The feasibility of chromium(VI) to induce graft copolymerization of methyl methacrylate onto nylon-6 was investigated in the presence of nitrogen. The rate of grafting was determined by varying monomer concentration, chromium(VI) concentration, temperature, acidity of the medium, solvents, inorganic salts, and redox system. The graft yield increases significantly by increasing the monomer concentration. The graft yield increases with increase of [Cr(VI)] up to 0.025 mole/liter. With further increase of [Cr(VI)], the graft yield decreases. The increase of acid concentration up to 0.395 mole/liter results the increase in graft yield. Beyond this concentration the graft yield decreases. The graft yield increases with increase in temperature up to 55°C and thereafter it decreases. The graft yield is medium dependent. The graft yield increases with increasing thiourea concentration upto 0.0025 mole/liter but beyond this concentration, the percentage graft yield decreases. A suitable kinetic scheme has been proposed and the rate equation has been evaluated. 相似文献
Informally stated, we present here a randomized algorithm that given black-box access to the polynomial f computed by an unknown/hidden arithmetic formula ? reconstructