this paper to demonstrate the security and uniqueness of the proposed scheme.

  3. Structural model and excitonic properties of the dimeric RC-LH1-PufX complex from Rhodobacter sphaeroides

    International Nuclear Information System (INIS)

    Sener, Melih; Hsin, Jen; Trabuco, Leonardo G.; Villa, Elizabeth; Qian, Pu; Hunter, C. Neil; Schulten, Klaus

    2009-01-01

    The light-harvesting apparatus of the purple bacterial photosynthetic unit consists of a pool of peripheral light-harvesting complexes that transfer excitation energy to a reaction center (RC) via the surrounding pigment-protein complex LH1. Recent electron microscopy and atomic force microscopy studies have revealed that RC-LH1 units of Rhodobacter (Rba.) sphaeroides form membrane-bending dimeric complexes together with the polypeptide PufX. We present a structural model for these RC-LH1-PufX dimeric complexes constructed using the molecular dynamics flexible fitting method based on an EM density map. The arrangement of the LH1 BChls displays a distortion near the proposed location of the PufX polypeptide. The resulting atomic model for BChl arrays is used to compute the excitonic properties of the dimeric RC-LH1 complex. A comparison is presented between the structural and excitonic features of the S-shaped dimeric BChl array of Rba. sphaeroides and the circular BChl arrangement found in other purple bacteria

  4. Pros and cons of multistory RC tunnel-form (box-type) buildings

    Science.gov (United States)

    Kalkan, E.; Yuksel, S.B.

    2008-01-01

    Tunnel-form structural systems (i.e., box systems), having a load-carrying mechanism composed of reinforced concrete (RC) shear walls and slabs only, have been prevailingly utilized in the construction of multistory residential units. The superiority of tunnel-form buildings over their conventional counterparts stems from the enhanced earthquake resistance they provide, and the considerable speed and economy of their construction. During recent earthquakes in Turkey, they exhibited better seismic performance in contrast to the damaged condition of a number of RC frames and dual systems (i.e., RC frames with shear wall configurations). Thus the tunnel-form system has become a primary construction technique in many seismically active regions. In this paper, the strengths and weaknesses of tunnel-form buildings are addressed in terms of design considerations and construction applications. The impacts of shear wall reinforcement ratio and its detailing on system ductility, loadcarrying capacity and failure mechanism under seismic forces are evaluated at section and global system levels. Influences of tension/compression coupling and wall openings on the response are also discussed. Three-dimensional nonlinear finite element models, verified through comparisons with experimental results, were used for numerical assessments. Findings from this projection provide useful information on adequate vertical reinforcement ratio and boundary reinforcement to achieve enhanced performance of tunnel-form buildings under seismic actions. Copyright ?? 2007 John Wiley & Sons, Ltd.

  5. Regulatory Phosphorylation of Bacterial-Type PEP Carboxylase by the Ca2+-Dependent Protein Kinase RcCDPK1 in Developing Castor Oil Seeds1[OPEN

    Science.gov (United States)

    Hill, Allyson T.; Anderson, Erin M.; She, Yi-Min

    2017-01-01

    Phosphoenolpyruvate carboxylase (PEPC) is a tightly controlled cytosolic enzyme situated at a crucial branch point of central plant metabolism. In developing castor oil seeds (Ricinus communis) a novel, allosterically desensitized 910-kD Class-2 PEPC hetero-octameric complex, arises from a tight interaction between 107-kD plant-type PEPC and 118-kD bacterial-type (BTPC) subunits. The native Ca2+-dependent protein kinase (CDPK) responsible for in vivo inhibitory phosphorylation of Class-2 PEPC’s BTPC subunit’s at Ser-451 was highly purified from COS and identified as RcCDPK1 (XP_002526815) by mass spectrometry. Heterologously expressed RcCDPK1 catalyzed Ca2+-dependent, inhibitory phosphorylation of BTPC at Ser-451 while exhibiting: (i) a pair of Ca2+ binding sites with identical dissociation constants of 5.03 μM, (ii) a Ca2+-dependent electrophoretic mobility shift, and (iii) a marked Ca2+-independent hydrophobicity. Pull-down experiments established the Ca2+-dependent interaction of N-terminal GST-tagged RcCDPK1 with BTPC. RcCDPK1-Cherry localized to the cytosol and nucleus of tobacco bright yellow-2 cells, but colocalized with mitochondrial-surface associated BTPC-enhanced yellow fluorescent protein when both fusion proteins were coexpressed. Deletion analyses demonstrated that although its N-terminal variable domain plays an essential role in optimizing Ca2+-dependent RcCDPK1 autophosphorylation and BTPC transphosphorylation activity, it is not critical for in vitro or in vivo target recognition. Arabidopsis (Arabidopsis thaliana) CPK4 and soybean (Glycine max) CDPKβ are RcCDPK1 orthologs that effectively phosphorylated castor BTPC at Ser-451. Overall, the results highlight a potential link between cytosolic Ca2+ signaling and the posttranslational control of respiratory CO2 refixation and anaplerotic photosynthate partitioning in support of storage oil and protein biosynthesis in developing COS. PMID:28363991

  6. EXTERNAL PRESTRESSING OF RC T-BEAMS WITH CFRP TENDONS

    DEFF Research Database (Denmark)

    Bennitz, Anders; Schmidt, Jacob Wittrup; Täljsten, Björn

    2009-01-01

    FRPs is about to become common practice. Several guidelines on the subject have been presented during the last decade, e.g. [1-5]. Next step is to further utilize the excellent behaviour of the advanced material, in particular CFRP (Carbon Fiber Reinforced Polymers). CFRPs have mechanical properties...... capacity could be increased, with a carefully applied compressive stress existing open cracks in concrete may be partly closed and it might also be possible to reduce large deflections. In that way the durability of the entire RC (Reinforced Concrete) -structure can be increased. Application of FRPs......As the acceptance for non-stressed FRP (Fibre Reinforced Polymers) increase steadily in the construction industry, the industries susceptibility for new ideas in the material’s usage increase. Improving the performance of a bridge, a parking garage or a multistory building by the use of appropriate...

  7. The gammaTuRC Nanomachine Mechanism and Future Applications

    Science.gov (United States)

    Riehlman, Timothy D.

    The complexity and precision of the eukaryotic cell's cytoskeletal network is unrivaled by any man-made systems, perfected by billions of years of evolution, mastering elegant processes of self-assembly, error correction, and self-repair. Understanding the capabilities of these networks will have important and far reaching applications in human medicine by aiding our understanding of developmental processes, cellular division, and disease mechanisms, and through biomimicry will provide insights for biosynthetic manufacturing at the nanoscale and across scales. My research utilizes cross species techniques from Human to the model organism of Fission Yeast to investigate the structure and mechanisms of the g-tubulin ring complex (gTuRC). The gTuRC is a highly conserved eukaryotic multiprotein complex serving as a microtubule organizing center (MTOC) responsible for microtubule nucleation through templating, regulation of dynamics, and establishment of microtubule polarity. Microtubules are 25 nm diameter dynamic flexible polymers of a/b-tubulin heterodimers that function as scaffolds, force generators, distributors, and intracellular highways. The microtubule cytoskeleton is essential for numerous fundamental cellular processes such as mitotic division of chromosomes and cell division, organelle distribution within the cell, cell signaling, and cell shape. This incredible diversity in functions is made possible in part due to molecular motor Kinesin-like proteins (Klps), which allow expansion into more specialized neural, immune, and ciliated cell functions. Combined, the MTOC, microtubules, and Klps represent ideal microtubule cytoskeleton protein (MCP) modular components for in vitro biomimicry towards generation of adaptable patterned networks for human designed applications. My research investigates the hypothesis that a mechanistic understanding of conserved MTOC gTuRC mechanisms will help us understand dynamic cellular nanomachines and their ability to self

  8. Prediction of the Fundamental Period of Infilled RC Frame Structures Using Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    Panagiotis G. Asteris

    2016-01-01

    Full Text Available The fundamental period is one of the most critical parameters for the seismic design of structures. There are several literature approaches for its estimation which often conflict with each other, making their use questionable. Furthermore, the majority of these approaches do not take into account the presence of infill walls into the structure despite the fact that infill walls increase the stiffness and mass of structure leading to significant changes in the fundamental period. In the present paper, artificial neural networks (ANNs are used to predict the fundamental period of infilled reinforced concrete (RC structures. For the training and the validation of the ANN, a large data set is used based on a detailed investigation of the parameters that affect the fundamental period of RC structures. The comparison of the predicted values with analytical ones indicates the potential of using ANNs for the prediction of the fundamental period of infilled RC frame structures taking into account the crucial parameters that influence its value.

  9. RC structures strengthened by metal shear panels: experimental and numerical analysis

    International Nuclear Information System (INIS)

    De Matteis, G.; Formisano, A.; Mazzolani, F. M.

    2008-01-01

    Metal shear panels (MSPs) may be effectively used as a lateral load resisting system for framed structures. In the present paper, such a technique is applied for the seismic protection of existing RC buildings, by setting up a specific design procedure, which has been developed on the basis of preliminary full-scale experimental tests. The obtained results allowed the development of both simplified and advanced numerical models of both the upgraded structure and the applied shear panels. Also, the proposed design methodology, which is framed in the performance base design philosophy, has been implemented for the structural upgrading of a real Greek existing multi-storey RC building. The results of the numerical analysis confirmed the effectiveness of the proposed technique, also emphasising the efficiency of the implemented design methodology

  10. Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract)

    NARCIS (Netherlands)

    Law, Yee Wei; Doumen, Jeroen; Hartel, Pieter H.

    The energy efficiency requirement of wireless sensor networks (WSNs) is especially high because the sensor nodes are meant to operate without human intervention for a long period of time with little energy supply. Besides, available storage is scarce due to their small physical size. Therefore

  11. Cutaneous Sensory Block Area, Muscle-Relaxing Effect, and Block Duration of the Transversus Abdominis Plane Block

    DEFF Research Database (Denmark)

    Støving, Kion; Rothe, Christian; Rosenstock, Charlotte V

    2015-01-01

    BACKGROUND AND OBJECTIVES: The transversus abdominis plane (TAP) block is a widely used nerve block. However, basic block characteristics are poorly described. The purpose of this study was to assess the cutaneous sensory block area, muscle-relaxing effect, and block duration. METHODS: Sixteen...... healthy volunteers were randomized to receive an ultrasound-guided unilateral TAP block with 20 mL 7.5 mg/mL ropivacaine and placebo on the contralateral side. Measurements were performed at baseline and 90 minutes after performing the block. Cutaneous sensory block area was mapped and separated...... into a medial and lateral part by a vertical line through the anterior superior iliac spine. We measured muscle thickness of the 3 lateral abdominal muscle layers with ultrasound in the relaxed state and during maximal voluntary muscle contraction. The volunteers reported the duration of the sensory block...

  12. Onset response of bupivacaine 0.5% which has been added with sodium bicarbonate on epidural block

    Directory of Open Access Journals (Sweden)

    Marwoto Marwoto

    2005-03-01

    Full Text Available There are many advantages in using epidural anesthesia technique. However, there are also some constraints, such as the relatively long onset, particularly in the case of bupivacaine. Whereas the need of a rapid onset of anesthesia technique for emergency cares is increasing lately. The objective of this study was to find a method to hasten the onset of bupivacaine. This is a cross sectional randomized double blind controlled clinical trial performed on 40 patients who would undergo lower abdomen and extremity surgery with epidural block. We evaluated the onset of action of bupivacaine which has been added with sodium bicarbonate. Consecutive sampling method was applied to get the sample. The criteria of sample are ASA I – II patient, aged of 20-60 years old, 50-60 kg of weight, 150-170 cm of height. Patients were allocated randomly into two groups. The treatment group would get epidural block using mixture of 20 cc of bupivacaine 0,5 % + 0.5 cc of sodium bicarbonate 1.4 %, whereas the control group received 20 cc bupivacaine 0.5 % + 0.5 cc aqua bides. Time to reach sensoric block at the level of thoracal 10 dermatome using the pinprick method and time to reach motoric blockade using the bromage scale was recorded. The result of this study showed a significant shortening of the onset of sensory blockade (p<0.05 in the treatment group (10.2±1.4 minutes compared with the control group (19.5±1.3 minutes. The onset of motor blockade had also a significant shortening (p<0.05 in the treatment group(13.3±1.6 minutes compared with the control group (23.0±1.2 minutes. It was concluded that the addition of sodium bicarbonate can hasten the onset of bupivacaine on epidural block. (Med J Indones 2005; 14: 7-10Keywords : onset response, bupivacaine 0.5%, sodium bicarbonate, epidural block

  13. Strengthening of RC bridge slabs using CFRP sheets

    Directory of Open Access Journals (Sweden)

    Fahmy A. Fathelbab

    2014-12-01

    Full Text Available Many old structures became structurally insufficient to carry the new loading conditions requirements. Moreover, they suffer from structural degradation, reinforcement steel bars corrosion, bad weather conditions…etc. Many official authorities in several countries had recognized many old bridges and buildings as structurally deficient by today’s standards. Due to these reasons, structural strengthening became an essential requirement and different strengthening techniques appeared in market. Fiber Reinforced Polymer (FRP strengthening techniques established a good position among all other techniques, giving excellent structural results, low time required and moderate cost compared with the other techniques. The main purpose of this research is to study analytically the strengthening of a reinforced concrete bridge slabs due to excessive loads, using externally bonded FRP sheets technique. A commercial finite element program ANSYS was used to perform a structural linear and non-linear analysis for strengthened slab models using several schemes of FRP sheets. A parametric study was performed to evaluate analytically the effect of changing both FRP stiffness and FRP schemes in strengthening RC slabs. Comparing the results with control slab (reinforced concrete slab without strengthening it is obvious that attaching FRP sheets to the RC slab increases its capacity and enhances the ductility/toughness.

  14. Semi-Active Control of Precast RC Columns under Seismic Action

    Science.gov (United States)

    Caterino, Nicola; Spizzuoco, Mariacristina

    2017-10-01

    This work is inspired by the idea of dissipating seismic energy at the base of prefabricated RC columns via semi-active (SA) variable dampers exploiting the base rocking. It was performed a wide numerical campaign to investigate the seismic behaviour of a pre-cast RC column with a variable base restraint. The latter is based on the combined use of a hinge, elastic springs, and magnetorheological (MR) dampers remotely controlled according to the instantaneous response of the structural component. The MR devices are driven by a SA control algorithm purposely written to modulate the dissipative capability so as to reduce base bending moment without causing excessive displacement at the top. The proposed strategy results to be really promising, since the base restraint relaxation, that favours the base moment demand reduction, is accompanied by a high enhancement of the dissipated energy due to rocking that can be even able to reduce top displacement in respect to the “fixed base rotation” conditions.

  15. Exploring the energy consumption of lightweight blockciphers in FPGA

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco

    2015-01-01

    Internet of things and cyber-physical systems requiring security functionality has pushed for the design of a number of block ciphers and hash functions specifically developed for being implemented in resource constrained devices. Initially the optimization was mainly on area and power consumption...

  16. Fluoxetine Blocks Nav1.5 Channels via a Mechanism Similar to That of Class 1 Antiarrhythmics

    Science.gov (United States)

    Poulin, Hugo; Bruhova, Iva; Timour, Quadiri; Theriault, Olivier; Beaulieu, Jean-Martin; Frassati, Dominique

    2014-01-01

    The voltage-gated Nav1.5 channel is essential for the propagation of action potentials in the heart. Malfunctions of this channel are known to cause hereditary diseases. It is a prime target for class 1 antiarrhythmic drugs and a number of antidepressants. Our study investigated the Nav1.5 blocking properties of fluoxetine, a selective serotonin reuptake inhibitor. Nav1.5 channels were expressed in HEK-293 cells, and Na+ currents were recorded using the patch-clamp technique. Dose-response curves of racemic fluoxetine (IC50 = 39 μM) and its optical isomers had a similar IC50 [40 and 47 μM for the (+) and (−) isomers, respectively]. Norfluoxetine, a fluoxetine metabolite, had a higher affinity than fluoxetine, with an IC50 of 29 μM. Fluoxetine inhibited currents in a frequency-dependent manner, shifted steady-state inactivation to more hyperpolarized potentials, and slowed the recovery of Nav1.5 from inactivation. Mutating a phenylalanine (F1760) and a tyrosine (Y1767) in the S6 segment of domain (D) IV (DIVS6) significantly reduced the affinity of fluoxetine and its frequency-dependent inhibition. We used a noninactivating Nav1.5 mutant to show that fluoxetine displays open-channel block behavior. The molecular model of fluoxetine in Nav1.5 was in agreement with mutational experiments in which F1760 and Y1767 were found to be the key residues in binding fluoxetine. We concluded that fluoxetine blocks Nav1.5 by binding to the class 1 antiarrhythmic site. The blocking of cardiac Na+ channels should be taken into consideration when prescribing fluoxetine alone or in association with other drugs that may be cardiotoxic or for patients with conduction disorders. PMID:25028482

  17. Tramadol as adjunct to psoas compartment block with levobupivacaine 0.5%: a randomized double-blinded study.

    LENUS (Irish Health Repository)

    Mannion, S

    2012-02-03

    BACKGROUND: Tramadol has been administered peripherally to prolong analgesia after brachial plexus and neuraxial blocks. Our aim was to evaluate the systemic and perineural effects of tramadol as an analgesic adjunct to psoas compartment block (PCB) with levobupivacaine. METHODS: In a randomized, prospective, double-blinded trial, 60 patients (ASA I-III), aged 49-88 yr, undergoing primary total hip or knee arthroplasty underwent PCB and subsequent bupivacaine spinal anaesthesia. Patients were randomized into three groups. Each patient received PCB with levobupivacaine 0.5%, 0.4 ml kg(-1). The control group (group L, n=21) received i.v. saline, the systemic tramadol group (group IT, n=19) received i.v. tramadol 1.5 mg kg(-1) and the perineural tramadol group (group T, n=20) received i.v. saline and PCB with tramadol 1.5 mg kg(-1). Postoperatively patients received regular paracetamol 6-hourly and diclofenac sodium 12-hourly. Time to first morphine analgesia, 24-hour morphine consumption, sensory block, pain and sedation scores and haemodynamic parameters were recorded. RESULTS: Time (h) to first morphine analgesia was similar in the three groups [mean (SD)]: group L, 11.2 (6.6); group T, 14.5 (8.0); group IT, 14.6 (6.8); P=0.35. Twenty-four-hour cumulative morphine (mg) consumption was also similar in the three groups [group L, 21.9 (10.1); group T, 19.8 (6.7), group IT, 16.5 (9.5)], as were durations of sensory and motor block. There were no differences in the incidence of adverse effects except that patients in group IT were more sedated at 14 h than group L (P=0.02). CONCLUSION: We conclude that our data do not support a clinically important local anaesthetic or peripheral analgesic effect of tramadol as adjunct to PCB with levobupivacaine 0.5%.

  18. Molecular insight into γ-γ tubulin lateral interactions within the γ-tubulin ring complex (γ-TuRC)

    Science.gov (United States)

    Suri, Charu; Hendrickson, Triscia W.; Joshi, Harish C.; Naik, Pradeep Kumar

    2014-09-01

    γ-tubulin is essential for the nucleation and organization of mitotic microtubules in dividing cells. It is localized at the microtubule organizing centers and mitotic spindle fibres. The most well accepted hypothesis for the initiation of microtubule polymerization is that α/β-tubulin dimers add onto a γ-tubulin ring complex (γTuRC), in which adjacent γ-tubulin subunits bind to the underlying non-tubulin components of the γTuRC. This template thus determines the resulting microtubule lattice. In this study we use molecular modelling and molecular dynamics simulations, combined with computational MM-PBSA/MM-GBSA methods, to determine the extent of the lateral atomic interaction between two adjacent γ-tubulins within the γTuRC. To do this we simulated a γ-γ homodimer for 10 ns and calculated the ensemble average of binding free energies of -107.76 kcal/mol by the MM-PBSA method and of -87.12 kcal/mol by the MM-GBSA method. These highly favourable binding free energy values imply robust lateral interactions between adjacent γ-tubulin subunits in addition to their end-interactions longitudinally with other proteins of γTuRC. Although the functional reconstitution of γ-TuRC subunits and their stepwise in vitro assembly from purified components is not yet feasible, we nevertheless wanted to recognize hotspot amino acids responsible for key γ-γ interactions. Our free energy decomposition data from converting a compendium of amino acid residues identified an array of hotspot amino acids. A subset of such mutants can be expressed in vivo in living yeast. Because γTuRC is important for the growth of yeast, we could test whether this subset of the hotspot mutations support growth of yeast. Consistent with our model, γ-tubulin mutants that fall into our identified hotspot do not support yeast growth.

  19. Hydrophobic and porous cellulose nanofibrous screen for efficient particulate matter (PM2.5) blocking

    International Nuclear Information System (INIS)

    Chen, Liping; Guo, Yi; Peng, Xinsheng

    2017-01-01

    Particulate matter (PM2.5) pollution in air seriously affects public health. However, both bulk thickness and the accumulation of PM particles typically lead to a quick decline in the air permeability and large pressure drops of the conventional air clean membranes. In this work, we choose cellulose nanofibers (CNFs, a low cost, biodegradable and sustainable material) to form a hydrophobic and porous CNF thin layer on a stainless steel screen (300 mesh with pore size of 48 µ m) through a simple filtration-assisted gelation process and subsequent polydimethylsiloxane modification. The prepared hydrophobic CNFs/stainless steel screen demonstrates highly efficient PM2.5 blocking based on size-sieving effect, fast air permeability and long-term durability under natural ventilation conditions in the relative humidity range from 45% to 93%. This technique holds great potential for indoor PM2.5 blocking under natural ventilation conditions. (paper)

  20. Hydrophobic and porous cellulose nanofibrous screen for efficient particulate matter (PM2.5) blocking

    Science.gov (United States)

    Chen, Liping; Guo, Yi; Peng, Xinsheng

    2017-10-01

    Particulate matter (PM2.5) pollution in air seriously affects public health. However, both bulk thickness and the accumulation of PM particles typically lead to a quick decline in the air permeability and large pressure drops of the conventional air clean membranes. In this work, we choose cellulose nanofibers (CNFs, a low cost, biodegradable and sustainable material) to form a hydrophobic and porous CNF thin layer on a stainless steel screen (300 mesh with pore size of 48 µm) through a simple filtration-assisted gelation process and subsequent polydimethylsiloxane modification. The prepared hydrophobic CNFs/stainless steel screen demonstrates highly efficient PM2.5 blocking based on size-sieving effect, fast air permeability and long-term durability under natural ventilation conditions in the relative humidity range from 45% to 93%. This technique holds great potential for indoor PM2.5 blocking under natural ventilation conditions.

  1. Identification of an Equivalent Linear Model for a Non-Linear Time-Variant RC-Structure

    DEFF Research Database (Denmark)

    Kirkegaard, Poul Henning; Andersen, P.; Brincker, Rune

    are investigated and compared with ARMAX models used on a running window. The techniques are evaluated using simulated data generated by the non-linear finite element program SARCOF modeling a 10-storey 3-bay concrete structure subjected to amplitude modulated Gaussian white noise filtered through a Kanai......This paper considers estimation of the maximum softening for a RC-structure subjected to earthquake excitation. The so-called Maximum Softening damage indicator relates the global damage state of the RC-structure to the relative decrease of the fundamental eigenfrequency in an equivalent linear...

  2. Virtual RC Damping of LCL-Filtered Voltage Source Converters with Extended Selective Harmonic Compensation

    DEFF Research Database (Denmark)

    Wang, Xiongfei; Blaabjerg, Frede; Loh, Poh Chiang

    2015-01-01

    Active damping and harmonic compensation are two common challenges faced by LCL-filtered voltage source converters. To manage them holistically, this paper begins by proposing a virtual RC damper in parallel with the passive filter capacitor. The virtual damper is actively inserted by feeding back...... the passive capacitor current through a high-pass filter, which indirectly, furnishes two superior features. They are the mitigation of phase lag experienced by a conventional damper and the avoidance of instability caused by the negative resistance inserted unintentionally. Moreover, with the virtual RC...

  3. An experimental investigation on the ultimate strength of epoxy repaired braced partial infilled RC frames

    Science.gov (United States)

    Dubey, Shailendra Kumar Damodar; Kute, Sunil

    2014-09-01

    Due to earthquake, buildings are damaged partially or completely. Particularly structures with soft storey are mostly affected. In general, such damaged structures are repaired and reused. In this regard, an experimental investigation was planned and conducted on models of single-bay, single-storey of partial concrete infilled reinforced concrete (RC) frames up to collapse with corner, central and diagonal steel bracings. Such collapsed frames were repaired with epoxy resin and retested. The initiative was to identify the behaviour, extent of restored ultimate strength and deflection of epoxy-retrofitted frames in comparison to the braced RC frames. The performance of such frames has been considered only for lateral loads. In comparison to bare RC frames, epoxy repaired partial infilled frames have significant increase in the lateral load capacity. Central bracing is more effective than corner and diagonal bracing. For the same load, epoxy repaired frames have comparable deflection than similar braced frames.

  4. FRP strengthening of RC walls with openings

    DEFF Research Database (Denmark)

    Hansen, Christian Skodborg; Sas, Gabriel; Täljsten, Björn

    2009-01-01

    Strengthening reinforced concrete (RC) walls with openings using fibre reinforced polymers (FRP) has been experimentally proven to be a viable rehabilitation method. However, very few theoretical investigations are reported. In this paper two methods of analysis are presented. Since openings vary...... in size, the analysis of a strengthened wall can be divided into frame idealization method for large openings, and combined disk and frame analysis for smaller openings. The first method provides an easy to use tool in practical engineering, where the latter describes the principles of a ductile...

  5. In RC buildings, the vertical and horizontal members (ie, the beams ...

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 4. Learning Earthquake Design and Construction - 18. How do Beams in RC Buildings Resist Earthquakes? C V R Murty. Classroom Volume 10 Issue 4 April 2005 pp 87-90 ...

  6. Block of the delayed rectifier current (IK) by the 5-HT3 antagonists ondansetron and granisetron in feline ventricular myocytes.

    Science.gov (United States)

    de Lorenzi, F G; Bridal, T R; Spinelli, W

    1994-01-01

    1. We investigated the effects of two 5-HT3 antagonists, ondansetron and granisetron, on the action potential duration (APD) and the delayed rectifier current (IK) of feline isolated ventricular myocytes. Whole-cell current and action potential recordings were performed at 37 degrees C with the patch clamp technique. 2. Ondansetron and granisetron blocked IK with a KD of 1.7 +/- 1.0 and 4.3 +/- 1.7 microM, respectively. At a higher concentration (30 microM), both drugs blocked the inward rectifier (IKl). 3. The block of IK was dependent on channel activation. Both drugs slowed the decay of IK tail currents and produced a crossover with the pre-drug current trace. These results are consistent with block and unblock from the open state of the channel. 4. Granisetron showed an intrinsic voltage-dependence as the block increased with depolarization. The equivalent voltage-dependency of block (delta) was 0.10 +/- 0.04, suggesting that granisetron blocks from the intracellular side at a binding site located 10% across the transmembrane electrical field. 5. Ondansetron (1 microM) and granisetron (3 microM) prolonged APD by about 30% at 0.5 Hz. The prolongation of APD by ondansetron was abolished at faster frequencies (3 Hz) showing reverse rate dependence. 6. In conclusion, the 5-HT3 antagonists, ondansetron and granisetron, are open state blockers of the ventricular delayed rectifier and show a clear class III action. PMID:7834204

  7. E-Block: A Tangible Programming Tool with Graphical Blocks

    Directory of Open Access Journals (Sweden)

    Danli Wang

    2013-01-01

    Full Text Available This paper designs a tangible programming tool, E-Block, for children aged 5 to 9 to experience the preliminary understanding of programming by building blocks. With embedded artificial intelligence, the tool defines the programming blocks with the sensors as the input and enables children to write programs to complete the tasks in the computer. The symbol on the programming block's surface is used to help children understanding the function of each block. The sequence information is transferred to computer by microcomputers and then translated into semantic information. The system applies wireless and infrared technologies and provides user with feedbacks on both screen and programming blocks. Preliminary user studies using observation and user interview methods are shown for E-Block's prototype. The test results prove that E-Block is attractive to children and easy to learn and use. The project also highlights potential advantages of using single chip microcomputer (SCM technology to develop tangible programming tools for children.

  8. Data of evolutionary structure change: 1ONAD-2D3RC [Confc[Archive

    Lifescience Database Archive (English)

    Full Text Available 1ONAD-2D3RC 1ONA 2D3R D C ADTIVAVELDTYPNTDIGDPSYPHIGIDIKSVRSKKTAK...WNMQNGKVGTAHIIYNSVDKRLSAVVSYPNADSATVSYDVDLDNVLPEWVRVGLSASTGLYKETNTILSWSFTSKLKT------NALHFMFNQFSKDQKDLILQGDAT... 1ONA D 1ONAD TRVSSN

  9. Design Optimization of Hybrid FRP/RC Bridge

    Science.gov (United States)

    Papapetrou, Vasileios S.; Tamijani, Ali Y.; Brown, Jeff; Kim, Daewon

    2018-04-01

    The hybrid bridge consists of a Reinforced Concrete (RC) slab supported by U-shaped Fiber Reinforced Polymer (FRP) girders. Previous studies on similar hybrid bridges constructed in the United States and Europe seem to substantiate these hybrid designs for lightweight, high strength, and durable highway bridge construction. In the current study, computational and optimization analyses were carried out to investigate six composite material systems consisting of E-glass and carbon fibers. Optimization constraints are determined by stress, deflection and manufacturing requirements. Finite Element Analysis (FEA) and optimization software were utilized, and a framework was developed to run the complete analyses in an automated fashion. Prior to that, FEA validation of previous studies on similar U-shaped FRP girders that were constructed in Poland and Texas is presented. A finer optimization analysis is performed for the case of the Texas hybrid bridge. The optimization outcome of the hybrid FRP/RC bridge shows the appropriate composite material selection and cross-section geometry that satisfies all the applicable Limit States (LS) and, at the same time, results in the lightest design. Critical limit states show that shear stress criteria determine the optimum design for bridge spans less than 15.24 m and deflection criteria controls for longer spans. Increased side wall thickness can reduce maximum observed shear stresses, but leads to a high weight penalty. A taller cross-section and a thicker girder base can efficiently lower the observed deflections and normal stresses. Finally, substantial weight savings can be achieved by the optimization framework if base and side-wall thickness are treated as independent variables.

  10. Learning Abstract Physical Concepts from Experience: Design and Use of an RC Circuit

    Science.gov (United States)

    Parra, Alfredo; Ordenes, Jorge; de la Fuente, Milton

    2018-05-01

    Science learning for undergraduate students requires grasping a great number of theoretical concepts in a rather short time. In our experience, this is especially difficult when students are required to simultaneously use abstract concepts, mathematical reasoning, and graphical analysis, such as occurs when learning about RC circuits. We present a simple experimental model in this work that allows students to easily design, build, and analyze RC circuits, thus providing an opportunity to test personal ideas, build graphical descriptions, and explore the meaning of the respective mathematical models, ultimately gaining a better grasp of the concepts involved. The result suggests that the simple setup indeed helps untrained students to visualize the essential points of this kind of circuit.

  11. Design issues and cost implications of RTO/RC-ITER divertor

    International Nuclear Information System (INIS)

    Ibbott, C.; Antipenkov, A.; Chiocchio, S.; Federici, G.; Heidl, H.; Janeschitz, G.; Martin, E.; Tivey, R.

    2000-01-01

    This paper reports on the conceptual divertor design developed for the reduced technical objectives/reduced cost-international thermonuclear experimental reactor (RTO/RC-ITER). The cost drivers are discussed and a number of cost-reducing measures identified. Scaled costs, based on industrial estimates of the 1998 ITER design (Technical Basis for the ITER Final Design Report, Cost Review and Safety Analysis (FDR). ITER EDA Documentation Series No. 16. IAEA, Vienna, 1998), give for the RTO/RC-ITER ∼60% of the FDR costs. Plasma facing components (PFCs) account for 75% of the total divertor costs. Hence, PFC design simplifications are outlined in the paper showing the possibility of achieving a cost reduction of 50%. The design proposals, outlined in the paper, focus on minimising the number of sub-components and simplifying the manufacturing cycle. These changes contribute to improved reliability based on a more robust coolant design layout. The reduced space allocated to the divertor (G. Janeschitz, A. Antipenkov, V. Barabash, S. Chiocchio, G. Federici, C. Ibbott, E. Martin, R. Tivey, Overview of the Divertor Design and its Integration into RTO/RC-ITER, this conference) requires changes to the design that minimise the cassette body thickness, relocate the cassette attachments and revise the remote handling philosophy. Results of supporting electro-magnetic, neutron shielding, thermo-hydraulic and pumping conductance analyses are reported, qualifying the cassette design. A reduction in the coolant inlet temperature to 100-120 deg. C is discussed in terms of thermal-hydraulic performance and fatigue life of the heat sink. Finally, an R and D plan sets out the work needed: (1) to develop the cost saving measures of the new design; and (2) to demonstrate the reliability of the chosen technologies

  12. Hardware Trojan Side-Channels based on Physical Unclonable Functions

    NARCIS (Netherlands)

    Gong, Z.; Makkes, M.X.; Ardagna, C.A.; Zhou, J.

    2011-01-01

    The separation design and fabrication process in the semiconductor industry leads to potential threats such as trojan side-channels (TSCs). In this paper we design a new family of TSCs from physical unclonable functions (PUFs). In particular, a dedicated attack on the PRESENT block cipher is

  13. Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed; Alizadeh, Javad; Alkhzaimi, Hoda A.

    2015-01-01

    In this paper we analyse two variants of SIMON family of light-weight block ciphers against variants of linear cryptanalysis and present the best linear cryptanalytic results on these variants of reducedround SIMON to date. We propose a time-memory trade-off method that finds differential/ linear...

  14. An update on the side channel cryptanalysis of MACs based on cryptographic hash functions

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Okeya, Katsuyuki

    2007-01-01

    Okeya has established that HMAC/NMAC implementations based on only Matyas-Meyer-Oseas (MMO) PGV scheme and his two refined PGV schemes are secure against side channel DPA attacks when the block cipher in these constructions is secure against these attacks. The significant result of Okeya's analys...

  15. Flexural strengthening of Reinforced Concrete (RC) Beams Retrofitted with Corrugated Glass Fiber Reinforced Polymer (GFRP) Laminates

    Science.gov (United States)

    Aravind, N.; Samanta, Amiya K.; Roy, Dilip Kr. Singha; Thanikal, Joseph V.

    2015-01-01

    Strengthening the structural members of old buildings using advanced materials is a contemporary research in the field of repairs and rehabilitation. Many researchers used plain Glass Fiber Reinforced Polymer (GFRP) sheets for strengthening Reinforced Concrete (RC) beams. In this research work, rectangular corrugated GFRP laminates were used for strengthening RC beams to achieve higher flexural strength and load carrying capacity. Type and dimensions of corrugated profile were selected based on preliminary study using ANSYS software. A total of twenty one beams were tested to study the load carrying capacity of control specimens and beams strengthened with plain sheets and corrugated laminates using epoxy resin. This paper presents the experimental and theoretical study on flexural strengthening of Reinforced Concrete (RC) beams using corrugated GFRP laminates and the results are compared. Mathematical models were developed based on the experimental data and then the models were validated.

  16. Passive cooling effect of RC roof covered with the ceramics having high water retention and evaporation capacity

    International Nuclear Information System (INIS)

    Yamazaki, M; Kanaya, M; Shimazu, T; Ohashi, T; Kato, N; Horikoshi, T

    2011-01-01

    Hot days in metropolitan cities have increased remarkably by the heat island phenomenon these days. Thus the authors tried to develop the porous ceramics with high water retention and evaporation capacity as a maintenance-free material to improve thermal environment. The developed ceramic pellets have high water retention of more than 60% of water absorption and high water evaporation which is similar to water surface. In this study, three types of 5 meter squared large flat-roofed structural specimen simulated reinforced concrete (RC) slab were constructed on the outside. The variation of water content and temperature of the specimens and atmosphere temperature around the specimens were measured from summer in 2009. In the case of the ceramic pellets, the temperature under RC slab was around 15 deg. lower than that of the control. The results were probably contributed by passive cooling effect of evaporated rain water, and the effect was similar to in the case of the grasses. From the viewpoint of thermal environment improvement, substitution of a rooftop gardening by the porous ceramics could be a promising method.

  17. Passive cooling effect of RC roof covered with the ceramics having high water retention and evaporation capacity

    Energy Technology Data Exchange (ETDEWEB)

    Yamazaki, M; Kanaya, M; Shimazu, T; Ohashi, T [INAX Corporation, 97-1, Yariba, Kume, Tokoname, Aichi, 479-0002 (Japan); Kato, N; Horikoshi, T, E-mail: m.yamazaki@i2.inax.co.jp [Department of Architecture, Nagoya Institute of technology, Gokiso-cho, Showa-ku, Nagoya, Aichi, 466-8555 (Japan)

    2011-10-29

    Hot days in metropolitan cities have increased remarkably by the heat island phenomenon these days. Thus the authors tried to develop the porous ceramics with high water retention and evaporation capacity as a maintenance-free material to improve thermal environment. The developed ceramic pellets have high water retention of more than 60% of water absorption and high water evaporation which is similar to water surface. In this study, three types of 5 meter squared large flat-roofed structural specimen simulated reinforced concrete (RC) slab were constructed on the outside. The variation of water content and temperature of the specimens and atmosphere temperature around the specimens were measured from summer in 2009. In the case of the ceramic pellets, the temperature under RC slab was around 15 deg. lower than that of the control. The results were probably contributed by passive cooling effect of evaporated rain water, and the effect was similar to in the case of the grasses. From the viewpoint of thermal environment improvement, substitution of a rooftop gardening by the porous ceramics could be a promising method.

  18. Isolation and molecular characterization of RcSERK1: A Rosa ...

    African Journals Online (AJOL)

    User

    2011-05-16

    May 16, 2011 ... somatic embryogenesis receptor-like kinase; SP, signal peptide; SPP, .... primers used for detecting RcSERK1 gene expression were: for- .... and mainly in the PLBs but weak in the callus and rhi- ... Transformed cells in the bright light (A and E), in the dark for cell nucleuses stained with DAPI (B and F),.

  19. Biclique cryptanalysis of the full AES

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Khovratovich, Dmitry; Rechberger, Christian

    2011-01-01

    Since Rijndael was chosen as the Advanced Encryption Standard (AES), improving upon 7-round attacks on the 128-bit key variant (out of 10 rounds) or upon 8-round attacks on the 192/256-bit key variants (out of 12/14 rounds) has been one of the most difficult challenges in the cryptanalysis of block...... ciphers for more than a decade. In this paper, we present the novel technique of block cipher cryptanalysis with bicliques, which leads to the following results: The first key recovery method for the full AES-128 with computational complexity 2126.1. The first key recovery method for the full AES-192...... with computational complexity 2189.7. The first key recovery method for the full AES-256 with computational complexity 2254.4. Key recovery methods with lower complexity for the reduced-round versions of AES not considered before, including cryptanalysis of 8-round AES-128 with complexity 2124.9. Preimage search...

  20. Sustainable RC Beam-Column Connections with Headed Bars: A Formula for Shear Strength Evaluation

    Directory of Open Access Journals (Sweden)

    Minh-Tung Tran

    2018-02-01

    Full Text Available Beam-column joints are critical regions for reinforced concrete (RC frames subjected to earthquakes. The steel reinforcement is, in general, highly concentrated in these zones. This is why in many cases, headed bars are used. A headed bar is a longitudinal steel reinforcement whose end has a special button added to reduce the bonding length of the steel rebar. This paper establishes a formula predicting the shear strength of exterior RC beam-column connections where the beam longitudinal reinforcements use headed bars. A database was collected, which contained 30 experimental data about the exterior beam-column joints using headed bars and subjected to quasi-static cyclic loading. First, from the collected database, a statistical study was carried out to identify the most influencing parameters on the shear strength of the beam-column joints tested. The three most important parameters were identified and an empirical modified formula was developed based on the formula existing in the standards. The study showed that the results obtained from the modified formula proposed in the present study were closer to the experimental results than that obtained from the formula existing in the standards. Finally, a numerical study was performed on two T-form RC structures and the numerical results were compared with the prediction calculated from the modified formula proposed. For two investigated cases, the proposed formula provided the results in the safety side and the differences with the numerical results were less than 20%. Thus, the proposed formula can be used for a rapid assessment of the shear strength of RC joints using headed bars.

  1. Lactobacillus rhamnosus RC007 intended for feed additive: immune-stimulatory properties and ameliorating effects on TNBS-induced colitis.

    Science.gov (United States)

    Dogi, C; García, G; De Moreno de LeBlanc, A; Greco, C; Cavaglieri, L

    2016-09-01

    Lactobacillus rhamnosus RC007 is a potential probiotic bacterium that can exert beneficial effects as supplement for animal feed, by improving the immune status in healthy host, and by providing therapeutic benefits to infected/inflamed animals. The aim of the present work was to evaluate in vivo the beneficial properties of L. rhamnosus RC007, intended for animal feed, when administered to healthy and trinitro-benzene-sulfonic-acid (TNBS) colitis induced BALB/c mice. The administration of L. rhamnosus RC007 to healthy mice during 10 days increased the phagocytic activity of peritoneal macrophages and the number of immunoglobulin A+ cells in the lamina proper of the small intestine. Significant increases of monocyte chemotactic protein 1, interleukin (IL)-10 and tumour necrosis factor alpha (TNF-α) concentrations, and in the ratio between anti- and pro-inflammatory cytokines (IL-10/TNF-α) were observed in intestinal fluids after administration of bacteria. In the inflammation model, less body weight loss, macroscopic and histological damages in the large intestine were accompanied by increased IL-10/TNF-α ratio in the intestinal fluids of mice from the L. rhamnosus-TNBS group when compared to the TNBS group. In a healthy host, the oral administration of L. rhamnosus RC007 kept the gut immune system stimulated allowing a faster response to noxious stimulus. Mice that received L. rhamnosus RC007 also decreased the severity of the intestinal inflammation.

  2. Flexural Strengthening of RC Slabs Using a Hybrid FRP-UHPC System Including Shear Connector

    Directory of Open Access Journals (Sweden)

    Jiho Moon

    2017-01-01

    Full Text Available A polymeric hybrid composite system made of UHPC and CFRP was proposed as a retrofit system to enhance flexural strength and ductility of RC slabs. While the effectiveness of the proposed system was confirmed previously through testing three full-scale one-way slabs having two continuous spans, the slabs retrofitted with the hybrid system failed in shear. This sudden shear failure would stem from the excessive enhancement of the flexural strength over the shear strength. In this study, shear connectors were installed between the hybrid system and a RC slab. Using simple beam, only positive moment section was examined. Two full-scale RC slabs were cast and tested to failure: the first as a control and the second using this new strengthening technique. The proposed strengthening system increased the ultimate load carrying capacity of the slab by 70%, the stiffness by 60%, and toughness by 128%. The efficiency of shear connectors on ductile behavior of the retrofitted slab was also confirmed. After the UHPC top is separated from the slab, the shear connector transfer shear load and the slab system were in force equilibrium by compression in UHPC and tension in CFRP.

  3. Endothelium-Derived 5-Methoxytryptophan Protects Endothelial Barrier Function by Blocking p38 MAPK Activation.

    Directory of Open Access Journals (Sweden)

    Ling-Yun Chu

    Full Text Available The endothelial junction is tightly controlled to restrict the passage of blood cells and solutes. Disruption of endothelial barrier function by bacterial endotoxins, cytokines or growth factors results in inflammation and vascular damage leading to vascular diseases. We have identified 5-methoxytryptophan (5-MTP as an anti-inflammatory factor by metabolomic analysis of conditioned medium of human fibroblasts. Here we postulated that endothelial cells release 5-MTP to protect the barrier function. Conditioned medium of human umbilical vein endothelial cells (HUVECs prevented endothelial hyperpermeability and VE-cadherin downregulation induced by VEGF, LPS and cytokines. We analyzed the metabolomic profile of HUVEC conditioned medium and detected 5-MTP but not melatonin, serotonin or their catabolites, which was confirmed by enzyme-linked immunosorbent assay. Addition of synthetic pure 5-MTP preserved VE-cadherin and maintained barrier function despite challenge with pro-inflammatory mediators. Tryptophan hydroxylase-1, an enzyme required for 5-MTP biosynthesis, was downregulated in HUVECs by pro-inflammatory mediators and it was accompanied by reduction of 5-MTP. 5-MTP protected VE-cadherin and prevented endothelial hyperpermeability by blocking p38 MAPK activation. A chemical inhibitor of p38 MAPK, SB202190, exhibited a similar protective effect as 5-MTP. To determine whether 5-MTP prevents vascular hyperpermeability in vivo, we evaluated the effect of 5-MTP administration on LPS-induced murine microvascular permeability with Evans blue. 5-MTP significantly prevented Evans blue dye leakage. Our findings indicate that 5-MTP is a new class of endothelium-derived molecules which protects endothelial barrier function by blocking p38 MAPK.

  4. Route 66: Passively Breaking All GSM Channels

    DEFF Research Database (Denmark)

    Vejre, Philip S.; Bogdanov, Andrey

    2014-01-01

    The A5/2 stream cipher used for encryption in the GSM mobile phone standard has previously been shown to have serious weaknesses. Due to a lack of key separation and flaws in the security protocols, these vulnerabilities can also compromise the stronger GSM ciphers A5/1 and A5/3. Despite GSM's huge...

  5. Electronically tunable RC sinusoidal oscillators

    International Nuclear Information System (INIS)

    Florescu, Valeriu

    2008-01-01

    This paper presents two types of active configurations for realizing electronically tunable RC sinusoidal oscillators. The type-1 network employs two grounded scaled resistances KR 1 and KR 2 , where K is scaling factor. The frequency of oscillation W 0 is controlled conveniently by adjusting K, since W 0 appears in the form W 0 =1/K √ R 1 C 1 R 2 C 2 . For realizing the scaled resistances, an active configuration is proposed, which realizes KR 1 =R 1 /(1+f(V B )), where f(V B ) denotes a function of a controlling voltage V B . Thus the frequency tuning can be effected by controlling a voltage V B . The type-2 oscillator uses two periodically switched conductances. It is shown that the tuning of oscillation frequency can be done by varying the pulse width-to-period ratio (t/T) of the periodically switched conductances. (author)

  6. The IL-17F/IL-17RC Axis Promotes Respiratory Allergy in the Proximal Airways

    Directory of Open Access Journals (Sweden)

    Antonella De Luca

    2017-08-01

    Full Text Available The interleukin 17 (IL-17 cytokine and receptor family is central to antimicrobial resistance and inflammation in the lung. Mice lacking IL-17A, IL-17F, or the IL-17RA subunit were compared with wild-type mice for susceptibility to airway inflammation in models of infection and allergy. Signaling through IL-17RA was required for efficient microbial clearance and prevention of allergy; in the absence of IL-17RA, signaling through IL-17RC on epithelial cells, predominantly by IL-17F, significantly exacerbated lower airway Aspergillus or Pseudomonas infection and allergic airway inflammation. In contrast, following infection with the upper respiratory pathogen Staphylococcus aureus, the IL-17F/IL-17RC axis mediated protection. Thus, IL-17A and IL-17F exert distinct biological effects during pulmonary infection; the IL-17F/IL-17RC signaling axis has the potential to significantly worsen pathogen-associated inflammation of the lower respiratory tract in particular, and should be investigated further as a therapeutic target for treating pathological inflammation in the lung.

  7. Assessment of Seismic Vulnerability of Steel and RC Moment Buildings Using HAZUS and Statistical Methodologies

    Directory of Open Access Journals (Sweden)

    Iman Mansouri

    2017-01-01

    Full Text Available Designer engineers have always the serious challenge regarding the choice of the kind of structures to use in the areas with significant seismic activities. Development of fragility curve provides an opportunity for designers to select a structure that will have the least fragility. This paper presents an investigation into the seismic vulnerability of both steel and reinforced concrete (RC moment frames using fragility curves obtained by HAZUS and statistical methodologies. Fragility curves are employed for several probability parameters. Fragility curves are used to assess several probability parameters. Furthermore, it examines whether the probability of the exceedence of the damage limit state is reduced as expected. Nonlinear dynamic analyses of five-, eight-, and twelve-story frames are carried out using Perform 3D. The definition of damage states is based on the descriptions provided by HAZUS, which gives the limit states and the associated interstory drift limits for structures. The fragility curves show that the HAZUS procedure reduces probability of damage, and this reduction is higher for RC frames. Generally, the RC frames have higher fragility compared to steel frames.

  8. GENERACIÓN DE POLINOMIOS DE SCHUBERT CON COCOA II: GRAFOS RC.

    Directory of Open Access Journals (Sweden)

    Fernando Novoa

    2004-06-01

    Full Text Available El polinomio de Schubert asociado a una permutación w es codificado por medio de la información contenida en ciertos grafos rc. Presentamos un programa para el cómputo de los polinomios de Schubert por medio de movimientos definidos sobre estos grafos.

  9. Linear Distinguishers in the Key-less Setting: Application to PRESENT

    DEFF Research Database (Denmark)

    Lauridsen, Martin Mehl; Rechberger, Christian

    2015-01-01

    The application of the concept of linear cryptanalysis to the domain of key-less primitives is largely an open problem. In this paper we, for the first time, propose a model in which its application is meaningful for distinguishing block ciphers. Combining our model with ideas from message...

  10. Cryptanalysis of an Iterated Halving-based hash function: CRUSH

    DEFF Research Database (Denmark)

    Bagheri, Nasour; Henricksen, Matt; Knudsen, Lars Ramkilde

    2009-01-01

    Iterated Halving has been suggested as a replacement to the Merkle–Damgård (MD) construction in 2004 anticipating the attacks on the MDx family of hash functions. The CRUSH hash function provides a specific instantiation of the block cipher for Iterated Halving. The authors identify structural pr...

  11. Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Rechberger, Christian; Savelieva, Alexandra

    2012-01-01

    We present a new concept of biclique as a tool for preimage attacks, which employs many powerful techniques from differential cryptanalysis of block ciphers and hash functions. The new tool has proved to be widely applicable by inspiring many authors to publish new results of the full versions...

  12. Hardware Realization of Chaos Based Symmetric Image Encryption

    KAUST Repository

    Barakat, Mohamed L.

    2012-06-01

    This thesis presents a novel work on hardware realization of symmetric image encryption utilizing chaos based continuous systems as pseudo random number generators. Digital implementation of chaotic systems results in serious degradations in the dynamics of the system. Such defects are illuminated through a new technique of generalized post proceeding with very low hardware cost. The thesis further discusses two encryption algorithms designed and implemented as a block cipher and a stream cipher. The security of both systems is thoroughly analyzed and the performance is compared with other reported systems showing a superior results. Both systems are realized on Xilinx Vetrix-4 FPGA with a hardware and throughput performance surpassing known encryption systems.

  13. A three-layer distributed RC network with two transmission zeros

    Science.gov (United States)

    Huelsman, L. P.

    1974-01-01

    This report describes the properties of a three-layer distributed RC network consisting of two resistive layers separated by a dielectric which may be used to realize two zeros of transmission on the j-omega axis of the complex frequency plane. The relative location of the two zeros is controlled by the location of a contact placed on one of the resistive layers.

  14. Effect of discrete glass fibers on the behavior of R.C. Beams exposed to fire

    Directory of Open Access Journals (Sweden)

    Magdy Riad

    2017-08-01

    Full Text Available The main objective of this paper is to investigate the effect of adding discrete glass fibers on the behavior of reinforced concrete (RC beams under different fire and cooling conditions. Eighteen beams with different concrete compressive strengths were tested to study the behavior of reinforced concrete (RC beams containing discrete glass fibers when exposed to different fire and cooling conditions. Nine beams were prepared from normal strength concrete (NSC with compressive strength equal to 35 MPa while the other beams were prepared from high strength concrete (HSC with compressive strength equal to 60 MPa. The beams contained different contents of discrete glass fibers. The modes of failure of tested specimens show that the crack patterns change according to fire condition and fiber content. Analysis of test results show that adding discrete glass fibers to NSC increased the residual stiffness of the tested specimens after firing and decreased the rate of the deflection gain during firing. Also adding fibers to concrete has a limited positive effect on the ultimate strength of the specimens compared to the control specimens. Its effect on deflection due to fire is more pronounced. Finally, the recommended optimum ratio of discrete glass fibers is not more than 0.5% of the total concrete weight.

  15. Seismic Performance of Precast Polystyrene RC Walls

    Directory of Open Access Journals (Sweden)

    Wibowo Ari

    2017-01-01

    Full Text Available Precast concrete structure such as precast wall is a concept that is growing rapidly these days. However, the earthquake resistance is believed to be one of its drawbacks. Additionally, the large weight of solid elements also increase the building weight significantly which consequently increase the earthquake base shear force as well. Therefore, investigation on the seismic performance of precast concrete wall has been carried out. Three RC wall specimens using wire mesh reinforcement and EPS (Extended Polystyrene System panel have been tested. This wall was designed as a structural wall that was capable in sustaining lateral loads (in-plane yet were lightweight to reduce the total weight of the building. Parameter observed was the ratio of height to width (aspect ratio of wall of 1.0, 1.5 and 2.0 respectively with the aim to study the behaviour of brittle to ductile transition of the wall. Incremental static load tests were conducted until reaching peak load and then followed by displacement control until failure. Several data were measured at every stage of loading comprising lateral load-displacement behaviour, ultimate strength and collapse mechanism. The outcomes showed that precast concrete walls with a steel wire and EPS panel filler provided considerably good resistance against lateral load.

  16. Performance of a multi-section ICRF array for a RTO/RC ITER

    International Nuclear Information System (INIS)

    Bosia, Giuseppe; Brambilla, Marco

    1999-01-01

    In an RTO/RC ITER, the Ion Cyclotron (IC) Heating and Current Drive System would need to operate at a power density of 6.5 MW/m 2 , (or about twice the design value adopted in the ITER Final Design Report), in order to provide the required total power output of 40 MW of RF power from two equatorial ports. A significant upgrade of the original IC array design is necessary, in order to keep the operating RF voltage at the plasma interface within acceptable limits. This is in principle possible by increasing the number of array elements and by operating them in parallel. In the paper the prospects of this modifications and the implications on the array layout are discussed

  17. Glass Fiber Reinforced Polymer (GFRP Bars for Enhancing the Flexural Performance of RC Beams Using Side-NSM Technique

    Directory of Open Access Journals (Sweden)

    Md. Akter Hosen

    2017-05-01

    Full Text Available Reinforced concrete (RC structures require strengthening for numerous factors, such as increased load, modification of the structural systems, structural upgrade or errors in the design and construction stages. The side near-surface mounted (SNSM strengthening technique with glass fiber-reinforced polymer (GFRP bars is a relatively new emerging technique for enhancing the flexural capacities of existing RC elements. Nine RC rectangular beams were flexurally strengthened with this technique and tested under four-point bending loads until failure. The main goal of this study is to optimize the structural capacity of the RC beams by varying the amount of strengthening reinforcement and bond length. The experimental test results showed that strengthening with SNSM GFRP bars significantly enhanced the flexural responses of the specimens compared with the control specimen. The first cracking and ultimate loads, energy absorption capacities, ductility and stiffness were remarkably enhanced by the SNSM technique. It was also confirmed that the bond length of the strengthened reinforcement greatly influences the energy absorption capacities, ductility and stiffness. The effect of the bond length on these properties is more significant compared to the amount of strengthening reinforcement.

  18. Adductor Canal Block versus Femoral Nerve Block and Quadriceps Strength

    DEFF Research Database (Denmark)

    Jæger, Pia Therese; Nielsen, Zbigniew Jerzy Koscielniak; Henningsen, Lene Marianne

    2013-01-01

    : The authors hypothesized that the adductor canal block (ACB), a predominant sensory blockade, reduces quadriceps strength compared with placebo (primary endpoint, area under the curve, 0.5-6 h), but less than the femoral nerve block (FNB; secondary endpoint). Other secondary endpoints were...

  19. Time-variant flexural reliability of RC beams with externally bonded CFRP under combined fatigue-corrosion actions

    International Nuclear Information System (INIS)

    Bigaud, David; Ali, Osama

    2014-01-01

    Time-variant reliability analysis of RC highway bridges strengthened with carbon fibre reinforced polymer CFRP laminates under four possible competing damage modes (concrete crushing, steel rupture after yielding, CFRP rupture and FRP plate debonding) and three degradation factors is analyzed in terms of reliability index β using FORM. The first degradation factor is chloride-attack corrosion which induces reduction in steel area and concrete cover cracking at characteristic key times (corrosion initiation, severe surface cover cracking). The second degradation factor considered is fatigue which leads to damage in concrete and steel rebar. Interaction between corrosion and fatigue crack growth in steel reinforcing bars is implemented. The third degradation phenomenon is the CFRP properties deterioration due to aging. Considering these three degradation factors, the time-dependent flexural reliability profile of a typical simple 15 m-span intermediate girder of a RC highway bridge is constructed under various traffic volumes and under different corrosion environments. The bridge design options follow AASHTO-LRFD specifications. Results of the study have shown that the reliability is very sensitive to factors governing the corrosion. Concrete damage due to fatigue slightly affects reliability profile of non-strengthened section, while service life after strengthening is strongly related to fatigue damage in concrete. - Highlights: • We propose a method to follow the time-variant reliability of strengthened RC beams. • We consider multiple competing failure modes of CFRP strengthened RC beams. • We consider combined degradation mechanisms (corrosion, fatigue, ageing of CFRP)

  20. Barometrický výškoměr pro RC modely letadel

    OpenAIRE

    Dujíček, Martin

    2012-01-01

    Cílem této práce je návrh barometrického výškoměru určeného pro RC modely letadel. Během letu je zaznamenávána hodnota ze snímacího prvku do paměti. Po ukončení letu a po připojení zařízení k počítači je možné data přečíst nebo smazat. Přijatá data je dále možné zpracovat například do grafické podoby. The aim of this thesis is to design barometric altimeter for RC plane models. During the flight the value from sensing element is stored in memory. After the flight and connect to computer it...

  1. Effect of Large Negative Phase of Blast Loading on Structural Response of RC Elements

    Directory of Open Access Journals (Sweden)

    Syed Zubair Iman

    2016-01-01

    Full Text Available Structural response of reinforced concrete (RC elements for analysis and design are often obtained using the positive phase of the blast pressure curve disregarding the negative phase assuming insignificant contribution from the negative phase of the loading. Although, some insight on the effect of negative phase of blast pressure based on elastic single-degree-of-freedom (SDOF analysis was presented before, the influence of negative phase on different types of resistance functions of SDOF models and on realistic finite element analysis has not been explored. In this study, the effects of inclusion of pulse negative phase on structural response of RC elements from SDOF analysis and from more detailed finite element analysis have been investigated. Investigation of SDOF part has been conducted using MATLAB code that utilizes non-linear resistance functions of SDOF model. Detailed numerical investigation using finite element code DIANA was conducted on the significance of the negative phase on structural response. In the FE model, different support stiffness was used to explore the effect of support stiffness on the structural response due to blast negative phase. Results from SDOF and FE analyses present specific situations where the effect of large negative phase was found to be significant on the structural response of RC elements.

  2. Evaluation of Structural Robustness against Column Loss: Methodology and Application to RC Frame Buildings.

    Science.gov (United States)

    Bao, Yihai; Main, Joseph A; Noh, Sam-Young

    2017-08-01

    A computational methodology is presented for evaluating structural robustness against column loss. The methodology is illustrated through application to reinforced concrete (RC) frame buildings, using a reduced-order modeling approach for three-dimensional RC framing systems that includes the floor slabs. Comparisons with high-fidelity finite-element model results are presented to verify the approach. Pushdown analyses of prototype buildings under column loss scenarios are performed using the reduced-order modeling approach, and an energy-based procedure is employed to account for the dynamic effects associated with sudden column loss. Results obtained using the energy-based approach are found to be in good agreement with results from direct dynamic analysis of sudden column loss. A metric for structural robustness is proposed, calculated by normalizing the ultimate capacities of the structural system under sudden column loss by the applicable service-level gravity loading and by evaluating the minimum value of this normalized ultimate capacity over all column removal scenarios. The procedure is applied to two prototype 10-story RC buildings, one employing intermediate moment frames (IMFs) and the other employing special moment frames (SMFs). The SMF building, with its more stringent seismic design and detailing, is found to have greater robustness.

  3. Investigation of the fittest shear transfer model used to FEM analysis of RC structures

    International Nuclear Information System (INIS)

    Endo, Tatumi; Aoyagi, Masao; Endo, Takao

    1988-01-01

    In order to rationalize the design method of reinforced concrete (RC) structures in the nuclear power plant, the structural analysis, which is able to simulate the seismic behavior of RC structures, should be established. In this report, the investigation of shear transfer model at shear plane to be applied to FEM analysis is performed. Main conclusions obtained within the limit of the study are as follows. 1. Development of the shear transfer model at shear plane. 1) Two shear transfer models are developed to be used to the 2-dimensional nonlinear FEM analysis. 2) In one model suggested, reinforcements are modeled by plate elements and the nonlinearity of concrete surrounding reinforcement but the properties of bond-slip relation between concrete and reinforcements is also considered. 3) In another model, reinforcements are modeled by equivalent concrete properties, in which axial regidity and dowel effects of reinforcements are considered. 2. Verification of the suggested model. 1) It is confirmed that the computational results using the above-mentioned model could simulate the experimental ones fairly well. 2) Considering the application to the analysis of RC structures in the design, the model, in which reinforcement are modeled by equivalent concrete properties, is useful in view point of accuracy and simplicity. (author)

  4. Effect of perineural dexmedetomidine on the quality of supraclavicular brachial plexus block with 0.5% ropivacaine and its interaction with general anaesthesia.

    Science.gov (United States)

    Gurajala, Indira; Thipparampall, Anil Kumar; Durga, Padmaja; Gopinath, R

    2015-02-01

    The effect of perineural dexmedetomidine on the time to onset, quality and duration of motor block with ropivacaine has been equivocal and its interaction with general anaesthesia (GA) has not been reported. We assessed the influence of dexmedetomidine added to 0.5% ropivacaine on the characteristics of supraclavicular brachial plexus block and its interaction with GA. In a randomised, double blind study, 36 patients scheduled for orthopaedic surgery on the upper limb under supraclavicular block and GA were divided into either R group (35 ml of 0.5% ropivacaine with 0.5 ml of normal saline [n - 18]) or RD group (35 mL of 0.5% ropivacaine with 50 μg dexmedetomidine [n - 18]). The onset time and duration of motor and sensory blockade were noted. The requirement of general anaesthetics was recorded. Both the groups were comparable in demographic characteristics. The time of onset of sensory block was not significantly different. The proportion of patients who achieved complete motor blockade was more in the RD group. The onset of motor block was earlier in group RD than group R (P quality and duration of supraclavicular brachial plexus block but did not decrease the requirement of anaesthetic agents during GA.

  5. The values of the parameters of some multilayer distributed RC null networks

    Science.gov (United States)

    Huelsman, L. P.; Raghunath, S.

    1974-01-01

    In this correspondence, the values of the parameters of some multilayer distributed RC notch networks are determined, and the usually accepted values are shown to be in error. The magnitude of the error is illustrated by graphs of the frequency response of the networks.

  6. A Mathematical Model of a Thermally Activated Roof (TAR Cooling System Using a Simplified RC-Thermal Model with Time Dependent Supply Water Temperature

    Directory of Open Access Journals (Sweden)

    Khalid Ahmed Joudi

    2017-01-01

    Full Text Available This paper presents a computer simulation model of a thermally activated roof (TAR to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time dependent with the variation of the ambient wet bulb temperature. Results from RC-thermal modeling were compared with experimental measurements for a second story room measuring 5.5 m x 4 m x 3 m at Amarah city/ Iraq (31.865 ˚N, 47.128 ˚E for 21 July, 2013. The roof was constructed of 200 mm concrete slab, 150 mm turf and 50 mm insulation. Galvanized 13 mm steel pipe coils were buried in the roof slab with a pipe occupation ratio of 0.12. The walls were constructed of 240 mm common brick with 10mm cement plaster on the inside and outside surfaces and 20 mm Styrofoam insulation on the inside surface and covered with PVC panel. Thermistors were used to measure the indoor and outdoor temperatures, TAR system water inlet and outlet temperatures and temperature distribution inside the concrete slab. The effect of pipe spacing and water mass flow rate were evaluated. Agreement was good between the experimental and RC-thermal model. Concrete core temperature reaches the supply water temperature faster for lower pipe spacing. Heat extracted from the space increased with water mass flow rate to an optimum of 0.0088 kg/s.m².

  7. Website-based PNG image steganography using the modified Vigenere Cipher, least significant bit, and dictionary based compression methods

    Science.gov (United States)

    Rojali, Salman, Afan Galih; George

    2017-08-01

    Along with the development of information technology in meeting the needs, various adverse actions and difficult to avoid are emerging. One of such action is data theft. Therefore, this study will discuss about cryptography and steganography that aims to overcome these problems. This study will use the Modification Vigenere Cipher, Least Significant Bit and Dictionary Based Compression methods. To determine the performance of study, Peak Signal to Noise Ratio (PSNR) method is used to measure objectively and Mean Opinion Score (MOS) method is used to measure subjectively, also, the performance of this study will be compared to other method such as Spread Spectrum and Pixel Value differencing. After comparing, it can be concluded that this study can provide better performance when compared to other methods (Spread Spectrum and Pixel Value Differencing) and has a range of MSE values (0.0191622-0.05275) and PSNR (60.909 to 65.306) with a hidden file size of 18 kb and has a MOS value range (4.214 to 4.722) or image quality that is approaching very good.

  8. Friction correction for model ship resistance and propulsion tests in ice at NRC's OCRE-RC

    Directory of Open Access Journals (Sweden)

    Michael Lau

    2018-05-01

    Full Text Available This paper documents the result of a preliminary analysis on the influence of hull-ice friction coefficient on model resistance and power predictions and their correlation to full-scale measurements. The study is based on previous model-scale/full-scale correlations performed on the National Research Council - Ocean, Coastal, and River Engineering Research Center's (NRC/OCRE-RC model test data. There are two objectives for the current study: (1 to validate NRC/OCRE-RC's modeling standards in regarding to its practice of specifying a CFC (Correlation Friction Coefficient of 0.05 for all its ship models; and (2 to develop a correction methodology for its resistance and propulsion predictions when the model is prepared with an ice friction coefficient slightly deviated from the CFC of 0.05. The mean CFC of 0.056 and 0.050 for perfect correlation as computed from the resistance and power analysis, respectively, have justified NRC/OCRE-RC's selection of 0.05 for the CFC of all its models. Furthermore, a procedure for minor friction corrections is developed. Keywords: Model test, Ice resistance, Power, Friction correction, Correlation friction coefficient

  9. RTO/RC ITER plasma performance: inductive and steady-state operation

    International Nuclear Information System (INIS)

    Mukhovatov, V.; Boucher, D.; Fujisawa, N.; Shimada, M.; Vayakis, G.; Janeschitz, G.; Matsumoto, H.; Leonov, V.; Polevoy, A.

    2000-01-01

    The plasma performance in two design options of the reduced-technical objectives/reduced cost (RTO/RC) ITER, i.e. IAM (intermediate aspect ratio machine) and LAM (low aspect ratio machine) is analysed. It is shown that Q=P fus /P aux ∼10 can be obtained in both options at inductively driven ELMy H-mode operation. The operation domain in LAM is found to be marginally larger than that in IAM. The non-inductive operation with Q approx.= 5 will be possible in both machines, provided a large amount of power with a high current drive efficiency is applied, or substantial improvement of the energy confinement time relative to the ELMy H-mode (H H =1.2-1.4) is obtained. The required values of H H and β N are marginally smaller in IAM. The IAM-like machine, ITER-FEAT (fusion energy advanced tokamak), proposed for a detailed engineering design is discussed in brief. (author)

  10. Interleukin-17A promotes MUC5AC expression and goblet cell hyperplasia in nasal polyps via the Act1-mediated pathway.

    Directory of Open Access Journals (Sweden)

    Wentong Xia

    Full Text Available BACKGROUND: Recent studies demonstrated that nasal polyps (NP patients in China and other Asian regions possessed distinct Th17-dominant inflammation and enhanced tissue remodeling. However, the mechanism underlying these observations is not fully understood. This study sought to evaluate the association of interleukin (IL-17A with MUC5AC expression and goblet cell hyperplasia in Chinese NP patients and to characterize the signaling pathway underlying IL-17A-induced MUC5AC expression in vitro. METHOD: We enrolled 25 NP patients and 22 normal controls and examined the expression of IL-17A, MUC5AC and act1 in polyp tissues by immunohistochemical (IHC staining, quantitative polymerase chain reaction (qPCR and western blot. Moreover, by using an in vitro culture system of polyp epithelial cells (PECs, IL-17A-induced gene expression was screened in cultured PECs by DNA microarray. The expression of IL-17RA, IL-17RC, act1 and MUC5AC and the activation of the MAPK pathway (ERK, p38 and JNK, were further examined in cultured PECs and NCI-H292 cells by qPCR and western blotting, respectively. RESULTS: We found that increased IL-17A production was significantly correlated with MUC5AC and act1 expression and goblet cell hyperplasia in polyp tissues (p<0.05. IL-17A significantly stimulated the expression of IL-17RA, IL-17RC, act1 and MUC5AC, and the activation of the MAPK pathway in cultured PECs and NCI-H292 cells (p<0.05. In addition, IL-17RA, IL-17RC and act1 siRNA significantly blocked IL-17A-induced MUC5AC production in vitro (p<0.05. CONCLUSION: Our results suggest that IL-17A plays a crucial role in stimulating the production of MUC5AC and goblet cell hyperplasia through the act1-mediated signaling pathway and may suggest a promising strategy for the management of Th17-dominant NP patients.

  11. Derivation of the clinical grade human embryonic stem cell line RCe016-A (RC-12

    Directory of Open Access Journals (Sweden)

    P.A. De Sousa

    2016-05-01

    Full Text Available The human embryonic stem cell line RCe016-A (RC-12 was derived under quality assured compliance with UK regulations, EU Directives and International guidance for tissue procurement, processing and storage according to good manufacturing practice (GMP standards. The cell line was derived from a cryopreserved blastocyst stage embryo voluntarily donated as surplus to fertility requirements following informed consent. RCe016-A (RC-12 shows normal pluripotency marker expression and differentiation to three germ layers in vitro. Karyology revealed a mixed male karyotype at early passage (P15, which resolved as normal 46XY by passage 33. Microsatellite PCR identity, HLA and blood group typing data is available.

  12. Readiness for surgery after axillary block

    DEFF Research Database (Denmark)

    Koscielniak-Nielsen, Z J; Stens-Pedersen, H L; Lippert, F K

    1997-01-01

    required less time for block performance (mean 5.5 min) than multiple injections (mean 9.5 min), P requirement for supplemental nerve blocks was greater, after single injections (33 min and 57%) than after multiple injections (15.5 min and 7......We have assessed prospectively the time to readiness for surgery following axillary block (sum of block performance and latency times) in 80 patients. The brachial plexus was identified using a nerve stimulator, and anaesthetized with 45 mL of mepivacaine 1% with adrenaline 5 micrograms mL-1......%, respectively), P effectiveness was 100% in group 1 and 98% in group 2 (NS). The frequency of adverse effects (vessel puncture or paraesthesia) was similar...

  13. Analysis of RMAC

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Kohno, T.

    2003-01-01

    In this paper the newly proposed RMAC system is analysed. The scheme allows a (traditional MAC) attack some control over one of two keys of the underlying block cipher and makes it possible to mount several related-key attacks on RMAC. First, an efficient attack on RMAC when used with triple-DES ...

  14. Nonlinear interaction analysis of RC cylindrical tank with subsoil by adopting two kinds of constitutive models for ground and structure

    Science.gov (United States)

    Lewiński, Paweł M.; Dudziak, Sławomir

    2018-01-01

    In the paper, two kinds of constitutive models for ground and structure were adopted for the nonlinear interaction analysis of the RC cylindrical tank with subsoil. The paper discusses deformational and incremental approaches to a nonlinear FE analysis of soil-structure interaction including the description of behaviour of the RC structure and the subsoil under short-term loading. Moreover, a non-linear elastic-brittle-plastic analysis of RC axisymmetric structures using finite element iterative techniques is presented. The constitutive laws for concrete and subsoil are developed in compliance with the deformational and plastic flow theories of plasticity. Two examples of an FE analysis of soil-structure interaction were performed and the results were analysed.

  15. BUTREN-RC an hybrid system for the recharges optimization of nuclear fuels in a BWR; BUTREN-RC un sistema hibrido para la optimizacion de recargas de combustible nuclear en un BWR

    Energy Technology Data Exchange (ETDEWEB)

    Ortiz S, J.J.; Castillo M, J.A. [ININ, Carretera Mexico-Toluca Km. 36.5, 52045 Estado de Mexico (Mexico); Valle G, E. del [IPN, ESFM, 07738 Mexico D.F. (Mexico)

    2004-07-01

    The obtained results with the hybrid system BUTREN-RC are presented that obtains recharges of nuclear fuel for a BWR type reactor. The system has implemented the methods of optimization heuristic taboo search and neural networks. The optimization it carried out with the technique of taboo search, and the neural networks, previously trained, were used to predict the behavior of the recharges of fuel, in substitution of commercial codes of reactor simulation. The obtained recharges of nuclear fuel correspond to 5 different operation cycles of the Laguna Verde Nuclear Power plant, Veracruz in Mexico. The obtained results were compared with the designs of this cycles. The energy gain with the recharges of fuel proposals is of approximately 4.5% with respect to those of design. The time of compute consumed it was considerably smaller that when a commercial code for reactor simulation is used. (Author)

  16. Power Efficient Gigabit Communication Over Capacitively Driven RC-Limited On-Chip Interconnects

    NARCIS (Netherlands)

    Mensink, E.; Schinkel, Daniel; Klumperink, Eric A.M.; van Tuijl, Adrianus Johannes Maria; Nauta, Bram

    2010-01-01

    Abstract—This paper presents a set of circuit techniques to achieve high data rate point-to-point communication over long on-chip RC-limited wire-pairs. The ideal line termination impedances for a flat transfer function with linear phase (pure delay) are derived, using an s-parameter wire-pair

  17. FRP-RC Beam in Shear: Mechanical Model and Assessment Procedure for Pseudo-Ductile Behavior

    Directory of Open Access Journals (Sweden)

    Floriana Petrone

    2014-07-01

    Full Text Available This work deals with the development of a mechanics-based shear model for reinforced concrete (RC elements strengthened in shear with fiber-reinforced polymer (FRP and a design/assessment procedure capable of predicting the failure sequence of resisting elements: the yielding of existing transverse steel ties and the debonding of FRP sheets/strips, while checking the corresponding compressive stress in concrete. The research aims at the definition of an accurate capacity equation, consistent with the requirement of the pseudo-ductile shear behavior of structural elements, that is, transverse steel ties yield before FRP debonding and concrete crushing. For the purpose of validating the proposed model, an extended parametric study and a comparison against experimental results have been conducted: it is proven that the common accepted rule of assuming the shear capacity of RC members strengthened in shear with FRP as the sum of the maximum contribution of both FRP and stirrups can lead to an unsafe overestimation of the shear capacity. This issue has been pointed out by some authors, when comparing experimental shear capacity values with the theoretical ones, but without giving a convincing explanation of that. In this sense, the proposed model represents also a valid instrument to better understand the mechanical behavior of FRP-RC beams in shear and to calculate their actual shear capacity.

  18. Higher Order Differential Attack on 6-Round MISTY1

    Science.gov (United States)

    Tsunoo, Yukiyasu; Saito, Teruo; Nakashima, Hiroki; Shigeri, Maki

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper reports a previously unknown higher order differential characteristic of 4-round MISTY1 with the FL functions. It also shows that a higher order differential attack that utilizes this newly discovered characteristic is successful against 6-round MISTY1 with the FL functions. This attack can recover a partial subkey with a data complexity of 253.7 and a computational complexity of 264.4, which is better than any previous cryptanalysis of MISTY1.

  19. A comparative mathematical analysis of RL and RC electrical circuits via Atangana-Baleanu and Caputo-Fabrizio fractional derivatives

    Science.gov (United States)

    Abro, Kashif Ali; Memon, Anwar Ahmed; Uqaili, Muhammad Aslam

    2018-03-01

    This research article is analyzed for the comparative study of RL and RC electrical circuits by employing newly presented Atangana-Baleanu and Caputo-Fabrizio fractional derivatives. The governing ordinary differential equations of RL and RC electrical circuits have been fractionalized in terms of fractional operators in the range of 0 ≤ ξ ≤ 1 and 0 ≤ η ≤ 1. The analytic solutions of fractional differential equations for RL and RC electrical circuits have been solved by using the Laplace transform with its inversions. General solutions have been investigated for periodic and exponential sources by implementing the Atangana-Baleanu and Caputo-Fabrizio fractional operators separately. The investigated solutions have been expressed in terms of simple elementary functions with convolution product. On the basis of newly fractional derivatives with and without singular kernel, the voltage and current have interesting behavior with several similarities and differences for the periodic and exponential sources.

  20. Design of Rate-Compatible Parallel Concatenated Punctured Polar Codes for IR-HARQ Transmission Schemes

    Directory of Open Access Journals (Sweden)

    Jian Jiao

    2017-11-01

    Full Text Available In this paper, we propose a rate-compatible (RC parallel concatenated punctured polar (PCPP codes for incremental redundancy hybrid automatic repeat request (IR-HARQ transmission schemes, which can transmit multiple data blocks over a time-varying channel. The PCPP coding scheme can provide RC polar coding blocks in order to adapt to channel variations. First, we investigate an improved random puncturing (IRP pattern for the PCPP coding scheme due to the code-rate and block length limitations of conventional polar codes. The proposed IRP algorithm only select puncturing bits from the frozen bits set and keep the information bits unchanged during puncturing, which can improve 0.2–1 dB decoding performance more than the existing random puncturing (RP algorithm. Then, we develop a RC IR-HARQ transmission scheme based on PCPP codes. By analyzing the overhead of the previous successful decoded PCPP coding block in our IR-HARQ scheme, the optimal initial code-rate can be determined for each new PCPP coding block over time-varying channels. Simulation results show that the average number of transmissions is about 1.8 times for each PCPP coding block in our RC IR-HARQ scheme with a 2-level PCPP encoding construction, which can reduce half of the average number of transmissions than the existing RC polar coding schemes.

  1. Proof of cipher text ownership based on convergence encryption

    Science.gov (United States)

    Zhong, Weiwei; Liu, Zhusong

    2017-08-01

    Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements of cloud storage system files, an efficient information theory security proof of ownership scheme is proposed. This scheme protects the data through the convergence encryption method, and uses the improved block-level proof of ownership scheme, and can carry out block-level client deduplication to achieve efficient and secure cloud storage deduplication scheme.

  2. Understanding of self-terminating pulse generation using silicon controlled rectifier and RC load

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Chris, E-mail: chrischang81@gmail.com; Karunasiri, Gamani, E-mail: karunasiri@nps.edu [Department of Physics, Naval Postgraduate School, Monterey, CA 93943 (United States); Alves, Fabio, E-mail: falves@alionscience.com [Alion Science and Technology at NPS, Monterey, CA 93943 (United States)

    2016-01-15

    Recently a silicon controlled rectifier (SCR)-based circuit that generates self-terminating voltage pulses was employed for the detection of light and ionizing radiation in pulse mode. The circuit consisted of a SCR connected in series with a RC load and DC bias. In this paper, we report the investigation of the physics underlying the pulsing mechanism of the SCR-based. It was found that during the switching of SCR, the voltage across the capacitor increased beyond that of the DC bias, thus generating a reverse current in the circuit, which helped to turn the SCR off. The pulsing was found to be sustainable only for a specific range of RC values depending on the SCR’s intrinsic turn-on/off times. The findings of this work will help to design optimum SCR based circuits for pulse mode detection of light and ionizing radiation without external amplification circuitry.

  3. Development of Shear Capacity Prediction Model for FRP-RC Beam without Web Reinforcement

    Directory of Open Access Journals (Sweden)

    Md. Arman Chowdhury

    2016-01-01

    Full Text Available Available codes and models generally use partially modified shear design equation, developed earlier for steel reinforced concrete, for predicting the shear capacity of FRP-RC members. Consequently, calculated shear capacity shows under- or overestimation. Furthermore, in most models some affecting parameters of shear strength are overlooked. In this study, a new and simplified shear capacity prediction model is proposed considering all the parameters. A large database containing 157 experimental results of FRP-RC beams without shear reinforcement is assembled from the published literature. A parametric study is then performed to verify the accuracy of the proposed model. Again, a comprehensive review of 9 codes and 12 available models is done, published back from 1997 to date for comparison with the proposed model. Hence, it is observed that the proposed equation shows overall optimized performance compared to all the codes and models within the range of used experimental dataset.

  4. Case Study of Local Damage Indicators for a 2-Bay, 6-Storey RC-Frame subject to Earthquakes

    DEFF Research Database (Denmark)

    Skjærbæk, P. S.; Nielsen, Søren R. K.; Kirkegaard, Poul Henning

    1997-01-01

    A simulation study of a 2-bay, 6storey model test RC-frame(scale 1:5) subject to earthquakes is considered in this paper. Based on measured (simulated) storey accelerations and ground surface accelerations several indices for the storey damage, including interstorey drift, flexural damage ratios......, normalized cumulative dissipated energy, Park and Ang's indicator, a low-cycle fatigue damage index and a recently proposed local softening damage index estimated from time-varying eigenfrequencies are used to evaluate the damage state of the structure after the earthquake. Storey displacements are obtained...

  5. Case Study of Local Damage Indicators for a 2-Bay, 6-Storey RC-Frame subject to Earthquakes

    DEFF Research Database (Denmark)

    Skjærbæk, P. S.; Nielsen, Søren R. K.; Kirkegaard, Poul Henning

    A simulation study of a 2-bay, 6storey model test RC-frame(scale 1:5) subject to earthquakes is considered in this paper. Based on measured (simulated) storey accelerations and ground surface accelerations several indices for the storey damage, including interstorey drift, flexural damage ratios......, normalized cumulative dissipated energy, Park and Ang's indicator, a low-cycle fatigue damage index and a recently proposed local softening damage index estimated from time-varying eigenfrequencies are used to evaluate the damage state of the structure after the earthquake. Storey displacements are obtained...

  6. Immunity to experimental Salmonella typhimurium infections in rats. Transfer of immunity with primed CD45RC+ and CD45RC- CD4 T-cell subpopulations

    DEFF Research Database (Denmark)

    Thygesen, P; Christensen, H B; Hougen, H P

    1996-01-01

    The protective effect of primed CD4 T cells against a lethal dose of Salmonella typhimurium was studied in Lewis rats. Primed CD4 T cells were obtained by inoculating Lewis rats with a non-lethal dose of S. typhimurium. Four weeks after the infection, spleen CD4 T cells were separated by antibody......-induced increase in CD45RC+ cells is most likely due to generation of antigen-specific memory T cells....

  7. RC beams shear-strengthened with fabric-reinforced-cementitious-matrix (FRCM) composite

    Science.gov (United States)

    Loreto, Giovanni; Babaeidarabad, Saman; Leardini, Lorenzo; Nanni, Antonio

    2015-12-01

    The interest in retrofit/rehabilitation of existing concrete structures has increased due to degradation and/or introduction of more stringent design requirements. Among the externally-bonded strengthening systems fiber-reinforced polymers is the most widely known technology. Despite its effectiveness as a material system, the presence of an organic binder has some drawbacks that could be addressed by using in its place a cementitious binder as in fabric-reinforced cementitious matrix (FRCM) systems. The purpose of this paper is to evaluate the behavior of reinforced concrete (RC) beams strengthened in shear with U-wraps made of FRCM. An extensive experimental program was undertaken in order to understand and characterize this composite when used as a strengthening system. The laboratory results demonstrate the technical viability of FRCM for shear strengthening of RC beams. Based on the experimental and analytical results, FRCM increases shear strength but not proportionally to the number of fabric plies installed. On the other hand, FRCM failure modes are related with a high consistency to the amount of external reinforcement applied. Design considerations based on the algorithms proposed by ACI guidelines are also provided.

  8. Impact of Cyclic Loading on Chloride Diffusivity and Mechanical Performance of RC Beams under Seawater Corrosion

    Directory of Open Access Journals (Sweden)

    Sen Pang

    2017-01-01

    Full Text Available An experimental study was conducted to investigate the impact of cyclic loading on the mechanical performance and chloride diffusivity of RC beams exposed to seawater wet-dry cycles. To induce initial damage to RC beam specimen, cyclic loading controlled by max load and cycles was applied. Then beam specimens underwent 240 wet-dry cycles of seawater. Results show that the chloride content increased as max load and cycle increased. The chloride content at steel surface increased approximatively linearly as average crack width increased. Moreover, the max load had more influence on chloride content at steel surface than cycle. The difference of average chloride diffusion coefficient between tension and compression concrete was little at uncracked position. Average chloride diffusion coefficient increased as crack width increased when crack width was less than 0.11 mm whereas the increasing tendency was weak when crack width exceeded 0.11 mm. The residual yield load and ultimate load of RC beams decreased as max load and cycle increased. Based on univariate analysis of variance, the max load had more adverse effect on yield load and ultimate load than cycle.

  9. Narrow-Bicliques: Cryptanalysis of Full IDEA

    DEFF Research Database (Denmark)

    Khovratovich, D.; Leurent, G.; Rechberger, C.

    2012-01-01

    We apply and extend the recently introduced biclique framework to IDEA and for the first time describe an approach to noticeably speed-up key-recovery for the full 8.5 round IDEA.We also show that the biclique approach to block cipher cryptanalysis not only obtains results on more rounds, but also...... extended with ways to allow for a significantly reduced data complexity with everything else being equal. For this we use available degrees of freedom as known from hash cryptanalysis to narrow the relevant differential trails. Our cryptanalysis is of high computational complexity, and does not threaten...

  10. The phosphatidylinositol-3-phosphate 5-kinase inhibitor apilimod blocks filoviral entry and infection.

    Directory of Open Access Journals (Sweden)

    Elizabeth A Nelson

    2017-04-01

    Full Text Available Phosphatidylinositol-3-phosphate 5-kinase (PIKfyve is a lipid kinase involved in endosome maturation that emerged from a haploid genetic screen as being required for Ebola virus (EBOV infection. Here we analyzed the effects of apilimod, a PIKfyve inhibitor that was reported to be well tolerated in humans in phase 2 clinical trials, for its effects on entry and infection of EBOV and Marburg virus (MARV. We first found that apilimod blocks infections by EBOV and MARV in Huh 7, Vero E6 and primary human macrophage cells, with notable potency in the macrophages (IC50, 10 nM. We next observed that similar doses of apilimod block EBOV-glycoprotein-virus like particle (VLP entry and transcription-replication competent VLP infection, suggesting that the primary mode of action of apilimod is as an entry inhibitor, preventing release of the viral genome into the cytoplasm to initiate replication. After providing evidence that the anti-EBOV action of apilimod is via PIKfyve, we showed that it blocks trafficking of EBOV VLPs to endolysosomes containing Niemann-Pick C1 (NPC1, the intracellular receptor for EBOV. Concurrently apilimod caused VLPs to accumulate in early endosome antigen 1-positive endosomes. We did not detect any effects of apilimod on bulk endosome acidification, on the activity of cathepsins B and L, or on cholesterol export from endolysosomes. Hence by antagonizing PIKfyve, apilimod appears to block EBOV trafficking to its site of fusion and entry into the cytoplasm. Given the drug's observed anti-filoviral activity, relatively unexplored mechanism of entry inhibition, and reported tolerability in humans, we propose that apilimod be further explored as part of a therapeutic regimen to treat filoviral infections.

  11. Comparison of clonidine versus fentanyl as an adjuvant to intrathecal ropivacaine for major lower limb surgeries: A randomized double-blind prospective study

    Directory of Open Access Journals (Sweden)

    Anita R Chhabra

    2013-01-01

    Full Text Available Background: Ropivacaine is a newer local anesthetic, proven to have a better safety margin than bupivacaine and lignocaine. While maintaining this advantage and improving the intraoperative quality of anesthesia, the use of analgesic adjuvants has been proven to be valuable. Aim: To compare the efficacy of clonidine and fentanyl as adjuvants to intrathecal isobaric ropivacaine for major lower limb surgeries. Settings and Designs: Randomized double-blind control trial. Materials and Methods: Seventy patients were randomly divided in two groups. Ropivacaine-Clonidine group (RC received 60 mcg of clonidine with 15 mg of 0.5% isobaric ropivacaine, Ropivacaine Fentanyl group (RF received 25 mcg of fentanyl with 15 mg of 0.5% isobaric ropivacaine intrathecally. The onset and duration of sensory-motor block were recorded. The total analgesia time, sedation score, hemodynamic parameters, and side-effects were noted. Statistical Analysis: SPSS statistical package was used for statistical analysis. Paired and unpaired t-test, analysis of variance and chi-square test were used for statistical calculation. Result: The duration of sensory block in RC (329.42 ± 33.86, RF (226 ± 46.98, and motor block in RC (248.51 ± 55, RF (212.60 ± 43.52 out lasted the duration of surgery (125.61 + 64.46. In clonidine group, there was significant prolongation of sensory block (P < 0.001, motor block (P < 0.01 and the total analgesia time (P < 0.001. Hypotension and bradycardia occurred in 8.6% patients in clonidine group, whereas pruritus was experienced by 8.6% patients in fentanyl group. Conclusion: Ropivacaine when combined with clonidine or fentanyl provided adequate subarachnoid block for major surgeries, wherein clonidine has advantage over fentanyl as it increased the duration of subarachnoid block and prolonged the postoperative analgesia.

  12. An efficient, block-by-block algorithm for inverting a block tridiagonal, nearly block Toeplitz matrix

    International Nuclear Information System (INIS)

    Reuter, Matthew G; Hill, Judith C

    2012-01-01

    We present an algorithm for computing any block of the inverse of a block tridiagonal, nearly block Toeplitz matrix (defined as a block tridiagonal matrix with a small number of deviations from the purely block Toeplitz structure). By exploiting both the block tridiagonal and the nearly block Toeplitz structures, this method scales independently of the total number of blocks in the matrix and linearly with the number of deviations. Numerical studies demonstrate this scaling and the advantages of our method over alternatives.

  13. Homogenized global nonlinear constitutive model for RC panels under cyclic loadings

    International Nuclear Information System (INIS)

    Huguet, Miquel; Voldoire, Francois; Kotronis, Panagiotis; Erlicher, Silvano

    2014-01-01

    A new nonlinear stress resultant global constitutive model for RC panels is presented. Concrete damage, concrete stress transfer at cracks and bond-slip stress are the main nonlinear effects identified at the local scale that constitute the basis for the construction of the stress resultant global model through an analytical homogenization technique. The closed form solution is obtained using general functions for the previous phenomena. (authors)

  14. Recycling of epidermal growth factor-receptor complexes in A431 cells: Identification of dual pathways

    International Nuclear Information System (INIS)

    Sorkin, A.; Krolenko, S.; Kudrjavtceva, N.; Lazebnik, J.; Teslenko, L.; Soderquist, A.M.; Nikolsky, N.

    1991-01-01

    The intracellular sorting of EGF-receptor complexes (EGF-RC) has been studied in human epidermoid carcinoma A431 cells. Recycling of EGF was found to occur rapidly after internalization at 37 degrees C. The initial rate of EGF recycling was reduced at 18 degrees C. A significant pool of internalized EGF was incapable of recycling at 18 degrees C but began to recycle when cells were warmed to 37 degrees C. The relative rate of EGF outflow at 37 degrees C from cells exposed to an 18 degrees C temperature block was slower (t1/2 approximately 20 min) than the rate from cells not exposed to a temperature block (t1/2 approximately 5-7 min). These data suggest that there might be both short- and long-time cycles of EGF recycling in A431 cells. Examination of the intracellular EGF-RC dissociation and dynamics of short- and long-time recycling indicated that EGF recycled as EGF-RC. Moreover, EGF receptors that were covalently labeled with a photoactivatable derivative of 125 I-EGF recycled via the long-time pathway at a rate similar to that of 125 I-EGF. Since EGF-RC degradation was also blocked at 18 degrees C, we propose that sorting to the lysosomal and long-time recycling pathway may occur after a highly temperature-sensitive step, presumably in the late endosomes

  15. Experimental study on fatigue crack propagation rate of RC beam strengthened with carbon fiber laminate

    Science.gov (United States)

    Huang, Peiyan; Liu, Guangwan; Guo, Xinyan; Huang, Man

    2008-11-01

    The experimental research on fatigue crack propagation rate of reinforced concrete (RC) beams strengthened with carbon fiber laminate (CFL) is carried out by MTS system in this paper. The experimental results show that, the main crack propagation on strengthened beam can be summarized into three phases: 1) fast propagation phase; 2) steady propagation and rest phase; 3) unsteady propagation phase. The phase 2-i.e. steady propagation and rest stage makes up about 95% of fatigue life of the strengthened beam. The propagation rate of the main crack, da/dN, in phase 2 can be described by Paris formula, and the constant C and m can be confirmed by the fatigue crack propagation experiments of the RC beams strengthened with CFL under three-point bending loads.

  16. The response of an RC line MWPC to primary cosmic rays. [Multi-Wire Proportional Counter

    Science.gov (United States)

    Gregory, J. C.; Selig, W. J.; Austin, R. W.; Derrickson, J. H.; Parnell, T. A.

    1978-01-01

    A simple 50 x 50 sq cm MWPC plane was arranged as an RC-line and flown on a balloon flight with the MSFC-UAH Cosmic Ray experiment. Positions of primary cosmic ray tracks in the RC-line were determined by the risetime method and compared with the expected position as indicated by a best line fitted through four planes of the conventional MWPC hodoscope. Mean errors were estimated for sea-level muons, and CNO group and iron group particles. It is believed that the delta-rays accompanying the primaries degraded the position resolution. Measured standard deviations allowing for uncertainty in the true track position are of the order of 1 cm or less in the primary charge region between 7 and 26.

  17. Evolution in the block: common elements of 5S rDNA organization and evolutionary patterns in distant fish genera.

    Science.gov (United States)

    Campo, Daniel; García-Vázquez, Eva

    2012-01-01

    The 5S rDNA is organized in the genome as tandemly repeated copies of a structural unit composed of a coding sequence plus a nontranscribed spacer (NTS). The coding region is highly conserved in the evolution, whereas the NTS vary in both length and sequence. It has been proposed that 5S rRNA genes are members of a gene family that have arisen through concerted evolution. In this study, we describe the molecular organization and evolution of the 5S rDNA in the genera Lepidorhombus and Scophthalmus (Scophthalmidae) and compared it with already known 5S rDNA of the very different genera Merluccius (Merluccidae) and Salmo (Salmoninae), to identify common structural elements or patterns for understanding 5S rDNA evolution in fish. High intra- and interspecific diversity within the 5S rDNA family in all the genera can be explained by a combination of duplications, deletions, and transposition events. Sequence blocks with high similarity in all the 5S rDNA members across species were identified for the four studied genera, with evidences of intense gene conversion within noncoding regions. We propose a model to explain the evolution of the 5S rDNA, in which the evolutionary units are blocks of nucleotides rather than the entire sequences or single nucleotides. This model implies a "two-speed" evolution: slow within blocks (homogenized by recombination) and fast within the gene family (diversified by duplications and deletions).

  18. An APETALA2 Homolog, RcAP2, Regulates the Number of Rose Petals Derived From Stamens and Response to Temperature Fluctuations

    Directory of Open Access Journals (Sweden)

    Yu Han

    2018-04-01

    Full Text Available Rosa chinensis, which is a famous traditional flower in China, is a major ornamental plant worldwide. Long-term cultivation and breeding have resulted in considerable changes in the number of rose petals, while most wild Rosaceae plants have only one whorl consisting of five petals. The petals of double flowers reportedly originate from stamens, but the underlying molecular mechanism has not been fully characterized. In this study, we observed that the number of petals of R. chinensis ‘Old Blush’ flowers increased and decreased in response to low- and high-temperature treatments, respectively, similar to previous reports. We characterized these variations in further detail and found that the number of stamens exhibited the opposite trend. We cloned an APETALA2 homolog, RcAP2. A detailed analysis of gene structure and promoter cis-acting elements as well as RcAP2 temporospatial expression patterns and responses to temperature changes suggested that RcAP2 expression may be related to the number of petals from stamen origin. The overexpression of RcAP2 in Arabidopsis thaliana transgenic plants may induce the transformation of stamens to petals, thereby increasing the number of petals. Moreover, silencing RcAP2 in ‘Old Blush’ plants decreased the number of petals. Our results may be useful for clarifying the temperature-responsive mechanism involved in petaloid stamen production, which may be relevant for the breeding of new rose varieties with enhanced flower traits.

  19. Cryptanalysis of MDC-2

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Mendel, Florian; Rechberger, Christian

    2009-01-01

    We provide a collision attack and preimage attacks on the MDC-2 construction, which is a method (dating back to 1988) of turning an $n$-bit block cipher into a $2n$-bit hash function. The collision attack is the first below the birthday bound to be described for MDC-2 and, with $n=128$, it has co...

  20. Atomic-AES: A compact implementation of the AES encryption/decryption core

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco

    2016-01-01

    The implementation of the AES encryption core by Moradi et al. at Eurocrypt 2011 is one of the smallest in terms of gate area. The circuit takes around 2400 gates and operates on an 8 bit datapath. However this is an encryption only core and unable to cater to block cipher modes like CBC and ELm...

  1. Flexural repair/strengthening of pre-damaged R.C. beams using embedded CFRP rods

    Directory of Open Access Journals (Sweden)

    Alaa M. Morsy

    2015-12-01

    Full Text Available Many reinforced concrete R.C. elements need either strengthening due to the need of increasing the service loads or repair due to overloading stress or environmental deterioration affecting these elements. In this paper an experimental program is presented to investigate the effect of using embedded CFRP rod as NSM reinforcement for strengthening/repairing R.C. beams pre-damaged by loading to different loading levels and comparing the results to those of non-preloaded beams. A total of five beams were cast and six beams were tested under four point loading. The main objective of this paper was to investigate the effect of providing one 12 mm diameter CFRP rod in addition to the existing steel reinforcement. Three beams were tested to failure directly without any preloading, whereas the other three beams were firstly subjected to preloading to different load levels. Following that these three beams were strengthened and were tested up to failure.

  2. Zpracování telemetrických údajů RC modelů letadel

    OpenAIRE

    Žák, Tomáš

    2012-01-01

    Bakalářská práce se zaměřuje na problematiku snímání stavu RC modelu letadla, během letu. Je zde detailně rozebrána vnější tak i vnitřní struktura, včetně komunikace. Cílem práce je navrhnutí funkční desky pro snímání stavu RC letadla během letu, k tomu je použita součástka akcelerometr umožňující snímat stav. V digitální podobě je pak následně přeposílá k vyhodnocení do mikrokontroléru. V příloze je uvedeno celkové schéma zapojení včetně seznamu použitých součástek. Bachelor’s project foc...

  3. Flexural Behavior of RC Slabs Strengthened in Flexure with Basalt Fabric-Reinforced Cementitious Matrix

    Directory of Open Access Journals (Sweden)

    Sugyu Lee

    2018-01-01

    Full Text Available This paper presents both experimental and analytical research results for predicting the flexural capacity of reinforced concrete (RC slabs strengthened in flexure with basalt fabric-reinforced cementitious matrix (FRCM. A total of 13 specimens were fabricated to evaluate the flexural behavior of RC slabs strengthened with basalt FRCM composite and were tested under four-point loading. The fiber type, tensile reinforcement ratio, and the number of fabric layers were chosen as experimental variables. The maximum load of FRCM-strengthened specimens increased from 11.2% to 98.2% relative to the reference specimens. The energy ratio and ductility of the FRCM-strengthened specimens decreased with the higher amount of fabric and tensile reinforcement. The effective stress level of FRCM fabric can be accurately predicted by a bond strength of ACI 549 and Jung’s model.

  4. A multi-standard active-RC filter with accurate tuning system

    International Nuclear Information System (INIS)

    Ma Heping; Yuan Fang; Shi Yin; Dai, F F

    2009-01-01

    A low-power, highly linear, multi-standard, active-RC filter with an accurate and novel tuning architecture is presented. It exhibits IEEE 802.11 a/b/g (9.5 MHz) and DVB-H (3 MHz, 4 MHz) application. The filter exploits digitally-controlled polysilicon resistor banks and a phase lock loop type automatic tuning system. The novel and complex automatic frequency calibration scheme provides better than 4 corner frequency accuracy, and it can be powered down after calibration to save power and avoid digital signal interference. The filter achieves OIP3 of 26 dBm and the measured group delay variation of the receiver filter is 50 ns (WLAN mode). Its dissipation is 3.4 mA in RX mode and 2.3 mA (only for one path) in TX mode from a 2.85 V supply. The dissipation of calibration consumes 2 mA. The circuit has been fabricated in a 0.35 μm 47 GHz SiGe BiCMOS technology; the receiver and transmitter filter occupy 0.21 mm 2 and 0.11 mm 2 (calibration circuit excluded), respectively.

  5. Recent improvements to RC-line encoded position-sensitive proportional counters

    International Nuclear Information System (INIS)

    Borkowski, C.J.; Kopp, M.K.

    1977-01-01

    Continuing research on the principles of position encoding with RC lines has advanced the design of position-sensitive proportional counters (PSPCs) to meet the requirements for high count rates (>10 5 counts/sec) and good spatial resolution (>10 4 spatial elements) in small-angle scattering experiments with x rays and neutrons. Low-noise preamplifiers were developed with pole-zero cancellation in the feedback circuit and modular linear amplifiers with passive RCL shaping which, compared to previous designs, reduce output saturation at high count rates approx.20 times and shorten the position signal processing time to 2 ) for low-energy ( 800 x 800 mm 2 ) for the measurement of small-angle scattering with neutrons. The method of electronic thickness discrimination was applied to change the effective thickness of an area PSPC from 12 to 2 cm whenever the molybdenum target of an x-ray generator was changed to a copper target. This thickness adjustment increased the signal-to-background ratio by a factor of approx.6 for the 8-keV photons from the copper target, while maintaining a >90% detection efficiency

  6. Psychometric Properties of the MMPI-2-RF Somatic Complaints (RC1) Scale

    Science.gov (United States)

    Thomas, Michael L.; Locke, Dona E. C.

    2010-01-01

    The MMPI-2 Restructured Form (MMPI-2-RF; Tellegen & Ben-Porath, 2008) was designed to be psychometrically superior to its MMPI-2 counterpart. However, the test has yet to be extensively evaluated in diverse clinical settings. The purpose of this study was to examine the psychometric properties of the MMPI-2-RF Somatic Complaints (RC1) scale in…

  7. Relativistic and Non-Relativistic Electronic Molecular-Structure Calculations for Dimers of 4p-, 5p-, and 6p-Block Elements

    DEFF Research Database (Denmark)

    Hofener, S.; Ahlrichs, R.; Knecht, S.

    2012-01-01

    We report results of non-relativistic and two-component relativistic single-reference coupled-cluster with single and double and perturbative triple excitations [CCSD(T)] treatments for the 4p-block dimers Ga2 to Br2, the 5p-block dimers In2 to I2, and their atoms. Extended basis sets up...

  8. Seismic reliability assessment of RC structures including soil–structure interaction using wavelet weighted least squares support vector machine

    International Nuclear Information System (INIS)

    Khatibinia, Mohsen; Javad Fadaee, Mohammad; Salajegheh, Javad; Salajegheh, Eysa

    2013-01-01

    An efficient metamodeling framework in conjunction with the Monte-Carlo Simulation (MCS) is introduced to reduce the computational cost in seismic reliability assessment of existing RC structures. In order to achieve this purpose, the metamodel is designed by combining weighted least squares support vector machine (WLS-SVM) and a wavelet kernel function, called wavelet weighted least squares support vector machine (WWLS-SVM). In this study, the seismic reliability assessment of existing RC structures with consideration of soil–structure interaction (SSI) effects is investigated in accordance with Performance-Based Design (PBD). This study aims to incorporate the acceptable performance levels of PBD into reliability theory for comparing the obtained annual probability of non-performance with the target values for each performance level. The MCS method as the most reliable method is utilized to estimate the annual probability of failure associated with a given performance level in this study. In WWLS-SVM-based MCS, the structural seismic responses are accurately predicted by WWLS-SVM for reducing the computational cost. To show the efficiency and robustness of the proposed metamodel, two RC structures are studied. Numerical results demonstrate the efficiency and computational advantages of the proposed metamodel for the seismic reliability assessment of structures. Furthermore, the consideration of the SSI effects in the seismic reliability assessment of existing RC structures is compared to the fixed base model. It shows which SSI has the significant influence on the seismic reliability assessment of structures.

  9. A review of the application Acoustic Emission (AE) incorporating mechanical approach to monitor Reinforced concrete (RC) strengthened with Fiber Reinforced Polymer (FRP) properties under fracture

    Science.gov (United States)

    Syed Mazlan, S. M. S.; Abdullah, S. R.; Shahidan, S.; Noor, S. R. Mohd

    2017-11-01

    Concrete durability may be affected by so many factors such as chemical attack and weathering action that reduce the performance and the service life of concrete structures. Low durability Reinforced concrete (RC) can be greatly improved by using Fiber Reinforce Polymer (FRP). FRP is a commonly used composite material for repairing and strengthening RC structures. A review on application of Acoustic Emission (AE) techniques of real time monitoring for various mechanical tests for RC strengthened with FRP involving four-point bending, three-point bending and cyclic loading was carried out and discussed in this paper. Correlations between each AE analyses namely b-value, sentry and intensity analysis on damage characterization also been critically reviewed. From the review, AE monitoring involving RC strengthened with FRP using b-value, sentry and intensity analysis are proven to be successful and efficient method in determining damage characterization. However, application of AE analysis using sentry analysis is still limited compared to b-value and intensity analysis in characterizing damages especially for RC strengthened with FRP specimen.

  10. RC2S: a cognitive remediation program to improve social cognition in schizophrenia and related disorders

    Directory of Open Access Journals (Sweden)

    Elodie ePEYROUX

    2014-06-01

    Full Text Available In people with psychiatric disorders, particularly those suffering from schizophrenia and related illnesses, pronounced difficulties in social interactions are a key manifestation. These difficulties can be partly explained by impairments in social cognition, defined as the ability to understand oneself and others in the social world, which includes abilities such as emotion recognition, theory of mind, attributional style, and social perception and knowledge. The impact of several kinds of interventions on social cognition has been studied recently. The best outcomes in the area of social cognition in schizophrenia are those obtained by way of cognitive remediation programs. New strategies and programs in this line are currently being developed, such as RC2S (Cognitive Remediation of Social Cognition in Lyon, France. Considering that the social cognitive deficits experienced by patients with schizophrenia are very diverse, and that the main objective of social cognitive remediation programs is to improve patients’ functioning in their daily social life, RC2S was developed as an individualized and flexible program that allows patients to practice social interaction in a realistic environment through the use of virtual-reality techniques. In the RC2S program, the patient’s goal is to assist a character named Tom in various social situations. The underlying idea for the patient is to acquire cognitive strategies for analyzing social context and emotional information in order to understand other characters’ mental states and to help Tom manage his social interactions. In this paper, we begin by presenting some data regarding the social cognitive impairments found in schizophrenia and related disorders, and we describe how these deficits are targeted by social cognitive remediation. Then we present the RC2S program and discuss the advantages of computer-based simulation to improve social cognition and social functioning in people with

  11. RC2S: A Cognitive Remediation Program to Improve Social Cognition in Schizophrenia and Related Disorders.

    Science.gov (United States)

    Peyroux, Elodie; Franck, Nicolas

    2014-01-01

    In people with psychiatric disorders, particularly those suffering from schizophrenia and related illnesses, pronounced difficulties in social interactions are a key manifestation. These difficulties can be partly explained by impairments in social cognition, defined as the ability to understand oneself and others in the social world, which includes abilities such as emotion recognition, theory of mind (ToM), attributional style, and social perception and knowledge. The impact of several kinds of interventions on social cognition has been studied recently. The best outcomes in the area of social cognition in schizophrenia are those obtained by way of cognitive remediation programs. New strategies and programs in this line are currently being developed, such as RC2S (cognitive remediation of social cognition) in Lyon, France. Considering that the social cognitive deficits experienced by patients with schizophrenia are very diverse, and that the main objective of social cognitive remediation programs is to improve patients' functioning in their daily social life, RC2S was developed as an individualized and flexible program that allows patients to practice social interaction in a realistic environment through the use of virtual reality techniques. In the RC2S program, the patient's goal is to assist a character named Tom in various social situations. The underlying idea for the patient is to acquire cognitive strategies for analyzing social context and emotional information in order to understand other characters' mental states and to help Tom manage his social interactions. In this paper, we begin by presenting some data regarding the social cognitive impairments found in schizophrenia and related disorders, and we describe how these deficits are targeted by social cognitive remediation. Then we present the RC2S program and discuss the advantages of computer-based simulation to improve social cognition and social functioning in people with psychiatric disorders.

  12. RC2S: A Cognitive Remediation Program to Improve Social Cognition in Schizophrenia and Related Disorders

    Science.gov (United States)

    Peyroux, Elodie; Franck, Nicolas

    2014-01-01

    In people with psychiatric disorders, particularly those suffering from schizophrenia and related illnesses, pronounced difficulties in social interactions are a key manifestation. These difficulties can be partly explained by impairments in social cognition, defined as the ability to understand oneself and others in the social world, which includes abilities such as emotion recognition, theory of mind (ToM), attributional style, and social perception and knowledge. The impact of several kinds of interventions on social cognition has been studied recently. The best outcomes in the area of social cognition in schizophrenia are those obtained by way of cognitive remediation programs. New strategies and programs in this line are currently being developed, such as RC2S (cognitive remediation of social cognition) in Lyon, France. Considering that the social cognitive deficits experienced by patients with schizophrenia are very diverse, and that the main objective of social cognitive remediation programs is to improve patients’ functioning in their daily social life, RC2S was developed as an individualized and flexible program that allows patients to practice social interaction in a realistic environment through the use of virtual reality techniques. In the RC2S program, the patient’s goal is to assist a character named Tom in various social situations. The underlying idea for the patient is to acquire cognitive strategies for analyzing social context and emotional information in order to understand other characters’ mental states and to help Tom manage his social interactions. In this paper, we begin by presenting some data regarding the social cognitive impairments found in schizophrenia and related disorders, and we describe how these deficits are targeted by social cognitive remediation. Then we present the RC2S program and discuss the advantages of computer-based simulation to improve social cognition and social functioning in people with psychiatric disorders

  13. Overview of the divertor design and its integration into RTO/RC-ITER

    International Nuclear Information System (INIS)

    Janeschitz, G.; Tivey, R.; Antipenkov, A.; Barabash, V.; Chiocchio, S.; Federici, G.; Heidl, H.; Ibbott, C.; Martin, E.

    2000-01-01

    The design of the divertor and its integration into the reduced technical objectives/reduced cost-international thermonuclear energy reactor (RTO/RC-ITER) is based on the experience gained from the 1998 design of international thermonuclear energy reactor (ITER) and on the research and development performed throughout the engineering design activities (EDA). This paper gives an overview of the layout and functional design of the RTO/RC-ITER divertor, including the integration into the machine and the remote replacement of the divertor cassettes. Design guidelines are presented which have allowed quick preparation of divertor layouts suitable for further study using the B2-EIRENE edge plasma code. As in the 1998 design, the divertor is segmented into cassettes, and the segmentation, which is three per sector, is driven by access through the divertor level ports. Maintaining this access and avoiding interference with poloidal field coils means that the divertor level ports need to be inclined (7 deg.). This opens up the possibility of incorporating inboard and outboard baffles into the divertor cassettes. The cassettes are transported in-vessel by making use of the toroidal rails onto which the cassettes are finally clamped in position. Significant reduction of the space available between the X-point and the vacuum vessel results in re-positioning of the toroidal rails in order to retain sufficient depth for the inner and outer divertor legs. This, in turn, requires some changes to the remote handling (RH) concept. Remote handling (RH) is now based on using a cantilevered articulated gripper during the radial movement of the cassettes inside the RH ports. However, the principle to use a cassette toroidal mover (CTM) for in vessel handling is unchanged, hence maintaining the validity of previous EDA research and development. The space previously left below the cassettes for RH was also used for pumping. Elimination of this space has led to re-siting of the pumping

  14. An Experimental Study on Hybrid Noncompression CF Bracing and GF Sheet Wrapping Reinforcement Method to Restore Damaged RC Structures

    Directory of Open Access Journals (Sweden)

    Kang Seok Lee

    2015-01-01

    Full Text Available We describe a novel technique for restoration of reinforced concrete (RC structures that have sustained damage during an earthquake. The reinforcement scheme described here is a hybrid seismic retrofitting technique that combines noncompression X-bracing using CF with externally bonded GF sheets to strengthen RC structures that have sustained damage following an earthquake. The GF sheet is used to improve the ductility of columns, and the noncompression CF X-bracing system, which consists of CF bracing and anchors to replace the conventional steel bracing and bolt connections, is used to increase the lateral strength of the framing system. We report seismic restoration capacity, which enables reuse of the damaged RC frames via the hybrid CF X-bracing and GF sheet wrapping system. Cyclic loading tests were carried out to investigate hysteresis of the lateral load-drift relations, as well as the ductility. The GF sheet significantly improved the ductility of columns, resulting in a change in failure mode. The strengthening effect of conventional CF sheets used in columns is not sufficient with respect to lateral strength and stiffness. However, this study results in a significant increase in the strength of the structure due to the use of CF X-bracing and inhibited buckling failure of the bracing. This result can be exploited to develop guidelines for the application of the reinforcement system to restore damaged RC structures.

  15. Comparison of dexamethasone and clonidine as an adjuvant to 1.5% lignocaine with adrenaline in infraclavicular brachial plexus block for upper limb surgeries

    Directory of Open Access Journals (Sweden)

    Dipal Mahendra Shah

    2015-01-01

    Full Text Available Background and Aims: The role of clonidine as an adjuvant to regional blocks to hasten the onset of the local anesthetics or prolong their duration of action is proven. The efficacy of dexamethasone compared to clonidine as an adjuvant is not known. We aimed to compare the efficacy of dexamethasone versus clonidine as an adjuvant to 1.5% lignocaine with adrenaline in infraclavicular brachial plexus block for upper limb surgeries. Material and Methods: Fifty three American Society of Anaesthesiologists-I and II patients aged 18-60 years scheduled for upper limb surgery were randomized to three groups to receive 1.5% lignocaine with 1:200,000 adrenaline and the study drugs. Group S (n = 13 received normal saline, group D (n = 20 received dexamethasone and group C (n = 20 received clonidine. The time to onset and peak effect, duration of the block (sensory and motor and postoperative analgesia requirement were recorded. Chi-square and ANOVA test were used for categorical and continuous variables respectively and Bonferroni or post-hoc test for multiple comparisons. P < 0.05 was considered significant. Results: The three groups were comparable in terms of time to onset and peak action of motor and sensory block, postoperative analgesic requirements and pain scores. 90% of the blocks were successful in group C compared to only 60% in group D (P = 0.028. The duration of sensory and motor block in group S, D and C were 217.73 ± 61.41 min, 335.83 ± 97.18 min and 304.72 ± 139.79 min and 205.91 ± 70.1 min, 289.58 ± 78.37 min and 232.5 ± 74.2 min respectively. There was significant prolongation of sensory and motor block in group D as compared to group S (P < 0.5. Time to first analgesic requirement was significantly more in groups C and D as compared with group S (P < 0.5. Clinically significant complications were absent. Conclusions: We conclude that clonidine is more efficacious than dexamethasone as an adjuvant to 1.5% lignocaine in brachial

  16. Status of blanket design for RTO/RC ITER

    International Nuclear Information System (INIS)

    Yamada, M.; Ioki, K.; Cardella, A.; Elio, F.; Miki, N.

    2000-01-01

    Design has progressed on the FW/blanket for the RTO/RC (reduced technical objective/ reduced cost) ITER. The basic functions and structures are the same as for the 1998 ITER design. However, design and fabrication methods of the FW/blanket have been improved to achieve ∝ 50% reduction of the construction cost compared to that for the 1998 ITER design. Detailed blanket module designs with flat separable FW panels have been developed to reduce the fabrication cost and the future radioactive waste. Most of the R and D performed so far during the EDA (engineering design activity) is still applicable. Further cost reduction methods are also being investigated and additional R and D is being performed. (orig.)

  17. Evaluation on effects of chloride-induced deterioration on mechanical properties of RC beams with cracking damage

    International Nuclear Information System (INIS)

    Matsuo, Toyofumi; Matsumura, Takuro; Otsuka, Taku

    2015-01-01

    This paper discusses the influence of chloride-induced deterioration on mechanical properties of aging reinforced concrete (RC) structures and the applicability of the material degradation model that takes reinforcing steel corrosion into consideration for finite element analysis. We conducted the corrosion tests under the simulated tidal environment and the flexural loading tests for the RC beams with cracking damage and initial defects. Then, the experimental results were numerically correlated to validate the devised modeling. The obtained results were summarized as follows: (a) The cracking damage in specimens caused a minor effect on the reinforcing steel corrosion in the case where the thickness of cover concrete was 40 mm and main rebars did not yield before chloride attack. On the other hand the maximum corrosion ratio of the deteriorated part became considerably larger than that of the non-cracking part in the specimens where the cover concrete were removed partially to simulate spalling by the severe corrosion. (b) Based on the test results, we derived the corrosion velocity of reinforcing steel corresponding to cracking damage degrees. (c) In FEM analyses, we showed that the above modeling can estimate the flexural strength of RC beams in consideration of the degradation in elongation performance of reinforcing steel due to corrosion. (author)

  18. Finding Higher Order Differentials of MISTY1

    Science.gov (United States)

    Tsunoo, Yukiyasu; Saito, Teruo; Kawabata, Takeshi; Nakagawa, Hirokatsu

    MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it is recommended for Japanese e-Government ciphers by the CRYPTREC project. In this paper, we report on 12th order differentials in 3-round MISTY1 with FL functions and 44th order differentials in 4-round MISTY1 with FL functions both previously unknown. We also report that both data complexity and computational complexity of higher order differential attacks on 6-round MISTY1 with FL functions and 7-round MISTY1 with FL functions using the 46th order differential can be reduced to as much as 1/22 of the previous values by using multiple 44th order differentials simultaneously.

  19. Dynamic video encryption algorithm for H.264/AVC based on a spatiotemporal chaos system.

    Science.gov (United States)

    Xu, Hui; Tong, Xiao-Jun; Zhang, Miao; Wang, Zhu; Li, Ling-Hao

    2016-06-01

    Video encryption schemes mostly employ the selective encryption method to encrypt parts of important and sensitive video information, aiming to ensure the real-time performance and encryption efficiency. The classic block cipher is not applicable to video encryption due to the high computational overhead. In this paper, we propose the encryption selection control module to encrypt video syntax elements dynamically which is controlled by the chaotic pseudorandom sequence. A novel spatiotemporal chaos system and binarization method is used to generate a key stream for encrypting the chosen syntax elements. The proposed scheme enhances the resistance against attacks through the dynamic encryption process and high-security stream cipher. Experimental results show that the proposed method exhibits high security and high efficiency with little effect on the compression ratio and time cost.

  20. Reduction in sodium content of local anesthetics for peripheral nerve blocks: a comparative evaluation of saline with 5% dextrose--a randomized controlled double-blind study.

    Science.gov (United States)

    Dhir, Shalini; Tureanu, Luminita; Bouzari, Amir; Masood, Amna; Francispragasam, Mario; Ganapathy, Sugantha

    2012-06-01

    Commercially available local anesthetic drugs when diluted with normal saline have high sodium content. High perineural sodium concentration has been implicated in antagonizing the analgesic effects of local anesthetics by preventing and/or delaying neural blockade. Five percent dextrose is not known to cause any short- or long-term injury when injected around neural tissue. In this study, we prospectively compared and evaluated block characteristics when local anesthetic drug was diluted with these 2 different agents. Patients scheduled for upper limb surgery were randomly assigned to receive axillary brachial plexus block with 0.5% ropivacaine (1% diluted with either 5% dextrose or normal saline). Motor and sensory block were tested every 5 minutes for 30 minutes. Postoperatively, a telephone interview was conducted after 24 hours and 7 days along with surgical follow-up at days 3, 10, and/or 14 to 28 days to document side effects, patient satisfaction, and time for block resolution. Any nerve deficits were followed until resolution. The primary outcome was time to onset of sensory nerve block. Five hundred fifty patients were recruited for this study. The mean time to complete sensory block was 18.3 ± 6.1 minutes in the dextrose group and 22.5 ± 6.4 minutes in the saline group (P dextrose provides earlier onset of axillary brachial plexus block with ropivacaine.

  1. Fuel cycle design evolution from FDR-ITER to RTO/RC-ITER

    International Nuclear Information System (INIS)

    Murdoch, D.K.; Glugla, M.; Kveton, O.

    2000-01-01

    Instantaneous fuelling and plasma exhaust flow rates for the reduced technical objective/reduced cost version of International Thermonuclear Experimental Reactor (RTO/RC-ITER) are similar to those described in the Final Design Report (FDR) of ITER, despite the reduction in fusion power by a factor of about two. However, the reduced pulse length and the lower fraction of campaign time spent in burn mode, together with the lower integrated operating lifetime proposed, will generate cost savings in several systems of the fuel cycle. As the quantity of tritium handled per pulse is now smaller, this could be buffered, allowing systems in the tritium plant still to operate in steady state mode as in the FDR design, thereby increasing the potential for downsizing of system capacities. The lower operating time fraction will increase performance margins for some systems, for example, the Torus Exhaust Gas Processing System (TEGPS) which was designed to meet a specified daily release rate for the FDR design conditions which were more onerous than RTO/RC-ITER. As no break through of tritium into cooling water is now expected, the duties of the Water and Atmosphere Detritiation Systems are considerably reduced, and design concepts which are simpler, cheaper and more amenable to modular implementation can be adopted

  2. Direct displacement-based design of special composite RC shear walls with steel boundary elements

    Directory of Open Access Journals (Sweden)

    H. Kazemi

    2016-06-01

    Full Text Available Special composite RC shear wall (CRCSW with steel boundary elements is a kind of lateral force resisting structural system which is used in earthquake-prone regions. Due to their high ductility and energy dissipation, CRCSWs have been widely used in recent years by structural engineers. However, there are few studies in the literature on the seismic design of such walls. Although there are many studies in the literature on the Direct Displacement-Based Design (DDBD of RC structures, however, no study can be found on DDBD of CRCSWs. Therefore, the aim of present study is to evaluate the ability of DDBD method for designing CRCSWs. In this study, four special composite reinforced concrete shear walls with steel boundary elements of 4, 8, 12 and 16 story numbers were designed using the DDBD method for target drift of 2%. The seismic behavior of the four CRCSWs was studied using nonlinear time-history dynamic analyses. Dynamic analyses were performed for the mentioned walls using 7 selected earthquake records. The seismic design parameters considered in this study includes: lateral displacement profile, inelastic dynamic inter-story drift demand, failure pattern and the composite RC shear walls overstrength factor. For each shear wall, the overall overstrength factor was calculated by dividing the ultimate dynamic base shear demand (Vu by the base shear demand (Vd as per the Direct Displacement Based-Design (DDBD method. The results show that the DDBD method can be used to design CRCSWs safely in seismic regions with predicted behavior.

  3. Dynamics model for real time diagnostics of Triga RC-1 system

    International Nuclear Information System (INIS)

    Gadomski, A.M.; Nanni, V.; Meo, G.

    1988-01-01

    This paper presents dynamics model of TRIGA RC-1 reactor system. The model is dedicated to the real-time early fault detection during a reactor operation in one week exploitation cycle. The algorithms are specially suited for real-time, long time and also accelerated simulations with assumed diagnostic oriented accuracy. The approximations, modular structure, numerical methods and validation are discussed. The elaborated model will be build in the TRIGA Supervisor System and TRIGA Diagnostic Simulator

  4. Improved meet-in-the-middle attacks on reduced-round Piccolo

    DEFF Research Database (Denmark)

    Liu, Ya; Cheng, Liang; Liu, Zhiqiang

    2018-01-01

    Piccolo is a lightweight block cipher that adopts a generalized Feistel network structure with 4 branches, each of which is 16 bit long. The key length is 80 or 128 bit, denoted by Piccolo-80 and Piccolo-128, respectively. In this paper, we mounted meet-in-the-middle attacks on 14-round Piccolo-80...... and at the end, respectively. Based on this structure, we mounted an attack on 14-round Piccolo-80 from the 5th round to the 18th round. The data, time, and memory complexities were 252 chosen plaintexts, 267.44 encryptions, and 264.91 blocks, respectively. For Piccolo-128, we built a 7-round distinguisher...... to attack 18-round Piccolo-128 from the 4th round to the 21st round. The data, time, and memory complexities were 252 chosen plaintexts, 2126.63 encryptions, and 2125.29 blocks, respectively. If not considering results on biclique cryptanalysis, these are currently the best public results on this reduced...

  5. Expected damages of retrofitted bridges with RC jacketing

    Science.gov (United States)

    Montes, O.; Jara, J. M.; Jara, M.; Olmos, B. A.

    2015-07-01

    The bridge infrastructure in many countries of the world consists of medium span length structures built several decades ago and designed for very low seismic forces. Many of them are reinforced concrete structures that according to the current code regulations have to be rehabilitated to increase their seismic capacity. One way to reduce the vulnerability of the bridges is by using retrofitting techniques that increase the strength of the structure or by incorporating devices to reduce the seismic demand. One of the most common retrofit techniques of the bridges substructures is the use of RC jacketing; this research assesses the expected damages of seismically deficient medium length highway bridges retrofitted with reinforced concrete jacketing, by conducting a parametric study. We select a suite of twenty accelerograms of subduction earthquakes recorded close to the Pacific Coast in Mexico. The original structures consist of five 30 m span simple supported bridges with five pier heights of 5 m, 10 m, 15 m 20 and 25 m and the analyses include three different jacket thickness and three steel ratios. The bridges were subjected to the seismic records and non-linear time history analyses were carried out by using the OpenSEEs Plataform. Results allow selecting the reinforced concrete jacketing that better improves the expected seismic behavior of the bridge models.

  6. Expected damages of retrofitted bridges with RC jacketing

    International Nuclear Information System (INIS)

    Montes, O; Jara, J M; Jara, M; Olmos, B A

    2015-01-01

    The bridge infrastructure in many countries of the world consists of medium span length structures built several decades ago and designed for very low seismic forces. Many of them are reinforced concrete structures that according to the current code regulations have to be rehabilitated to increase their seismic capacity. One way to reduce the vulnerability of the bridges is by using retrofitting techniques that increase the strength of the structure or by incorporating devices to reduce the seismic demand. One of the most common retrofit techniques of the bridges substructures is the use of RC jacketing; this research assesses the expected damages of seismically deficient medium length highway bridges retrofitted with reinforced concrete jacketing, by conducting a parametric study. We select a suite of twenty accelerograms of subduction earthquakes recorded close to the Pacific Coast in Mexico. The original structures consist of five 30 m span simple supported bridges with five pier heights of 5 m, 10 m, 15 m 20 and 25 m and the analyses include three different jacket thickness and three steel ratios. The bridges were subjected to the seismic records and non-linear time history analyses were carried out by using the OpenSEEs Plataform. Results allow selecting the reinforced concrete jacketing that better improves the expected seismic behavior of the bridge models. (paper)

  7. Active rc filter permits easy trade-off of amplifier gain and sensitivity to gain

    Science.gov (United States)

    Kerwin, W. J.; Shaffer, C. V.

    1968-01-01

    Passive RC network was designed with zeros of transmission in the right half of the complex frequency plane in the feedback loop of a simple negative-gain amplifier. The proper positioning provides any desired trade-off between amplifier gain and sensitivity to amplifier gain.

  8. Capacidade embriogênica da cultivar IAS-5 de soja

    Directory of Open Access Journals (Sweden)

    Di Mauro Antonio Orlando

    2001-01-01

    Full Text Available O objetivo deste trabalho foi estudar o controle genético da formação de embriões somáticos da cultivar IAS-5 de soja. O experimento foi conduzido em casa de vegetação, cultivando-se quatro plantas por vaso, sob fotoperíodo de 14 horas e temperatura em torno de 28°C. Efetuaram-se cruzamentos entre os parentais não-embriogênicos (cultivares IAC-6, Paraná e IAC-15 e embriogênico (cultivar IAS-5 e retrocruzamentos para obtenção das gerações F1, F2,RC1P1 e RC1P2. Cotilédones imaturos, com 4-6 mm de comprimento, derivados dos parentais das gerações F1, F2, RC1P1 e RC1P2 foram cultivados em placas de Petri contendo meio N10, por um período de 90 dias, em câmara de crescimento. Os embriões somáticos derivados da indução foram contados, e os números, usados para obtenção dos parâmetros genéticos. Os resultados obtidos mostraram que o caráter capacidade de produção de embriões somáticos da cultivar IAS-5 é de natureza quantitativa e controlado por, aproximadamente, 20 genes.

  9. Implementation of Highly-Flowable Strain Hardening Fiber Reinforced Concrete in New RC Beam-Column Joints

    Directory of Open Access Journals (Sweden)

    Liao Wen-Cheng

    2018-01-01

    Full Text Available The purpose of New RC project was aimed to reduce the member sections and increase the available space of high rise buildings by using high strength concrete (f’c > 70 MPa and high strength rebars (fy > 685 MPa. Material consumptions and member section sizes can be further reduced owing to the upgrade of strength. However, the nature of brittleness of high strength may also cause early cover spalling and other ductility issues. Addition of steel fibers is an alternative as transverse reinforcement. Highly flowable strain hardening fiber reinforced concrete (HF-SHFRC has excellent workability in the fresh state and exhibits the strain-hardening and multiple cracking characteristics of high performance fiber reinforced cementitious composites (HPFRCC in their hardened state. The objective of this study is to investigate the feasibility of implementing HF-SHFRC in New RC building systems, particularly for beam-column joints as an alternative of transverse reinforcements. Four full-scale exterior beam-column joints, including two specimens with intensive transverse reinforcements and two specimens made of HF-SHFRC without any stirrup, are tested. Test results show that the HF-SHFRC specimens perform as well as specimens with intensive transverse reinforcements regarding failure mode, ductility, energy dissipation and crack width control. Integration of New RC building systems and HF-SHFRC can assuring construction qualities and further diminish labor work and give infrastructure longer service life, and eventually lower the life-cycle cost.

  10. BUTREN-RC an hybrid system for the recharges optimization of nuclear fuels in a BWR

    International Nuclear Information System (INIS)

    Ortiz S, J.J.; Castillo M, J.A.; Valle G, E. del

    2004-01-01

    The obtained results with the hybrid system BUTREN-RC are presented that obtains recharges of nuclear fuel for a BWR type reactor. The system has implemented the methods of optimization heuristic taboo search and neural networks. The optimization it carried out with the technique of taboo search, and the neural networks, previously trained, were used to predict the behavior of the recharges of fuel, in substitution of commercial codes of reactor simulation. The obtained recharges of nuclear fuel correspond to 5 different operation cycles of the Laguna Verde Nuclear Power plant, Veracruz in Mexico. The obtained results were compared with the designs of this cycles. The energy gain with the recharges of fuel proposals is of approximately 4.5% with respect to those of design. The time of compute consumed it was considerably smaller that when a commercial code for reactor simulation is used. (Author)

  11. Development of a relational database for nuclear material (NM) accounting in RC and I Group

    International Nuclear Information System (INIS)

    Yadav, M.B.; Ramakumar, K.L.; Venugopal, V.

    2011-01-01

    A relational database for the nuclear material accounting in RC and I Group has been developed with MYSQL for Back-End and JAVA for Front-End development. Back-End has been developed to avoid any data redundancy, to provide random access of the data and to retrieve the required information from database easily. JAVA Applet and Java Swing components of JAVA programming have been used in the Front-End development. Front-End has been developed to provide data security, data integrity, to generate inventory status report at the end of accounting period, and also to have a quick look of some required information on computer screen. The database has been tested for the data of three quarters of the year 2009. It has been implemented from 1st January, 2010 for the accounting of nuclear material in RC and I Group. (author)

  12. Development of a relational database for nuclear material (NM) accounting in RC and I Group

    Energy Technology Data Exchange (ETDEWEB)

    Yadav, M B; Ramakumar, K L; Venugopal, V [Radioanalytical Chemistry Division, Radiochemistry and Isotope Group, Bhabha Atomic Research Centre, Mumbai (India)

    2011-07-01

    A relational database for the nuclear material accounting in RC and I Group has been developed with MYSQL for Back-End and JAVA for Front-End development. Back-End has been developed to avoid any data redundancy, to provide random access of the data and to retrieve the required information from database easily. JAVA Applet and Java Swing components of JAVA programming have been used in the Front-End development. Front-End has been developed to provide data security, data integrity, to generate inventory status report at the end of accounting period, and also to have a quick look of some required information on computer screen. The database has been tested for the data of three quarters of the year 2009. It has been implemented from 1st January, 2010 for the accounting of nuclear material in RC and I Group. (author)

  13. ALGORITMA RC4 DALAM PROTEKSI TRANSMISI DAN HASIL QUERY UNTUK ORDBMS POSTGRESQL

    Directory of Open Access Journals (Sweden)

    Yuri Ariyanto

    2009-01-01

    Full Text Available In this research will be worked through about how cryptography RC4's algorithm implementation in protection to query result and of query, security by encryption and descryption up to both is in network. Implementation of this research which is build software in client that function access databases that is placed by the side of server. Software that building to have facility for encryption and descryption query result and of query that is sent from client goes to server and. transmission query result and of query can secure its security. Well guaranted transmission security him of query result and of query can be told to succeed if success software can encryption query result and of query which transmission so that in the event of scanning to both, scanning will not understand data content. Conclusion of this research that is woke up software succeed encryption query and result of query which transmission between application of client and of server databases. Abstract in Bahasa Indonesia: Pada penelitian ini dibahas mengenai bagaimana mengimplementasikan algoritma kriptografi RC4 dalam proteksi terhadap query dan hasil query, pengamanan dilakukan dengan cara melakukan enkripsi dan dekripsi selama keduanya berada di dalam jaringan. Pengimplementasian dari penelitian ini yaitu membangun sebuah software yang akan diletakkan di sisi client yang berfungsi mengakses database yang diletakkan di sisi server. Software yang dibangun memiliki fasilitas untuk mengenkripsi dan mendektipsi query dan hasil query yang dikirimkan dari client ke server dan juga sebaliknya. Dengan demikian tramsmisi query dan hasil query dapat terjamin keamanannya.Terjaminnya keamanan transmisi query dan hasil query dapat dikatakan berhasil jika software berhasil mengenkripsi query dan hasil query yang ditransmisikan sehingga apabila terjadi penyadapan terhadap keduanya, penyadap tidak akan mengerti isi data tersebut. Kesimpulan dari penelitian ini yaitu software yang dibangun

  14. Examination of the Five Comparable Component Scores of the Diet Quality Indexes HEI-2005 and RC-DQI Using a Nationally Representative Sample of 2–18 Year Old Children: NHANES 2003–2006

    Directory of Open Access Journals (Sweden)

    Sibylle Kranz

    2013-01-01

    Full Text Available Obesity has been associated with low diet quality and the suboptimal intake of food groups and nutrients. Two composite diet quality measurement tools are appropriate for Americans 2–18 years old: the Healthy Eating Index (HEI 2005 and the Revised Children’s Diet Quality Index (RC-DQI. The five components included in both indexes are fruits, vegetables, total grains, whole grains, and milk/dairy. Component scores ranged from 0 to 5 or 0 to 10 points with lower scores indicating suboptimal intake. To allow direct comparisons, one component was rescaled by dividing it by 2; then, all components ranged from 0 to 5 points. The aim of this study was to directly compare the scoring results of these five components using dietary data from a nationally representative sample of children (NHANES 2003–2006, . Correlation coefficients within and between indexes showed less internal consistency in the HEI; age- and ethnic-group stratified analyses indicated higher sensitivity of the RC-DQI. HEI scoring was likely to dichotomize the population into two groups (those with 0 and those with 5 points, while RC-DQI scores resulted in a larger distribution of scores. The scoring scheme of diet quality indexes for children results in great variation of the outcomes, and researchers must be aware of those effects.

  15. Dynamics model for real time diagnostics of TRIGA RC-1 system

    International Nuclear Information System (INIS)

    Gadomski, A.M.; Nanni, V.; Meo, G.B.

    1986-01-01

    This paper presents dynamics model of TRIGA RC-1 reactor system. The model is dedicated to the real-time early fault detection during a reactor operation in one week exploitation cycle. The algorithms are specially suited for real-time, long time and also accelerated simulations with assumed diagnostic oriented accuracy. The approximations, modular structure, numerical methods and validation are discussed. The elaborated model will be build in the TRIGA Supervisory System and TRIGA Diagnostic Simulator. (author)

  16. Modelling loading and break-up of RC structure due to internal explosion of fragmenting shells

    NARCIS (Netherlands)

    Weerheijm, J.; Stolz, A.; Riedel, W.; Mediavilla Varas, J.

    2012-01-01

    The Klotz Group (KG), an international group of experts on explosion safety, investigates the debris throw hazard associated with the accidental detonation of ammunition in reinforced concrete (RC-) structures. Experiments are combined with engineering models but also with results of advanced

  17. Modelling loading and break-up of RC structure due to internal explosion of fragmenting shells

    NARCIS (Netherlands)

    Weerheijm, J.; Stolz, A.; Riedel, W.; Mediavilla, J.

    2012-01-01

    The Klotz Group (KG), an mtemational group of experts on explosion safety, investigates the debris throw hazard associated with the accidental detonation of ammunition in reinforced concrete (RC-) structures. Experiments are combined with engineering models but also with results of advanced

  18. The Intercomparison of 3D Radiation Codes (I3RC): Showcasing Mathematical and Computational Physics in a Critical Atmospheric Application

    Science.gov (United States)

    Davis, A. B.; Cahalan, R. F.

    2001-05-01

    The Intercomparison of 3D Radiation Codes (I3RC) is an on-going initiative involving an international group of over 30 researchers engaged in the numerical modeling of three-dimensional radiative transfer as applied to clouds. Because of their strong variability and extreme opacity, clouds are indeed a major source of uncertainty in the Earth's local radiation budget (at GCM grid scales). Also 3D effects (at satellite pixel scales) invalidate the standard plane-parallel assumption made in the routine of cloud-property remote sensing at NASA and NOAA. Accordingly, the test-cases used in I3RC are based on inputs and outputs which relate to cloud effects in atmospheric heating rates and in real-world remote sensing geometries. The main objectives of I3RC are to (1) enable participants to improve their models, (2) publish results as a community, (3) archive source code, and (4) educate. We will survey the status of I3RC and its plans for the near future with a special emphasis on the mathematical models and computational approaches. We will also describe some of the prime applications of I3RC's efforts in climate models, cloud-resolving models, and remote-sensing observations of clouds, or that of the surface in their presence. In all these application areas, computational efficiency is the main concern and not accuracy. One of I3RC's main goals is to document the performance of as wide a variety as possible of three-dimensional radiative transfer models for a small but representative number of ``cases.'' However, it is dominated by modelers working at the level of linear transport theory (i.e., they solve the radiative transfer equation) and an overwhelming majority of these participants use slow-but-robust Monte Carlo techniques. This means that only a small portion of the efficiency vs. accuracy vs. flexibility domain is currently populated by I3RC participants. To balance this natural clustering the present authors have organized a systematic outreach towards

  19. A multi-standard active-RC filter with accurate tuning system

    Energy Technology Data Exchange (ETDEWEB)

    Ma Heping; Yuan Fang; Shi Yin [Institute of Semiconductors, Chinese Academy of Sciences, Beijing 100083 (China); Dai, F F, E-mail: hpma@semi.ac.c [Department of Electrical and Computer Engineering, Auburn University, Auburn, AL 36849-5201 (United States)

    2009-09-15

    A low-power, highly linear, multi-standard, active-RC filter with an accurate and novel tuning architecture is presented. It exhibits IEEE 802.11 a/b/g (9.5 MHz) and DVB-H (3 MHz, 4 MHz) application. The filter exploits digitally-controlled polysilicon resistor banks and a phase lock loop type automatic tuning system. The novel and complex automatic frequency calibration scheme provides better than 4 corner frequency accuracy, and it can be powered down after calibration to save power and avoid digital signal interference. The filter achieves OIP3 of 26 dBm and the measured group delay variation of the receiver filter is 50 ns (WLAN mode). Its dissipation is 3.4 mA in RX mode and 2.3 mA (only for one path) in TX mode from a 2.85 V supply. The dissipation of calibration consumes 2 mA. The circuit has been fabricated in a 0.35 {mu}m 47 GHz SiGe BiCMOS technology; the receiver and transmitter filter occupy 0.21 mm{sup 2} and 0.11 mm{sup 2} (calibration circuit excluded), respectively.

  20. Effects of age and parity on mammary gland lesions and progenitor cells in the FVB/N-RC mice.

    Directory of Open Access Journals (Sweden)

    Ahmed Raafat

    Full Text Available The FVB/N mouse strain is extensively used in the development of animal models for breast cancer research. Recently it has been reported that the aging FVB/N mice develop spontaneous mammary lesions and tumors accompanied with abnormalities in the pituitary glands. These observations have a great impact on the mouse models of human breast cancer. We have developed a population of inbred FVB/N mice (designated FVB/N-RC that have been genetically isolated for 20 years. To study the effects of age and parity on abnormalities of the mammary glands of FVB/N-RC mice, twenty-five nulliparous and multiparous (3-4 pregnancies females were euthanized at 16-22 months of age. Examination of the mammary glands did not reveal macroscopic evidence of mammary gland tumors in either aged-nulliparous or multiparous FVB/N-RC mice (0/25. However, histological analysis of the mammary glands showed rare focal nodules of squamous changes in 2 of the aged multiparous mice. Mammary gland hyperplasia was detected in 8% and 71% of the aged-nulliparous and aged-multiparous mice, respectively. Epithelial contents and serum levels of triiodothyronine were significantly higher in the experimental groups than the 14-wk-old control mice. Immuno-histochemical staining of the pituitary gland pars distalis showed no difference in prolactin staining between the control and the aged mice. Tissue transplant and dilution studies showed no effect of age and/or parity on the ability of putative progenitor cells present among the injected mammary cells to repopulate a cleared fat pad and develop a full mammary gland outgrowth. This FVB/N-RC mouse substrain is suitable to develop mouse models for breast cancer.

  1. Overview and evolution of the LeRC PMAD DC test bed

    Science.gov (United States)

    Soeder, James F.; Frye, Robert J.

    1992-01-01

    Since the beginning of the Space Station Freedom Program (SSFP), the Lewis Research Center (LeRC) has been developed electrical power system test beds to support the overall design effort. Through this time, the SSFP has changed the design baseline numerous times, however, the test bed effort has endeavored to track these changes. Beginning in August 1989 with the baseline and an all DC system, a test bed was developed to support the design baseline. The LeRC power measurement and distribution (PMAD) DC test bed and the changes in the restructure are described. The changes included the size reduction of primary power channel and various power processing elements. A substantial reduction was also made in the amount of flight software with the subsequent migration of these functions to ground control centers. The impact of these changes on the design of the power hardware, the controller algorithms, the control software, and a description of their current status is presented. An overview of the testing using the test bed is described, which includes investigation of stability and source impedance, primary and secondary fault protection, and performance of a rotary utility transfer device. Finally, information is presented on the evolution of the test bed to support the verification and operational phases of the SSFP in light of these restructure scrubs.

  2. Loads experiments study on two-story RC box and truncated conical walls

    International Nuclear Information System (INIS)

    Asega, H.; Iizuka, S.; Kurihara, I.; Kubo, T.

    1987-01-01

    The failure modes of the two specimens were the sliding shear failure. The two specimens showed almost equal deformation at the maximum shear strength. The ratio of the flexural deformation in the deformation of the truncated conical was larger than that of the box wall. The ratio of the shear deformation in the deformation of the two-story RC box wall was larger than that of the flexural deformation. (orig./HP)

  3. Dependence of neutron rate production with accelerator beam profile and energy range in an ADS-TRIGA RC1 reactor

    Energy Technology Data Exchange (ETDEWEB)

    Firoozabadi, M.M.; Karimi, J. [Birjand Univ. (Iran, Islamic Republic of). Dept. of Physics; Zangian, M. [Shahid Beheshti Univ., Tehran (Iran, Islamic Republic of). Nuclear Engineering Dept.

    2016-12-15

    Lead, mercury, tantalum and tungsten were used as target material for calculation of spallation processes in an ADS-TRIGA RC1 reactor. The results show that tungsten has the highest neutron production rate. Therefore it was selected as target material for further calculations. The sensitivity of neutron parameters of the ADS reactor core relative to a change of beam profile and proton energy was determined. The core assembly and parameters of the TRIGA RC1 demonstration facility were used for the calculation model. By changing the proton energy from 115 to 1 400 MeV by using the intra-nuclear cascade model of Bertini (INC-Bertini), the quantity of the relative difference in % for energy gain (G) and spallation neutron yield (Y{sub n/p}), increases to 289.99 % and 5199.15 % respectively. These changes also reduce the amount of relative difference for the proton beam current (I{sub p}) and accelerator power (P{sub acc}), 99.81 % and 81.28 % respectively. In addition, the use of a Gaussian distribution instead of a uniform distribution in the accelerator beam profile increases the quantity of relative difference for energy gain (G), net neutron multiplication (M) and spallation neutron yield (Y{sub n/p}), up to 4.93 %, 4.9 % and 5.55 % respectively.

  4. Protecting privacy in a clinical data warehouse.

    Science.gov (United States)

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. © The Author(s) 2014.

  5. Full Scale RC Beam-Column Joints Strengthened with Steel Reinforced Polymer Systems

    Science.gov (United States)

    De Vita, Alessandro; Napoli, Annalisa; Realfonzo, Roberto

    2017-07-01

    This paper presents the results of an experimental campaign performed at the Laboratory of Materials and Structural Testing of the University of Salerno (Italy) in order to investigate the seismic performance of RC beam-column joints strengthened with Steel Reinforced Polymer (SRP) systems. With the aim to represent typical façade frames’ beam-column subassemblies found in existing RC buildings, specimens were provided with two short beam stubs orthogonal to the main beam and were designed with inadequate seismic details. Five members were strengthened by using two different SRP layouts while the remaining ones were used as benchmarks. Once damaged, two specimens were also repaired, retrofitted with SRP and subjected to cyclic test again. The results of cyclic tests performed on SRP strengthened joints are examined through a comparison with the outcomes of the previous experimental program including companion specimens not provided with transverse beam stubs and strengthened by Carbon Fiber Reinforced Polymer (CFRP) systems. In particular, both qualitative and quantitative considerations about the influence of the confining effect provided by the secondary beams on the joint response, the suitability of all the adopted strengthening solutions (SRP/CFRP systems), the performances and the failure modes experienced in the several cases studied are provided.

  6. Quantum key based burst confidentiality in optical burst switched networks.

    Science.gov (United States)

    Balamurugan, A M; Sivasubramanian, A

    2014-01-01

    The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  7. Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks

    Directory of Open Access Journals (Sweden)

    A. M. Balamurugan

    2014-01-01

    Full Text Available The optical burst switching (OBS is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS. This paper deals with employing RC4 (stream cipher to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.

  8. Damage Localization of Severely Damaged RC-Structures Based on Measured Eigenperiods from a Single Response

    DEFF Research Database (Denmark)

    Skjærbæk, P. S.; Nielsen, Søren R.K.; Cakmak, A. S.

    This paper deals with the estimation of the damage location of severely damaged Reinforced Concrete (RC) structures excited by earthquakes. It is assumed that the building is instrumented with a sensor measuring the earthquake acceleration signal at ground surface and a sensor measuring only...

  9. Towards an easy access to Annexin-A5 protein binding block copolymer micelles

    International Nuclear Information System (INIS)

    Schmidt, Vanessa; Giacomelli, Cristiano; Brisson, Alain R.; Borsali, Redouane

    2008-01-01

    The formation of Annexin-A5 decorated (bio-functionalized) nanoparticles is of particular interest in micelle-mediated target drug delivery, in vivo magnetic resonance imaging, and controlled fabrication of biochips. This work describes an easy access to the synthesis and manipulation of block copolymer nano-objects exhibiting Annexin-A5 protein binding ability. Well-defined spherical micelles containing negatively charged phosphonic diacid groups - which are potential binding sites for Annexin-A5 proteins - at their hydrophilic periphery originate from the self-assembly of polystyrene-b-poly(2-phosphatethyl methacrylate-stat-2-hydroxyethyl methacrylate) (PS-b-P(PEMA-stat-HEMA)) amphiphilic macromolecules in aqueous media. PS-b-P(PEMA-stat-HEMA) can be prepared in a three-step phosphorylation/silylation/methanolysis procedure applied to PS-b-PHEMA precursors synthesized via Atom Transfer Radical Polymerization (ATRP). The herein discussed approach allows precise control over micellar dimensions and properties such as core radius (i.e., loading capacity), corona width, and density of phosphate groups at the micelle periphery

  10. FW/Blanket and vacuum vessel for RTO/RC ITER

    International Nuclear Information System (INIS)

    Ioki, K.; Barabash, V.; Cardella, A.; Elio, F.; Iida, H.; Johnson, G.; Kalinin, G.; Miki, N.; Onozuka, M.; Sannazzaro, G.; Utin, Y.; Yamada, M.

    2000-01-01

    The design has progressed on the vacuum vessel and First Wall (FW)/blanket for the Reduced Technical Objective/Reduced Cost (RTO/RC) ITER. The basic functions and structures are the same as for the 1998 ITER design. The design has been improved to achieve, along with the size reduction, ∼50% target reduction of the fabrication cost. The number of blanket modules has been minimized according to smaller dimensions of the machine and a higher payload capacity of the blanket Remote Handling tool. A concept without the back plate has been designed and assessed. The blanket module concept with flat separable FW panels has been developed to reduce the fabrication cost and future radioactive waste

  11. FW/Blanket and vacuum vessel for RTO/RC ITER

    Energy Technology Data Exchange (ETDEWEB)

    Ioki, K. E-mail: iokik@itereu.de; Barabash, V.; Cardella, A.; Elio, F.; Iida, H.; Johnson, G.; Kalinin, G.; Miki, N.; Onozuka, M.; Sannazzaro, G.; Utin, Y.; Yamada, M

    2000-11-01

    The design has progressed on the vacuum vessel and First Wall (FW)/blanket for the Reduced Technical Objective/Reduced Cost (RTO/RC) ITER. The basic functions and structures are the same as for the 1998 ITER design. The design has been improved to achieve, along with the size reduction, {approx}50% target reduction of the fabrication cost. The number of blanket modules has been minimized according to smaller dimensions of the machine and a higher payload capacity of the blanket Remote Handling tool. A concept without the back plate has been designed and assessed. The blanket module concept with flat separable FW panels has been developed to reduce the fabrication cost and future radioactive waste.

  12. SOIL STRUCTURE INTERACTION EFFECTS ON MULTISTOREY R/C STRUCTURES

    Directory of Open Access Journals (Sweden)

    Muberra ESER AYDEMIR

    2013-01-01

    Full Text Available This paper addresses the behavior of multistorey structures considering soil structure interaction under earthquake excitation. For this purpose, sample 3, 6, 9 storey RC frames are designed based on Turkish Seismic Design Code and analyzed in time domain with incremental dynamic analysis. Strength reduction factors are investigated for generated sample plane frames for 64 different earthquake motions recorded on different site conditions such as rock, stiff soil, soft soil and very soft soil. According to the analysis result, strength reduction factors of sample buildings considering soil structure interaction are found to be almost always smaller than design strength reduction factors given in current seismic design codes, which cause an unsafe design and nonconservative design forces.

  13. A higher risk of acute rejection of human kidney allografts can be predicted from the level of CD45RC expressed by the recipients' CD8 T cells.

    Directory of Open Access Journals (Sweden)

    Laurence Ordonez

    Full Text Available Although transplantation is the common treatment for end-stage renal failure, allograft rejection and marked morbidity from the use of immunosuppressive drugs remain important limitations. A major challenge in the field is to identify easy, reliable and noninvasive biomarkers allowing the prediction of deleterious alloreactive immune responses and the tailoring of immunosuppressive therapy in individuals according to the rejection risk. In this study, we first established that the expression of the RC isoform of the CD45 molecule (CD45RC on CD4 and CD8 T cells from healthy individuals identifies functionally distinct alloreactive T cell subsets that behave differently in terms of proliferation and cytokine secretion. We then investigated whether the frequency of the recipients CD45RC T cell subsets before transplantation would predict acute graft rejection in a cohort of 89 patients who had undergone their first kidney transplantation. We showed that patients exhibiting more than 54.7% of CD8 CD45RC(high T cells before transplantation had a 6 fold increased risk of acute kidney graft rejection. In contrast, the proportions of CD4 CD45RC T cells were not predictive. Thus, a higher risk of acute rejection of human kidney allografts can be predicted from the level of CD45RC expressed by the recipients' CD8 T cells.

  14. 3D FE Analysis of RC Beams Externally Strengthened with SRG/SRP Systems

    Directory of Open Access Journals (Sweden)

    Francesco Bencardino

    2016-05-01

    Full Text Available The purpose of this study is to evaluate, through a nonlinear Finite Element (FE analysis, the structural behavior of Reinforced Concrete (RC beams externally strengthened by using Steel Reinforced Grout (SRG and Steel Reinforced Polymer (SRP systems. The parameters taken into account were the external strengthening configuration, with or without U-wrap end anchorages, as well as the strengthening materials. The numerical simulations were carried out by using a three-dimensional (3D FE model. The linear and nonlinear behavior of all materials was modeled by appropriate constitutive laws and the connection between concrete substrate and external reinforcing layer was simulated by means of cohesive surfaces with appropriate bond-slip laws. In order to overcome convergence difficulties, to simulate the quasi-static response of the strengthened RC beams, a dynamic approach was adopted. The numerical results in terms of load-displacement curves, failure modes, and load and strain values at critical stages were validated against some experimental data. As a result, the proposed 3D FE model can be used to predict the structural behavior up to ultimate stage of similar strengthened beams without carrying out experimental tests.

  15. Quasistatic Seismic Damage Indicators for RC Structures from Dissipating Energies in Tangential Subspaces

    Directory of Open Access Journals (Sweden)

    Wilfried B. Krätzig

    2014-01-01

    Full Text Available This paper applies recent research on structural damage description to earthquake-resistant design concepts. Based on the primary design aim of life safety, this work adopts the necessity of additional protection aims for property, installation, and equipment. This requires the definition of damage indicators, which are able to quantify the arising structural damage. As in present design, it applies nonlinear quasistatic (pushover concepts due to code provisions as simplified dynamic design tools. Substituting so nonlinear time-history analyses, seismic low-cycle fatigue of RC structures is approximated in similar manner. The treatment will be embedded into a finite element environment, and the tangential stiffness matrix KT in tangential subspaces then is identified as the most general entry for structural damage information. Its spectra of eigenvalues λi or natural frequencies ωi of the structure serve to derive damage indicators Di, applicable to quasistatic evaluation of seismic damage. Because det KT=0 denotes structural failure, such damage indicators range from virgin situation Di=0 to failure Di=1 and thus correspond with Fema proposals on performance-based seismic design. Finally, the developed concept is checked by reanalyses of two experimentally investigated RC frames.

  16. Effect of CFRP and TRM Strengthening of RC Slabs on Punching Shear Strength

    Directory of Open Access Journals (Sweden)

    Husain Abbas

    Full Text Available Abstract The paper presents experiments involving punching of RC slabs strengthened using externally bonded carbon fiber reinforced polymer (CFRP sheet and textile reinforced mortar (TRM. Twelve RC slab specimens of two concrete grades (39.9 and 63.2 MPa and employing two strengthening schemes (CFRP and TRM were tested. Specimens were supported on two opposite edges. Experimental load-displacement variations show two peak loads in strengthened slabs and one peak followed by a plateau in control. Second peak or the plateau corresponds to the combined action of aggregate interlock and the dowel action of back face rebars and strengthening layers. The dowel action of back face rebars and strengthening layers had no role in ultimate punching load (i.e. first peak. Strengthened slabs showed 9-18% increase in ultimate punching load (i.e. first peak whereas there was significant increase in the second peak load (190-276% for CFRP; 55-136% for TRM and energy absorption (~66% for CFRP and 22-56% for TRM. An analytical model was also developed for predicting the punching shear strength (first and second peaks of strengthened slabs showing good comparison with experiments.

  17. Interim report on intrathoracic radiotherapy of human small-cell lung carcinoma in nude mice with Re-188-RC-160, a radiolabeled somatostatin analogue

    International Nuclear Information System (INIS)

    Zamora, P.O.; Bender, H.; Biersack, H.J.; Knapp, F.F. Jr.

    1995-01-01

    The purpose of this study was to evaluate the therapeutic efficacy of Re-188-RC-160 in experimental models of human small cell lung carcinomas which mimic the clinical presentation. In the experimental model, cells from the human small cell lung carcinoma cell line NCI-H69 cells were inoculated into the thoracic cavity of athymic mice and rats. Subsequently, the biodistribution of Re-188-RC-160 after injection into the pleural cavity, a radiolabeled somatostatin analogue, was monitored as was the effect on the subsequent growth of tumors. The results presented here, and which are a part of a larger series of studies, suggest that Re-188-RC-160 can be effectively used in this animal model to restrict the growth of small cell lung carcinoma in the thoracic cavity

  18. Prediction of RC multi-story construction performance with a new proposed design spectrum approach

    Directory of Open Access Journals (Sweden)

    James Haido

    2016-02-01

    Full Text Available The consideration of novel response spectrum analysis to check the reinforced concrete RC buildings resistance towards the seismic risks in Iraq has not been investigated so far. Due to the increasing of frequent earthquakes with moderate intensity in north of Iraq, caution should be taken into account in building design especially with considering the design codes. Where, there are no specific Iraqi standards of earthquake for building design. Thus, the proposing of new response spectrum relationship matching the properties of Kurdistan region (north of Iraq soil is considered essential with considering of novel stiffness or inertia reduction factors for concrete sections. Present endeavor is devoted to develop new design spectra dynamic analysis of RC multistory building located in Duhok city-Iraq. Influence of proposed concrete section reduction factors on the analysis outcomes has been investigated also. Great role has been observed for introducing of stiffness reduction factors in present seismic analysis represent in magnifying of lateral deformation of building of more than 50%. Proper matching was obtained between current proposed spectrum design outputs and that for other analytical approaches.

  19. Intestinal toxicity of deoxynivalenol is limited by Lactobacillus rhamnosus RC007 in pig jejunum explants.

    Science.gov (United States)

    García, Gisela Romina; Payros, Delphine; Pinton, Philippe; Dogi, Cecilia Ana; Laffitte, Joëlle; Neves, Manon; González Pereyra, María Laura; Cavaglieri, Lilia Renée; Oswald, Isabelle P

    2018-02-01

    Probiotics have been explored to stimulate gut health in weaned pigs, when they started to consume solid diet where mycotoxins could be present. The aim of this study was to evaluate the effect of Lactobacillus rhamnosus RC007 on the intestinal toxicity of deoxynivalenol (DON) in an ex vivo model. Jejunal explants, obtained from 5-week-old crossbred castrated male piglets, were kept as control, exposed for 3 h to 10 μM DON, incubated for 4 h with 10 9 CFU/mL L. rhamnosus, or pre-incubated 1 h with 10 9 L. rhamnosus and exposed to DON. Histological lesions were observed, para- and transcellular intestinal permeability was measured in Ussing chambers. The expression levels of mRNA encoding six inflammatory cytokines (CCL20, IL-10, IL-1β, TNFα, IL-8 and IL-22) were determined by RT-PCR. The expressions of the phosphorylated MAP kinases p42/p44 and p38 were assessed by immunoblotting. Exposure to DON induced histological changes, significantly increased the expression of CCL20, IL-1β, TNFα, IL-8, IL-22 and IL-10, increased the intestinal paracellular permeability and activated MAP kinases. Incubation with L. rhamnosus alone did not have any significant effect. By contrast, the pre-incubation with L. rhamnosus reduced all the effects of DON: the histological alterations, the pro-inflammatory response, the paracellular permeability and the phosphorylation of MAP kinases. Of note, L. rhamnosus did not adsorb DON and only slightly degrade the toxin. In conclusion, L. rhamnosus RC007 is a promising probiotic which, included as feed additive, can decrease the intestinal toxicity of DON.

  20. Gamma radiation-induced mutant of NSIC RC144 with broad-spectrum resistance to bacterial blight

    International Nuclear Information System (INIS)

    Alfonso, A.A.; Avellanoza, E.S.; Miranda, R.T.; Espejo, E.O.; Garcia, N.S.

    2014-01-01

    Mutant lines derived from gamma radiation-treated commercial variety NSIC RC144 were produced and screened for novel resistance to bacterial blight, one of the most serious diseases of rice. Preliminary screening of a bulk M2 population through induced method using race 3 of the pathogen Xanthomonas oryzae pv. oryzae (Xoo) resulted in the selection of 89 resistant plants. Subsequent repeated bacterial blight screenings and generation advance for five seasons resulted in the selection of two highly resistant M7 sister lines whose origin can be traced to a single M2 plant. DNA fingerprinting using 63 genome-wide simple sequence repeat (SSR) markers revealed an identical pattern in these lines. Using the same set of markers, they also exhibited 98% similarity to wild type NSIC RC144 indicating that the resistance is due to mutation and not due to genetic admixture or seed impurity. Two seasons of bacterial blight screening using 14 local isolates representing ten races of Xoo revealed an identical reaction pattern in these lines. The reaction pattern was observed to be unique compared to known patterns in four IRBB isolines (IRBB 4, 5, 7 and 21) with strong resistant reaction to bacterial blight suggesting possible novel resistance. The susceptible reaction in F1 testcrosses using Xoo race 6 and the segregation patterns in two F2 populations that fit with the expected 3 susceptible: 1 resistant ratio (P = 0.4, ns) suggest a single-gene recessive mutation in these lines. These mutants are now being used as resistance donor in the breeding program while further molecular characterization to map and characterize the mutated gene is being pursued

  1. Ultrasound-Guided Single-Injection Infraclavicular Block Versus Ultrasound-Guided Double-Injection Axillary Block: A Noninferiority Randomized Controlled Trial.

    Science.gov (United States)

    Boivin, Ariane; Nadeau, Marie-Josée; Dion, Nicolas; Lévesque, Simon; Nicole, Pierre C; Turgeon, Alexis F

    2016-01-01

    Single-injection ultrasound-guided infraclavicular block is a simple, reliable, and effective technique. A simplified double-injection ultrasound-guided axillary block technique with a high success rate recently has been described. It has the advantage of being performed in a superficial and compressible location, with a potentially improved safety profile. However, its effectiveness in comparison with single-injection infraclavicular block has not been established. We hypothesized that the double-injection ultrasound-guided axillary block would show rates of complete sensory block at 30 minutes noninferior to the single-injection ultrasound-guided infraclavicular block. After approval by our research ethics committee and written informed consent, adults undergoing distal upper arm surgery were randomized to either group I, ultrasound-guided single-injection infraclavicular block, or group A, ultrasound-guided double-injection axillary block. In group I, 30 mL of 1.5% mepivacaine was injected posterior to the axillary artery. In group A, 25 mL of 1.5% mepivacaine was injected posteromedial to the axillary artery, after which 5 mL was injected around the musculocutaneous nerve. Primary outcome was the rate of complete sensory block at 30 minutes. Secondary outcomes were the onset of sensory and motor blocks, surgical success rates, performance times, and incidence of complications. All outcomes were assessed by a blinded investigator. The noninferiority of the double-injection ultrasound-guided axillary block was considered if the limits of the 90% confidence intervals (CIs) were within a 10% margin of the rate of complete sensory block of the infraclavicular block. At 30 minutes, the rate of complete sensory block was 79% in group A (90% CI, 71%-85%) compared with 91% in group I (90% CI, 85%-95%); the upper limit of CI of group A is thus included in the established noninferiority margin of 10%. The rate of complete sensory block was lower in group A (proportion

  2. Variation of over strength factor for mid-rise R.C. moment resisting frames

    International Nuclear Information System (INIS)

    Tasnimi, A. A.; Mahmoodi Sahebi, M.

    2001-01-01

    The over strength of a multi-storey structure (as a multi-degree of freedom system) is one of the parameters playing the evaluation of the behaviour factor. This is an important property when the structure exhibits inelastic behaviour and is described by over strength factor. The over strength factor and strength reduction factor due to ductility are considered in most seismic design codes of practice to reduce the elastic strength demand of the structure. In spite the importance of the over strength, its influence has not yet been quantified. This paper is a part of an investigation from which the first part was published in Amirkabir Journal No.36/Winter 1998, entitled as E stimation of over strength of low-ri sed flexural R.C. frames using nonlinear analysis . This paper investigates the variation of over strength factor for reinforced concrete moment resisting frames, having several stories (5 to 15) with various spans (3 to 5) and located in high seismicity regions using non-linear inelastic analysis. The results indicate that the over strength factor of these systems efforts 25 to 40 percent reduction in the elastic strength demand of such frames

  3. Determinations of tritium levels in urine and blood samples, medical checkups of persons employed at RC Seibersdorf

    International Nuclear Information System (INIS)

    Irlweck, K.; Teherani, D.K.

    1975-07-01

    Tritium determinations in urine and blood samples were performed with a liquid scintillation counter (Tri Carb No. 3375, PACKARD). In urine samples tritiated water (HTO) was measured after separation of organic substances by adsorption with activated charcoal and following distillation to dryness. In some urine and blood samples total Tritium content was determinated by conbustion in a sample Oxidizer (Mod. 306, PACKARD). Detection limits for HTO and total Tritium measurements were 2,5 pCi/ml and 7 or 15 pCi/ml respectively, taking 2 sigma of statistical error of background values. Tritiumconcentrations in daily urine of occupational exposed persons, employed in RC Seibersdorf occurred up to 8 pCi HTO/ml. An arithmetic mean was 3,85+-2,11 pCi/ml from investigations on 16 persons. Tritiumcontent in urine samples of occupational non exposed persons were about the same level up to 10 pCi HTO/ml. An arithmetic mean was 3,70+-2,65 pCi/ml from measurements on 20 persons. Statistical error of single values was sigma=+-1,85 pCi/ml. There was found no significantly higher concentration in urine of occupational exposed persons compared with a group of non exposed ones. Total Tritium content in urine samples seemed to be somewhat higher than HTO concentrations, also for occupational non exposed persons. Tritium levels in blood were notably higher than have to be expected assuming homogeneous distribution of HTO in body fluids. For occupational exposed persons in RC Seibersdorf Tritium concentrations between 26-58 pCi/ml were found. An estimation about Tritium intake based on such results showed no more than 0,5% of maximum permissible intake for occupational exposed persons in the most unfavorable case. For occupational non exposed persons total Tritium levels in blood were only about 10,7+-5,8 pCi/ml (arithmetic mean of measurements on 15 persons). (author)

  4. Combined KHFAC + DC nerve block without onset or reduced nerve conductivity after block

    Science.gov (United States)

    Franke, Manfred; Vrabec, Tina; Wainright, Jesse; Bhadra, Niloy; Bhadra, Narendra; Kilgore, Kevin

    2014-10-01

    Objective. Kilohertz frequency alternating current (KHFAC) waveforms have been shown to provide peripheral nerve conductivity block in many acute and chronic animal models. KHFAC nerve block could be used to address multiple disorders caused by neural over-activity, including blocking pain and spasticity. However, one drawback of KHFAC block is a transient activation of nerve fibers during the initiation of the nerve block, called the onset response. The objective of this study is to evaluate the feasibility of using charge balanced direct current (CBDC) waveforms to temporarily block motor nerve conductivity distally to the KHFAC electrodes to mitigate the block onset-response. Approach. A total of eight animals were used in this study. A set of four animals were used to assess feasibility and reproducibility of a combined KHFAC + CBDC block. A following randomized study, conducted on a second set of four animals, compared the onset response resulting from KHFAC alone and combined KHFAC + CBDC waveforms. To quantify the onset, peak forces and the force-time integral were measured during KHFAC block initiation. Nerve conductivity was monitored throughout the study by comparing muscle twitch forces evoked by supra-maximal stimulation proximal and distal to the block electrodes. Each animal of the randomized study received at least 300 s (range: 318-1563 s) of cumulative dc to investigate the impact of combined KHFAC + CBDC on nerve viability. Main results. The peak onset force was reduced significantly from 20.73 N (range: 18.6-26.5 N) with KHFAC alone to 0.45 N (range: 0.2-0.7 N) with the combined CBDC and KHFAC block waveform (p conductivity was observed after application of the combined KHFAC + CBDC block relative to KHFAC waveforms. Significance. The distal application of CBDC can significantly reduce or even completely prevent the KHFAC onset response without a change in nerve conductivity.

  5. The negative differential resistance characteristics of an RC-IGBT and its equivalent circuit model

    International Nuclear Information System (INIS)

    Zhang Wenliang; Zhu Yangjun; Tian Xiaoli; Lu Shuojin

    2014-01-01

    A simple equivalent circuit model is proposed according to the device structure of reverse conducting insulated gate bipolar transistors (RC-IGBT). Mathematical derivation and circuit simulations indicate that this model can explain the snap-back effect (including primary snap-back effect, secondary snap-back effect, and reverse snap-back effect) and hysteresis effect perfectly. (semiconductor devices)

  6. Bıldırcın ve Ördek Yumurtalarında Maya-Küf ve Total Bakteri Açısından İncelenmesi

    Directory of Open Access Journals (Sweden)

    Işın Var

    2015-02-01

    Full Text Available Bıldırcın yumurtası, besin değeri yönünden tavuk yumurtasından oransal olarak daha zengin kabul edilmektedir. Daha çok salata, pasta, mayonez vb. yapımında yaygın olarak kullanılan ördek yumurtası (Pekin ördeği tavuk yumurtasına göre daha büyük olup, ağırlıkları 70-90 g arasında değişmektedir. Bıldırcın yumurtası son yıllarda özellikle küçük çocuk ve yaşlı beslenmesinde önem kazanmıştır. Bunun yanısıra bazı hastalıkların tedavisi amacıyla da halk arasında oldukça yaygın kullanılmaktadır. Özellikle çiğ olarak tüketilen bıldırcın yumurtaları zaman zaman içerdikleri patojen mikroorganizmalarla tehlikeli olabilmektedirler. Bu çalışmada bıldırcın ve ördek yumurtalarında maya-küf ve total bakteri aranmıştır. Bıldırcın ve ördek yumurtalarının özellikle kabuğunda hem total bakteri hem de maya-küf bulunmuştur. Bıldırcın yumurtasının akı ve sarısında ise zaman zaman kontaminasyonla karşılaşılmıştır.

  7. Effect of web openings on the structural behavior of RC beams subjected to pure torsion

    Directory of Open Access Journals (Sweden)

    Abdo Taha

    2017-01-01

    Full Text Available In the construction of modern buildings, the presence of openings became a necessity nowadays in order to accommodate the many pipes and ducts required for the different services. On the other hand, the presence of these openings in RC beams affects their structural behavior. One important behavior that needs further study would be torsion. Currently, there are no guide lines available to analyze or design RC beams with web openings under pure torsion. Thus, the main objective of this research is to investigate the behavior of simply supported RC beams with openings subjected to pure torsion. In the first part of this paper, an experimental study is conducted on seven beams subjected to pure torsion loading in order to investigate the effect of the number of openings, the spacing between stirrups, and beam depth. All beams have a constant clear span length of 1800 mm and a constant beam width of 150 mm. The beams have varying opening number and stirrups arrangement as well as varying beam depth in order to investigate the effect of these parameters on the behavior of the beams. Systematic measurements such as the cracking torque, the ultimate torque, the angle of rotation of the beam at cracking, and the angle of rotation of the beam at the ultimate load are conducted for further understanding of the beam behavior under torsion. In the second part of the paper, the experimental results are compared with the numerical results obtained using the non-linear finite element analysis program, ANSYS. Good agreement between the experimental and numerical results is found.

  8. Ankle Block vs Single-Shot Popliteal Fossa Block as Primary Anesthesia for Forefoot Operative Procedures: Prospective, Randomized Comparison.

    Science.gov (United States)

    Schipper, Oliver N; Hunt, Kenneth J; Anderson, Robert B; Davis, W Hodges; Jones, Carroll P; Cohen, Bruce E

    2017-11-01

    Postoperative pain is often difficult to control with oral medications, requiring large doses of opioid analgesia. Regional anesthesia may be used for primary anesthesia, reducing the need for general anesthetic and postoperative pain medication requirements in the immediate postoperative period. The purpose of this study was to compare the analgesic effects of an ankle block (AB) to a single-shot popliteal fossa block (PFB) for patients undergoing orthopedic forefoot procedures. All patients having elective outpatient orthopedic forefoot procedures were invited to participate in the study. Patients were prospectively randomized to receive either an ultrasound-guided AB or PFB by a board-certified anesthesiologist prior to their procedure. Intraoperative conversion to general anesthesia and postanesthesia care unit (PACU) opioid requirements were recorded. Postoperative pain was assessed using the visual analog scale (VAS) at regular time intervals until 8 am on postoperative day (POD) 2. Patients rated the effectiveness of the block on a 1 to 5 scale, with 5 being very effective. A total of 167 patients participated in the study with 88 patients (53%) receiving an AB and 79 (47%) receiving a single-shot PFB. There was no significant difference in the rate of conversion to general anesthesia between the 2 groups (13.6% [12/88] AB vs 12.7% [10/79] PFB). PACU morphine requirements and doses were significantly reduced in the PFB group ( P = .004) when compared to the AB group. The VAS was also significantly lower for the PFB patients at 10 pm on POD 0 (4.6 vs 1.6, P block site pain and/or erythema (AB 6.9% [6/88] vs PFB 5.1% [4/79], P = .44). The analgesic effect of the PFB lasted significantly longer when compared to the ankle block (AB 14.5 hours vs PFB 20.9 hours, P block between the 2 groups, with both blocks being highly effective (AB 4.79/5 vs PFB 4.82/5, P = .68). Regional anesthesia was a safe and reliable adjunct to perioperative pain management and highly

  9. Right bundle branch block

    DEFF Research Database (Denmark)

    Bussink, Barbara E; Holst, Anders Gaarsdal; Jespersen, Lasse

    2013-01-01

    AimsTo determine the prevalence, predictors of newly acquired, and the prognostic value of right bundle branch block (RBBB) and incomplete RBBB (IRBBB) on a resting 12-lead electrocardiogram in men and women from the general population.Methods and resultsWe followed 18 441 participants included...... in the Copenhagen City Heart Study examined in 1976-2003 free from previous myocardial infarction (MI), chronic heart failure, and left bundle branch block through registry linkage until 2009 for all-cause mortality and cardiovascular outcomes. The prevalence of RBBB/IRBBB was higher in men (1.4%/4.7% in men vs. 0.......5%/2.3% in women, P block was associated with significantly...

  10. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  11. Chaotic Image Encryption Algorithm Based on Circulant Operation

    Directory of Open Access Journals (Sweden)

    Xiaoling Huang

    2013-01-01

    Full Text Available A novel chaotic image encryption scheme based on the time-delay Lorenz system is presented in this paper with the description of Circulant matrix. Making use of the chaotic sequence generated by the time-delay Lorenz system, the pixel permutation is carried out in diagonal and antidiagonal directions according to the first and second components. Then, a pseudorandom chaotic sequence is generated again from time-delay Lorenz system using all components. Modular operation is further employed for diffusion by blocks, in which the control parameter is generated depending on the plain-image. Numerical experiments show that the proposed scheme possesses the properties of a large key space to resist brute-force attack, sensitive dependence on secret keys, uniform distribution of gray values in the cipher-image, and zero correlation between two adjacent cipher-image pixels. Therefore, it can be adopted as an effective and fast image encryption algorithm.

  12. Developing of Library for Proofs of Data Possession in Charm

    Science.gov (United States)

    2013-06-01

    INTENTIONALLY LEFT BLANK x LIST OF ACRONYMS AND ABBREVIATIONS API Application Programmer Interface DTP Datatype -preserving Encryption FedRAMP U.S...proposed block-cipher mode for Datatype -Preserving Encryption (DTP) uses the Knuth Shuffle in one of its steps [19]. It may be advantageous to...http://www.clustal.org/omega/clustalo-api/util_8c.html. [19] U. T. Mattsson, “Format-controlling encryption using datatype -preserving encryption

  13. From Higher-Order Differentials to Polytopic Cryptyanalysis

    DEFF Research Database (Denmark)

    Tiessen, Tyge

    2017-01-01

    Polytopic cryptanalysis was introduced at EUROCRYPT 2016 as a cryptanalytic technique for low-data-complexity attacks on block ciphers. In this paper, we give an account of how the technique was developed, quickly go over the basic ideas and techniques of polytopic cryptanalysis, look into how...... the technique differs from previously existing cryptographic techniques, and discuss whether the attack angle can be useful for developing improved cryptanalytic techniques....

  14. Effect of the Fiber Type and Axial Stiffness of FRCM on the Flexural Strengthening of RC Beams

    Directory of Open Access Journals (Sweden)

    Abdulla Jabr

    2017-01-01

    Full Text Available The use of externally-bonded fiber-reinforced polymer (FRP sheets has been successfully used in the repair and strengthening of both the shear and flexural capacities of reinforced concrete (RC beams, slabs and columns since the 1990s. However, the externally-bonded FRP reinforcements still present many disadvantages, such as poor performance in elevated temperature and fire, lack of permeability and strength degradation when exposed to ultraviolet radiation. To remedy such drawbacks, the fiber-/fabric-reinforced cementitious matrix (FRCM has been recently introduced. The FRCM system consists of a fiber mesh or grid embedded in a cementitious bonding material. The present research investigates the flexural strengthening of reinforced concrete (RC beams with FRCM. The experimental testing included eight large-scale concrete beams, 150 mm × 250 mm × 2400 mm, internally reinforced with steel bars and strengthened in flexure with FRCM. The investigated parameters were the internal steel reinforcement ratio and the FRCM systems. Two steel reinforcement ratios of 0.18 and 0.36 of the balanced reinforcement ratio, as well as three FRCM systems using glass, carbon and PBO fibers were investigated. Test results are presented in terms of load-deflection, load-strain and load-crack width relationships. The test results indicated that the PBO FRCM significantly increased the ultimate capacity of the strengthened RC beams with both low and moderate internal reinforcement ratios compared to the glass and carbon FRCM.

  15. A new 4π(LS)-γ coincidence counter at NCBJ RC POLATOM with TDCR detector in the beta channel.

    Science.gov (United States)

    Ziemek, T; Jęczmieniowski, A; Cacko, D; Broda, R; Lech, E

    2016-03-01

    A new 4π(LS)-γ coincidence system (TDCRG) was built at the NCBJ RC POLATOM. The counter consists of a TDCR detector in the beta channel and scintillation detector with NaI(Tl) crystal in the gamma channel. The system is equipped with a digital board with FPGA, which records and analyses coincidences in the TDCR detector and coincidences between the beta and gamma channels. The characteristics of the system and a scheme of the FPGA implementation with behavioral simulation are given. The TDCRG counter was validated by activity measurements on (14)C and (60)Co solutions standardized in RC POLATOM using previously validated methods. Copyright © 2015 Elsevier Ltd. All rights reserved.

  16. Cryptanalysis of C2

    DEFF Research Database (Denmark)

    Borghoff, Julia; Knudsen, Lars Ramkilde; Leander, Gregor

    2009-01-01

    We present several attacks on the block cipher C2, which is used for encrypting DVD Audio discs and Secure Digital cards. C2 has a 56 bit key and a secret 8 to 8 bit S-box. We show that if the attacker is allowed to choose the key, the S-box can be recovered in 2^24 C2 encryptions. Attacking the 56...... bit key for a known S-box can be done in complexity 2^48. Finally, a C2 implementation with a 8 to 8 bit secret S-box (equivalent to 2048 secret bits) and a 56 bit secret key can be attacked in 2^53.5 C2 encryptions on average....

  17. Simplified unified analysis of switched-RC passive mixers, samplers, and N -Path filters using the adjoint network

    NARCIS (Netherlands)

    Pavan, Shanthi; Klumperink, Eric A.M.

    2017-01-01

    Recent innovations in software defined CMOS radio transceiver architectures heavily rely on high linearity switched-RC sampler and passive-mixer circuits, driven by digitally programmable multiphase clocks. Although seemingly simple, the frequency domain analysis of these linear periodically time

  18. A sum-over-paths algorithm for third-order impulse-response moment extraction within RC IC-interconnect networks

    Science.gov (United States)

    Wojcik, E. A.; Ni, D.; Lam, T. M.; Le Coz, Y. L.

    2015-07-01

    We have created the first stochastic SoP (Sum-over-Paths) algorithm to extract third-order impulse-response (IR) moment within RC IC interconnects. It employs a newly discovered Feynman SoP Postulate. Importantly, our algorithm maintains computational efficiency and full parallelism. Our approach begins with generation of s-domain nodal-voltage equations. We then perform a Taylor-series expansion of the circuit transfer function. These expansions yield transition diagrams involving mathematical coupling constants, or weight factors, in integral powers of complex frequency s. Our SoP Postulate enables stochastic evaluation of path sums within the circuit transition diagram to order s3-corresponding to the order of IR moment (m3) we seek here. We furnish, for the first time, an informal algebraic proof independently validating our SoP Postulate and algorithm. We list, as well, detailed procedural steps, suitable for coding, that define an efficient stochastic algorithm for m3 IR extraction. Origins of the algorithm's statistical "capacitor-number cubed" correction and "double-counting" weight factors are explained, for completeness. Our algorithm was coded and successfully tested against exact analytical solutions for 3-, 5-, and 10-stage RC lines. We achieved better than 0.65% 1-σ error convergence, after only 10K statistical samples, in less than 1 s of 2-GHz Pentium® execution time. These results continue to suggest that stochastic SoP algorithms may find useful application in circuit analysis of massively coupled networks, such as those encountered in high-end digital IC-interconnect CAD.

  19. Interaction between corrosion crack width and steel loss in RC beams corroded under load

    International Nuclear Information System (INIS)

    Malumbela, Goitseone; Alexander, Mark; Moyo, Pilate

    2010-01-01

    This paper presents results and discussions on an experimental study conducted to relate the rate of widening of corrosion cracks with the pattern of corrosion cracks as well as the level of steel corrosion for RC beams (153 x 254 x 3000 mm) that were corroded whilst subjected to varying levels of sustained loads. Steel corrosion was limited to the tensile reinforcement and to a length of 700 mm at the centre of the beams. The rate of widening of corrosion cracks as well as strains on uncracked faces of RC beams was constantly monitored during the corrosion process, along the corrosion region and along other potential cracking faces of beams using a demec gauge. The distribution of the gravimetric mass loss of steel along the corrosion region was measured at the end of the corrosion process. The results obtained showed that: the rate of widening of each corrosion crack is dependent on the overall pattern of the cracks whilst the rate of corrosion is independent of the pattern of corrosion cracks. A mass loss of steel of 1% was found to induce a corrosion crack width of about 0.04 mm.

  20. Effect of URM infills on seismic vulnerability of Indian code designed RC frame buildings

    Science.gov (United States)

    Haldar, Putul; Singh, Yogendra; Paul, D. K.

    2012-03-01

    Unreinforced Masonry (URM) is the most common partitioning material in framed buildings in India and many other countries. Although it is well-known that under lateral loading the behavior and modes of failure of the frame buildings change significantly due to infill-frame interaction, the general design practice is to treat infills as nonstructural elements and their stiffness, strength and interaction with the frame is often ignored, primarily because of difficulties in simulation and lack of modeling guidelines in design codes. The Indian Standard, like many other national codes, does not provide explicit insight into the anticipated performance and associated vulnerability of infilled frames. This paper presents an analytical study on the seismic performance and fragility analysis of Indian code-designed RC frame buildings with and without URM infills. Infills are modeled as diagonal struts as per ASCE 41 guidelines and various modes of failure are considered. HAZUS methodology along with nonlinear static analysis is used to compare the seismic vulnerability of bare and infilled frames. The comparative study suggests that URM infills result in a significant increase in the seismic vulnerability of RC frames and their effect needs to be properly incorporated in design codes.

  1. Analysis of Block OMP using Block RIP

    OpenAIRE

    Wang, Jun; Li, Gang; Zhang, Hao; Wang, Xiqin

    2011-01-01

    Orthogonal matching pursuit (OMP) is a canonical greedy algorithm for sparse signal reconstruction. When the signal of interest is block sparse, i.e., it has nonzero coefficients occurring in clusters, the block version of OMP algorithm (i.e., Block OMP) outperforms the conventional OMP. In this paper, we demonstrate that a new notion of block restricted isometry property (Block RIP), which is less stringent than standard restricted isometry property (RIP), can be used for a very straightforw...

  2. Experimental investigations into the shear behavior of self-compacting RC beams with and without shear reinforcement

    Directory of Open Access Journals (Sweden)

    Ammar N. HANOON

    2014-12-01

    Full Text Available Self-compacting concrete (SCC is a new generation of high-performance concrete, known for its excellent deformability and high resistance to segregation and bleeding. Nonetheless, SCC may be incapable of resisting shear because the shear resistance mechanisms of this concrete are uncertain, especially the aggregate interlock mechanism. This uncertainty is attributed to the fact that SCC contains a smaller amount of coarse aggregates than normal concrete (NC does. This study focuses on the shear strength of self-compacting reinforced concrete (RC beams with and without shear reinforcement. A total of 16 RC beam specimens was manufactured and tested in terms of shear span-to-depth ratio and flexural and shear reinforcement ratio. The test results were compared with those of the shear design equations developed by ACI, BS, CAN and NZ codes. Results show that an increase in web reinforcement enhanced cracking strength and ultimate load. Shear-tension failure was the control failure in all tested beams.

  3. Modal Identification of a Time-Invariant 6-Storey Model Test RC-Frame from Free Decay Tests using Multi-Variate Models

    DEFF Research Database (Denmark)

    Skjærbæk, P. S.; Nielsen, Søren R. K.; Kirkegaard, Poul Henning

    1997-01-01

    in the comparison. The data investigated are sampled from a laboratory model of a plane 6-storey, 2-bay RC-frame. The laboratory model is excited at the top storey where two different types of excitation where considered. In the first case the structure was excited in the first mode and in the second case......The scope of the paper is to apply multi-variate time-domain models for identification of eginfrequencies and mode shapes of a time- invariant model test Reinforced Concrete (RC) frame from measured decays. The frequencies and mode shapes of interest are the two lowest ones since they are normally...

  4. Modal Identification of a Time-Invariant 6-Storey Model Test RC-Frame from Free Decay Tests using Multi-Variate Models

    DEFF Research Database (Denmark)

    Skjærbæk, P. S.; Nielsen, Søren R. K.; Kirkegaard, Poul Henning

    in the comparison. The data investigated are sampled from a laboratory model of a plane 6-storey, 2-bay RC-frame. The laboratory model is excited at the top storey where two different types of excitation where considered. In the first case the structure was excited in the first mode and in the second case......The scope of the paper is to apply multi-variate time-domain models for identification of eginfrequencies and mode shapes of a time- invariant model test Reinforced Concrete (RC) frame from measured decays. The frequencies and mode shapes of interest are the two lowest ones since they are normally...

  5. Structure of malaria invasion protein RH5 with erythrocyte basigin and blocking antibodies.

    Science.gov (United States)

    Wright, Katherine E; Hjerrild, Kathryn A; Bartlett, Jonathan; Douglas, Alexander D; Jin, Jing; Brown, Rebecca E; Illingworth, Joseph J; Ashfield, Rebecca; Clemmensen, Stine B; de Jongh, Willem A; Draper, Simon J; Higgins, Matthew K

    2014-11-20

    Invasion of host erythrocytes is essential to the life cycle of Plasmodium parasites and development of the pathology of malaria. The stages of erythrocyte invasion, including initial contact, apical reorientation, junction formation, and active invagination, are directed by coordinated release of specialized apical organelles and their parasite protein contents. Among these proteins, and central to invasion by all species, are two parasite protein families, the reticulocyte-binding protein homologue (RH) and erythrocyte-binding like proteins, which mediate host-parasite interactions. RH5 from Plasmodium falciparum (PfRH5) is the only member of either family demonstrated to be necessary for erythrocyte invasion in all tested strains, through its interaction with the erythrocyte surface protein basigin (also known as CD147 and EMMPRIN). Antibodies targeting PfRH5 or basigin efficiently block parasite invasion in vitro, making PfRH5 an excellent vaccine candidate. Here we present crystal structures of PfRH5 in complex with basigin and two distinct inhibitory antibodies. PfRH5 adopts a novel fold in which two three-helical bundles come together in a kite-like architecture, presenting binding sites for basigin and inhibitory antibodies at one tip. This provides the first structural insight into erythrocyte binding by the Plasmodium RH protein family and identifies novel inhibitory epitopes to guide design of a new generation of vaccines against the blood-stage parasite.

  6. Shear Resistance Capacity of Interface of Plate-Studs Connection between CFST Column and RC Beam

    Directory of Open Access Journals (Sweden)

    Qianqian Wang

    2017-01-01

    Full Text Available The combination of a concrete-filled steel tube (CFST column and reinforced concrete (RC beam produces a composite structural system that affords good structural performance, functionality, and workability. The effective transmission of moments and shear forces from the beam to the column is key to the full exploitation of the structural performance. The studs of the composite beam transfer the interfacial shear force between the steel beam and the concrete slab, with the web bearing most of the vertical shear force of the steel beam. In this study, the studs and vertical steel plate were welded to facilitate the transfer of the interfacial shear force between the RC beam and CFST column. Six groups of a total of 18 specimens were used to investigate the shear transfer mechanism and failure mode of the plate-studs connection, which was confirmed to effectively transmit the shear forces between the beam and column. The results of theoretical calculations were also observed to be in good agreement with the experimental measurements.

  7. 31 CFR 595.301 - Blocked account; blocked property.

    Science.gov (United States)

    2010-07-01

    ... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM SANCTIONS REGULATIONS General Definitions § 595.301 Blocked account; blocked property. The terms blocked account and blocked...

  8. Susceptibility of the MMPI-2 Clinical, Restructured Clinical (RC), and Content Scales to Overreporting and Underreporting

    Science.gov (United States)

    Sellbom, Martin; Ben-Porath, Yossef S.; Graham, John R.; Arbisi, Paul A.; Bagby, R. Michael

    2005-01-01

    The authors examined and compared the susceptibility of three Minnesota Multiphasic Personality Inventory-2 (MMPI-2) scale sets (Clinical, Restructured Clinical [RC], and Content) to over- and underreporting using five analog samples. Two samples of 85 and 191 undergraduate students, respectively, took the MMPI-2 under underreporting versus…

  9. The translational blocking of α5 and α6 integrin subunits affects migration and invasion, and increases sensitivity to carboplatin of SKOV-3 ovarian cancer cell line

    Energy Technology Data Exchange (ETDEWEB)

    Villegas-Pineda, Julio César, E-mail: jcvillegas@cinvestav.mx; Toledo-Leyva, Alfredo, E-mail: toledo_leyva@hotmail.com; Osorio-Trujillo, Juan Carlos, E-mail: clostrujillo2@yahoo.com.mx; Hernández-Ramírez, Verónica Ivonne, E-mail: arturomvi@hotmail.com; Talamás-Rohana, Patricia, E-mail: ptr@cinvestav.mx

    2017-02-15

    Epithelial ovarian cancer is the most lethal gynecologic malignancy. Integrins, overexpressed in cancer, are involved in various processes that favor the development of the disease. This study focused on determining the degree of involvement of α5, α6 and β3 integrin subunits in the establishment/development of epithelial ovarian cancer (EOC), such as proliferation, migration, invasion, and response to carboplatin. The translation of the α5, α6 and β3 integrins was blocked using morpholines, generating morphant cells for these proteins, which were corroborated by immunofluorescence assays. WST-1 proliferation assay showed that silencing of α5, α6, and β3 integrins does not affect the survival of morphants. Wound healing and transwell chamber assays showed that blocking α5 and α6 integrins decrease, in lesser and greater level respectively, the migratory and the invasive capacity of SKOV-3 cells. Finally, blocking α5 and α6 integrins partially sensitized the cells response to carboplatin, while blocking integrin β3 generated resistance to this drug. Statistical analyses were performed with the GraphPad Prism 5.0 software employing one way and two-way ANOVA tests; data are shown as average±SD. Results suggest that α5 and α6 integrins could become good candidates for chemotherapy targets in EOC.

  10. A novel method for one-way hash function construction based on spatiotemporal chaos

    Energy Technology Data Exchange (ETDEWEB)

    Ren Haijun [College of Software Engineering, Chongqing University, Chongqing 400044 (China); State Key Laboratory of Power Transmission Equipment and System Security and New Technology, Chongqing University, Chongqing 400044 (China)], E-mail: jhren@cqu.edu.cn; Wang Yong; Xie Qing [Key Laboratory of Electronic Commerce and Logistics of Chongqing, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China); Yang Huaqian [Department of Computer and Modern Education Technology, Chongqing Education of College, Chongqing 400067 (China)

    2009-11-30

    A novel hash algorithm based on a spatiotemporal chaos is proposed. The original message is first padded with zeros if needed. Then it is divided into a number of blocks each contains 32 bytes. In the hashing process, each block is partitioned into eight 32-bit values and input into the spatiotemporal chaotic system. Then, after iterating the system for four times, the next block is processed by the same way. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. The hash value is obtained from the final state value of the spatiotemporal chaotic system. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high efficiency, as required by practical keyed hash functions.

  11. A novel method for one-way hash function construction based on spatiotemporal chaos

    International Nuclear Information System (INIS)

    Ren Haijun; Wang Yong; Xie Qing; Yang Huaqian

    2009-01-01

    A novel hash algorithm based on a spatiotemporal chaos is proposed. The original message is first padded with zeros if needed. Then it is divided into a number of blocks each contains 32 bytes. In the hashing process, each block is partitioned into eight 32-bit values and input into the spatiotemporal chaotic system. Then, after iterating the system for four times, the next block is processed by the same way. To enhance the confusion and diffusion effect, the cipher block chaining (CBC) mode is adopted in the algorithm. The hash value is obtained from the final state value of the spatiotemporal chaotic system. Theoretic analyses and numerical simulations both show that the proposed hash algorithm possesses good statistical properties, strong collision resistance and high efficiency, as required by practical keyed hash functions.

  12. Sociální vztahy a postoje v ženském ragbyovém týmu RC Tatra Smíchov

    OpenAIRE

    Kadavá, Tereza

    2014-01-01

    Title: Social Relationships and Attitudes in Women's RC Tatra Smichov Rugby Team Objectives: The main objective of this thesis is to analyze social relations and attitudes in the women's RC Tatra Smichov rugby team and to create the profiles of the players. The analysis should help the new coach to get to know the players well, focusing mainly on their career, ambition, motivation, and feelings during trainings and matches. At the same time, it should shed light on how they perceive themselve...

  13. Design and construction of a cable-stayed composite girder bridge with precast RC-slabs; Purekyasuto shohan gosei keta shachokoyo no sekkei to seko

    Energy Technology Data Exchange (ETDEWEB)

    Maeda, K. [Tokyo Metropolitan Univ. (Japan). Faculty of Technology; Shimura, T.; Tachibana, Y.; Echigo, S. [Kawada Industries Inc., Tokyo (Japan)

    1995-09-20

    A report on design and execution of cable-stayed composite girder bridge with precast RC-slabs constructed first in Japan though in small scale was described. This bridge adopted steel slabs relatively low in slab height for main slab and with two boxes slab section, and was designed at an aim of being more economic and shorter in its working term in comparison with steel girder slab type, on a base of the design in a region allowable with the existing design standards. This bridge is mainly in accordance with the regulation on continuous bridge in the prescription of road bridge, and is designed for normal RC-girder selecting between girder supports to direction normal to bridge axis as usual without using specially strong concrete to the girder. And, in order to fill with the regulation on allowable tensile stress on considering effects of creep and drying shrinkage, a method adding prestress to the slabs was adopted. Furthermore, a loop-like overlap joint for cable joint for the precast girders, expansion concrete for joint portion to compose the girder with the steel slab and so forth were adopted. 12 refs., 22 figs., 5 tabs.

  14. Nerve Blocks

    Science.gov (United States)

    ... News Physician Resources Professions Site Index A-Z Nerve Blocks A nerve block is an injection to ... the limitations of Nerve Block? What is a Nerve Block? A nerve block is an anesthetic and/ ...

  15. Synthesis and characterization of a star shaped supramolecular block copolymer

    NARCIS (Netherlands)

    Meier, M.A.R.; Schubert, U.S.

    2004-01-01

    A novel 5-arm star shaped block copolymer consisting of an poly(ethylene glycol) inner block and an poly(e-caprolactone) outer block was prepd. by utilizing an 5-arm star shaped poly(ethylene glycol) macroinitiator for the controlled ring opening polymn. of e-caprolactone. Furthermore, the resulting

  16. PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications: Extended Abstract

    DEFF Research Database (Denmark)

    Borghoff, J.; Canteaut, Anne Michele; Guneysu, T.

    2012-01-01

    to be iterative with very similar round functions disappears, an observation that increases the design space for the algorithm. An important further requirement is that realizing decryption and encryption results in minimum additional costs. PRINCE is designed in such a way that the overhead for decryption on top...

  17. An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers

    DEFF Research Database (Denmark)

    Albrecht, Martin Roland; Leander, Gregor

    2012-01-01

    We present a framework that unifies several standard differential techniques. This unified view allows us to consider many, potentially all, output differences for a given input difference and to combine the information derived from them in an optimal way. We then propose a new attack that implic......We present a framework that unifies several standard differential techniques. This unified view allows us to consider many, potentially all, output differences for a given input difference and to combine the information derived from them in an optimal way. We then propose a new attack...

  18. Compound La[B5O8(OH)2] with a new type of pentaborate layer based on the 5[3T + 2Δ] block: Topology-symmetry analysis and the position in the structural system

    International Nuclear Information System (INIS)

    Ivanova, A. G.; Belokoneva, E. L.; Dimitrova, O. V.; Mochenova, N. N.

    2006-01-01

    Crystals of a new rare-earth borate, LaB 5 O 8 (OH) 2 (space group P2 1 /n), are synthesized under hydrothermal conditions. The crystal structure is determined by the heavy-atom method without prior knowledge of the chemical formula. The radical anion is a layer composed of pentaborate blocks 5[3T + 2Δ]. The topological and symmetric patterns of their condensation differ from those observed in all known layered pentaborates containing the same block. The building blocks are shared by vertices of tetrahedra to form chains. These chains are joined into a corrugated layer in such a way that one of the BO 3 triangles of the building block is terminal and the layer itself is denser than those previously revealed in all other borates. In contrast to the majority of layer borates, the new La borate does not contain water molecules, because it crystallizes from more concentrated solutions. The La atoms are located inside the walls of the hollows of corrugated layers, thus centering the holes of the layers

  19. Evaluation equivalent pulse of pulse-like ground motion to estimate the response of RC moment-resisting frames

    Directory of Open Access Journals (Sweden)

    Seyed Rohollah Hosseini Vaez

    2017-08-01

    Full Text Available In this study the ability of equivalent pulse extracted by a mathematical model from pulse-like ground motion is investigated in order to estimate the response of RC moment-resisting frames. By examining the mathematical model, it is obvious that the model-based elastic response spectra are compatible with the actual pulse-like record. Also, the model simulates the long-period portion of actual pulse-like records by a high level of precision. The results indicate that the model adequately simulates the components of time histories. In order to investigate the ability of equivalent pulse of pulse-like ground motion in estimating the response of RC moment-resisting frames, five frame models including 3, 6, 9, 12 and 15 stories analyzed under actual record and simulated one. The results of the base shear demand, the maximum value of the inter-story drift and the distribution of inter-story drift along the height of the structures in three levels of design ductility is investigated. According to the results of this study, the equivalent pulses can predict accurately the response of regular RC moment-resisting frames when the fundamental period of the structure is equal to or greater than the equivalent pulse of the record. For the ground motion with high-frequency content the difference is high; but with increasing the number of stories and approaching pulse period to the fundamental period of the structure and increasing the level of design ductility of structure, more accurately predict the structural response.

  20. Investigation of the Practical Possibility of Solving Problems on Generalized Cellular Automata Associated with Cryptanalysis by Mean Algebraic Methods

    Directory of Open Access Journals (Sweden)

    P. G. Klyucharev

    2017-01-01

    problems was possible. Using a Python language program, random 6-regular Ramanujan graphs with the appropriate number of vertices were generated. For each graph, was generated a system of equations that describes the k steps of the corresponding generalized cellular automaton. For the systems obtained, the Grebner bases were constructed using the Fouger algorithm F4, the Magma system v2.21-5, and the Polybori 0.8.3 library. The experiments were carried out both for the inversion task and for the key recovery task. We used a 16-core 16 GB RAM Intel Xeon E5-2690 computer, OS Linux.The article presents the results of experiments that confirm that the algebraic cryptanalysis of block ciphers and hash functions based on generalized cellular automata with the number of cells used in practice (of the order of several hundred or more available tool based on the use of Gröbner bases, is impossible.

  1. Mesd Is a Universal Inhibitor of Wnt Co-receptor LRP5/6 and Blocks Wnt/β-catenin Signaling in Cancer Cells†

    Science.gov (United States)

    Lu, Wenyan; Liu, Chia-Chen; Thottassery, Jaideep V.; Bu, Guojun; Li, Yonghe

    2010-01-01

    Mesd is a specialized chaperone for the low-density lipoprotein receptor-related protein-5 (LRP5) and LRP6. In our previous studies, we found that Mesd binds to mature LRP6 on the cell surface and blocks the binding of Wnt antagonist Dickkopf-1(Dkk1) to LRP6. Herein, we demonstrated that Mesd also binds to LRP5 with a high affinity, and is a universal inhibitor of LRP5/6 ligands. Mesd not only blocks Wnt antagonists Dkk1 and Sclerostin binding to LRP5/6, but also inhibits Wnt3A and Rspondin1-induced Wnt/β-catenin signaling in LRP5/6 expressing cells. We also found that Mesd, Dkk1 and Sclerostin compete with one another for binding to LRP5 and LRP6 at the cell surface. More importantly, we demonstrated that Mesd is able to suppress LRP6 phosphorylation and Wnt/β-catenin signaling in prostate cancer PC-3 cells, and inhibits PC-3 cell proliferation. Our results indicate that recombinant Mesd protein is a useful tool for studying Wnt/β-catenin signaling on the cell surface, and has a potential therapeutic role in Wnt-dependent cancers. PMID:20446724

  2. Testing block subdivision algorithms on block designs

    Science.gov (United States)

    Wiseman, Natalie; Patterson, Zachary

    2016-01-01

    Integrated land use-transportation models predict future transportation demand taking into account how households and firms arrange themselves partly as a function of the transportation system. Recent integrated models require parcels as inputs and produce household and employment predictions at the parcel scale. Block subdivision algorithms automatically generate parcel patterns within blocks. Evaluating block subdivision algorithms is done by way of generating parcels and comparing them to those in a parcel database. Three block subdivision algorithms are evaluated on how closely they reproduce parcels of different block types found in a parcel database from Montreal, Canada. While the authors who developed each of the algorithms have evaluated them, they have used their own metrics and block types to evaluate their own algorithms. This makes it difficult to compare their strengths and weaknesses. The contribution of this paper is in resolving this difficulty with the aim of finding a better algorithm suited to subdividing each block type. The proposed hypothesis is that given the different approaches that block subdivision algorithms take, it's likely that different algorithms are better adapted to subdividing different block types. To test this, a standardized block type classification is used that consists of mutually exclusive and comprehensive categories. A statistical method is used for finding a better algorithm and the probability it will perform well for a given block type. Results suggest the oriented bounding box algorithm performs better for warped non-uniform sites, as well as gridiron and fragmented uniform sites. It also produces more similar parcel areas and widths. The Generalized Parcel Divider 1 algorithm performs better for gridiron non-uniform sites. The Straight Skeleton algorithm performs better for loop and lollipop networks as well as fragmented non-uniform and warped uniform sites. It also produces more similar parcel shapes and patterns.

  3. Flexural and Shear Behavior of RC Concrete Beams Reinforced with Fiber Wire Mesh

    Directory of Open Access Journals (Sweden)

    Rafea Flaih Hassan

    2018-02-01

    Full Text Available This work aims to study  the effect of using fiber wire mesh on the flexural and shear properties of RC concrete beams. Six reinforced concrete beams (120*180*1220mm were tested under two load points. Fiber wire mesh was applied with two manners, first one is three layers as U shape around the section of the beam, the second one is four layers around overall section of beam. The test results indicated that using of fiber wire mesh as additional reinforcement can increase the ultimate load of about (1.85-3.58% in the case of flexural and (17.7-23.7% in case of shear. Also,  results showed that an increasing in  first cracking  load is obtained from  (42.8-85.7% in case of flexural and from (41.2-76.5% in case of shear. Also the shear behavior of beams becomes more ductile when the fiber wire mesh was used in beams. The cracks of shrinkage was disappeared when the fiber wire mesh surround the section of the beam. 

  4. Quasi-plane-hypothesis of strain coordination for RC beams seismically strengthened with externally-bonded or near-surface mounted fiber reinforced plastic

    Science.gov (United States)

    Ren, Zhenhua; Zeng, Xiantao; Liu, Hanlong; Zhou, Fengjun

    2013-03-01

    The application of fiber reinforced plastic (FRP), including carbon FRP and glass FRP, for structural repair and strengthening has grown due to their numerous advantages over conventional materials such as externally bonded reinforcement (EBR) and near-surface mounted (NSM) strengthening techniques. This paper summarizes the results from 21 reinforced concrete beams strengthened with different methods, including externally-bonded and near-surface mounted FRP, to study the strain coordination of the FRP and steel rebar of the RC beam. Since there is relative slipping between the RC beam and the FRP, the strain of the FRP and steel rebar of the RC beam satisfy the quasi-plane-hypothesis; that is, the strain of the longitudinal fiber that parallels the neutral axis of the plated beam within the scope of the effective height ( h 0) of the cross section is in direct proportion to the distance from the fiber to the neutral axis. The strain of the FRP and steel rebar satisfies the equation: ɛ FRP= βɛ steel, and the value of β is equal to 1.1-1.3 according to the test results.

  5. Design of an image encryption scheme based on a multiple chaotic map

    Science.gov (United States)

    Tong, Xiao-Jun

    2013-07-01

    In order to solve the problem that chaos is degenerated in limited computer precision and Cat map is the small key space, this paper presents a chaotic map based on topological conjugacy and the chaotic characteristics are proved by Devaney definition. In order to produce a large key space, a Cat map named block Cat map is also designed for permutation process based on multiple-dimensional chaotic maps. The image encryption algorithm is based on permutation-substitution, and each key is controlled by different chaotic maps. The entropy analysis, differential analysis, weak-keys analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new image encryption scheme. Through the comparison to the proposed scheme with AES, DES and Logistic encryption methods, we come to the conclusion that the image encryption method solves the problem of low precision of one dimensional chaotic function and has higher speed and higher security.

  6. Design of the RTO/RC ITER primary pumping system

    International Nuclear Information System (INIS)

    Ladd, P.; Ibbott, C; Janeschitz, G.; Martin, E.

    2000-01-01

    The primary pumping system is needed not only to exhaust helium ash resulting from the DT reaction but also excess fuelling gas injected during the fusion burn, which can extend for 100's to 1000's of seconds, and to perform a variety of other functions. The prevailing environmental conditions, principally nuclear radiation, tritium exposure, magnetic fields, and the need for containment, have a significant impact on the design and selection of equipment. This paper presents the design of the Reduced Technical Objectives/Reduced Cost (RTO/RC) ITER primary pumping system with particular emphasis on the nuclear aspects of the design. Component selection and equipment layout issues to meet established requirements for the system are reviewed together with the R and D that is being undertaken to support the design. In addition, serviceability and maintainability issues related to this system are also discussed

  7. Present and future activities of TRIGA RC-1 Reactor

    International Nuclear Information System (INIS)

    Festinesi, A.

    1986-01-01

    A summary of reactor activities is presented and discussed. The RC-1 reactor is used by ENEA's laboratories, research institutes and national industries for different aims: research, analysis materials behaviour under neutron flux, etc. To satisfy the requests increase it is important to signalize: - the realization of a new radiochemical laboratory for radioisotopes production, to be used in a medical and/or diagnostic field in general; - the realization of a tritium handling laboratory, to study tritium solubility, release and diffusion in different material (particularly in ceramic breeder as lithium aluminate) to support Italian programs on fusion technology; - a research activity on the reactors computerized control by a console of advanced conception. The aim of this activity is the development of an ergonomic control room that could be a reference point for the planning of the power reactor control rooms

  8. Hysteretic MDOF Model to Quantify Damage for RC Shear Frames Subject to Earthquakes

    DEFF Research Database (Denmark)

    Köylüoglu, H. Ugur; Nielsen, Søren R.K.; Cakmak, Ahmet S.

    A hysteretic mechanical formulation is derived to quantify local, modal and overall damage in reinforced concrete (RC) shear frames subject to seismic excitation. Each interstorey is represented by a Clough and Johnston (1966) hysteretic constitutive relation with degrading elastic fraction of th...... shear frame is subject to simulated earthquake excitations, which are modelled as a stationary Gaussian stochastic process with Kanai-Tajimi spectrum, multiplied by an envelope function. The relationship between local, modal and overall damage indices is investigated statistically....

  9. Ionization of amphiphilic acidic block copolymers.

    Science.gov (United States)

    Colombani, Olivier; Lejeune, Elise; Charbonneau, Céline; Chassenieux, Christophe; Nicolai, Taco

    2012-06-28

    The ionization behavior of an amphiphilic diblock copolymer poly(n-butyl acrylate(50%)-stat-acrylic acid(50%))(100)-block-poly(acrylic acid)(100) (P(nBA(50%)-stat-AA(50%))(100)-b-PAA(100), DH50) and of its equivalent triblock copolymer P(nBA(50%)-stat-AA(50%))(100)-b-PAA(200)-b-P(nBA(50%)-stat-AA(50%))(100) (TH50) were studied by potentiometric titration either in pure water or in 0.5 M NaCl. These polymers consist of a hydrophilic acidic block (PAA) connected to a hydrophobic block, P(nBA(50%)-stat-AA(50%))(100), whose hydrophobic character has been mitigated by copolymerization with hydrophilic units. We show that all AA units, even those in the hydrophobic block could be ionized. However, the AA units within the hydrophobic block were less acidic than those in the hydrophilic block, resulting in the preferential ionization of the latter block. The preferential ionization of PAA over that of P(nBA(50%)-stat-AA(50%))(100) was stronger at higher ionic strength. Remarkably, the covalent bonds between the PAA and P(nBA(50%)-stat-AA(50%))(100) blocks in the diblock or the triblock did not affect the ionization of each block, although the self-association of the block copolymers into spherical aggregates modified the environment of the PAA blocks compared to when PAA was molecularly dispersed.

  10. Neutronic evaluation of a fuel block of a GT-MHR using WIMSD5

    International Nuclear Information System (INIS)

    Silva, Clarysson Alberto Mello da; Pereira, Claubia; Costa, Antonella Lombardi; Veloso, Maria Auxiliadora Fortini

    2009-01-01

    The goal is to simulate a representative fuel block of a GT-MHR core to analyze the neutronic parameters behavior due the insertion of Pu isotopes and Minor Actinides (MAs) using shuffling scheme. Initially the fuel block was filled with Driver Fuel (DF), and after burned, these fuels are reprocessed and build the Transmutation Fuel (TF). After some cycles, the fuel block was filled with DF and TF fuels. The DF is a mixture of Pu and Np and the TF is a mix of Pu and MAs. The shuffled scheme was evaluated after each cycle. It was verified that neutronic parameters and isotopic composition reach equilibrium and remain within safety limits when this scheme is used. In addition, there were burnup of MAs. The WIMS code was used in the simulations and the following neutronic parameters were evaluated: infinitive multiplication factor, spectrum hardening and reactivity temperature coefficients. (author)

  11. Chiral building blocks from biomass: 2,5-Diamino-2,5-dideoxy-1,4-3,6-dianhydroiditol

    NARCIS (Netherlands)

    Thiyagarajan, S.; Gootjes, L.; Vogelzang, W.; Wu, J.; Haveren, van J.; Es, van D.S.

    2011-01-01

    Isohexides (isomannide (endo-endo), isosorbide (endo-exo), and isoidide (exo-exo) are a group of renewable bio-based building blocks that received considerable attention among the polymer industries because these rigid bicyclic diols have several interesting properties in polymer applications.1 We

  12. Effect of EMIC Wave Normal Angle Distribution on Relativistic Electron Scattering Based on the Newly Developed Self-consistent RC/EMIC Waves Model by Khazanov et al. [2006

    Science.gov (United States)

    Khazanov, G. V.; Gallagher, D. L.; Gamayunov, K.

    2007-01-01

    It is well known that the effects of EMIC waves on RC ion and RB electron dynamics strongly depend on such particle/wave characteristics as the phase-space distribution function, frequency, wave-normal angle, wave energy, and the form of wave spectral energy density. Therefore, realistic characteristics of EMIC waves should be properly determined by modeling the RC-EMIC waves evolution self-consistently. Such a selfconsistent model progressively has been developing by Khaznnov et al. [2002-2006]. It solves a system of two coupled kinetic equations: one equation describes the RC ion dynamics and another equation describes the energy density evolution of EMIC waves. Using this model, we present the effectiveness of relativistic electron scattering and compare our results with previous work in this area of research.

  13. Evaluation of Shear Wall-RC Frame Interaction of High-Rise Buildings using 2-D model Approach

    Directory of Open Access Journals (Sweden)

    Dipali Patel

    2015-09-01

    Full Text Available The usefulness of structural walls in the framing of buildings has long been recognized. It is generally preferred to use shear wall in combination with moment resisting frame. In the present study, an effort is also made to investigate the shear wall-RC frame interaction using 2-D modeling of 20, 30 and 35 storey RC frame building with shear wall. In equivalent simplified 2-D model, two exterior frames with shear wall modeled as single frame with double stiffness, strength and weight. The interior frames without shear wall are modeled as a single frame with equivalent stiffness, strength and weight. The modeled frames are connected with rigid link at each floor level. Using 2-D plane frame model the lateral force distribution between Exterior frame with shear wall and Interior frame without shear wall is investigated. From the analysis, it is observed that up to bottom seven/eight storey more than 50% load is taken by frame with shear wall and the lower most three storeys take about 75% of total storey shear.

  14. 31 CFR 594.301 - Blocked account; blocked property.

    Science.gov (United States)

    2010-07-01

    ... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.301 Blocked account; blocked property. The terms blocked account and...

  15. Derivation of the human embryonic stem cell line RCe014-A (RC-10

    Directory of Open Access Journals (Sweden)

    P.A. De Sousa

    2016-03-01

    Full Text Available The human embryonic stem cell line RCe014-A (RC-10 was derived from a fresh oocyte voluntarily donated as unsuitable and surplus to fertility requirements following ethics committee approved informed consent under licence from the UK Human Fertilisation and Embryology Authority. The cell line shows normal pluripotency marker expression and differentiation to the three germ layers in vitro. It has a mixed 46XY and 47XY +12 male karyotype and microsatellite PCR identity, HLA and blood group typing data is available.

  16. Derivation of the human embryonic stem cell line RCe010-A (RC-6

    Directory of Open Access Journals (Sweden)

    P.A. De Sousa

    2016-03-01

    Full Text Available The human embryonic stem cell line RCe010-A (RC-6 was derived from a frozen and thawed blastocyst voluntarily donated as unsuitable and surplus to fertility requirements following ethics committee approved informed consent under licence from the UK Human Fertilisation and Embryology Authority. The cell line shows normal pluripotency marker expression and differentiation to the three germ layers in vitro. It has a normal 46XY male karyotype and microsatellite PCR identity, HLA and blood group typing data are available.

  17. Vibration based structural assessment of the rehabilitation intervention in r.c. segmental bridge

    OpenAIRE

    Franchetti Paolo; Frizzarin Michele; Leonardi Andrea; Zeni Fabio

    2015-01-01

    A vibration based structural assessment campaign was carried out on a r.c. segmental bridge in North East Italy. The bridge has a cantilever static scheme, fixed at the top of the piers and with a hinge at the centre of the span. The particular configuration of the hinge consists in a couple of steel elements, each one composed by a tongue and groove joint. Since the year 1960, the hinge was subjected to consumption and degradation, that caused a malfunctioning of the device. An intervention ...

  18. Humidity build-up in electronic enclosures exposed to different geographical locations by RC modelling and reliability prediction

    DEFF Research Database (Denmark)

    Conseil-Gudla, H.; Staliulionis, Z.; Mohanty, S.

    2018-01-01

    according to this steady state (25 °C and 60% RH) have been calculated for the different climates, and the protection offered by the enclosures has been estimated under different casing materials and resistor-capacitor (RC) simulation. This method offers a way to predict the average value of failure rate...

  19. Labor analgesia with ropivacaine added to clonidine: a randomized clinical trial

    Directory of Open Access Journals (Sweden)

    Giane Nakamura

    Full Text Available CONTEXT AND OBJECTIVE: Previous studies have led to speculation that the association between ropivacaine and clonidine might be more effective than ropivacaine alone. We examined the maternal-fetal effects of two pharmacological approaches: a low dose of ropivacaine or a lower dose of ropivacaine plus clonidine for epidural analgesia during labor. DESIGN AND SETTING: Prospective study at Department of Anesthesiology, Faculdade de Medicina de Botucatu, Universidade Estadual Paulista. METHODS: Thirty-two pregnant women in American Society of Anesthesiologists physical status I and II randomly underwent epidural analgesia using 15 ml of ropivacaine 0.125% (R group or 15 ml of ropivacaine 0.0625% plus 75 µg clonidine (RC group. Pain intensity, sensory block level, latency time, motor block intensity, duration of labor analgesia and duration of epidural analgesia were evaluated. The newborns were evaluated using Apgar scores and the Amiel-Tison method (neurological and adaptive capacity score. RESULTS: There were no statistically significant differences between the groups regarding pain score, sensory block level, duration of epidural analgesia or Apgar score. The latency time, duration of labor analgesia and motor block were R group < RC group. The half-hour and two-hour neurological and adaptive capacity scores were higher in the R group. All of the R group newborns and 75% of the RC group newborns were found to be neurologically healthy at the 24-hour examination. RESULTS: There were no statistically significant differences between the groups regarding pain score, sensory block level, duration of epidural analgesia or Apgar score. The latency time, duration of labor analgesia and motor block were R group < RC group. The half-hour and two-hour neurological and adaptive capacity scores were higher in the R group. All of the R group newborns and 75% of the RC group newborns were found to be neurologically healthy at the 24-hour examination

  20. Comparison of Cloud Detection Using the CERES-MODIS Ed4 and LaRC AVHRR Cloud Masks and CALIPSO Vertical Feature Mask

    Science.gov (United States)

    Trepte, Q. Z.; Minnis, P.; Palikonda, R.; Bedka, K. M.; Sun-Mack, S.

    2011-12-01

    Accurate detection of cloud amount and distribution using satellite observations is crucial in determining cloud radiative forcing and earth energy budget. The CERES-MODIS (CM) Edition 4 cloud mask is a global cloud detection algorithm for application to Terra and Aqua MODIS data with the aid of other ancillary data sets. It is used operationally for the NASA's Cloud and Earth's Radiant Energy System (CERES) project. The LaRC AVHRR cloud mask, which uses only five spectral channels, is based on a subset of the CM cloud mask which employs twelve MODIS channels. The LaRC mask is applied to AVHRR data for the NOAA Climate Data Record Program. Comparisons among the CM Ed4, and LaRC AVHRR cloud masks and the CALIPSO Vertical Feature Mask (VFM) constitute a powerful means for validating and improving cloud detection globally. They also help us understand the strengths and limitations of the various cloud retrievals which use either active and passive satellite sensors. In this paper, individual comparisons will be presented for different types of clouds over various surfaces, including daytime and nighttime, and polar and non-polar regions. Additionally, the statistics of the global, regional, and zonal cloud occurrence and amount from the CERES Ed4, AVHRR cloud masks and CALIPSO VFM will be discussed.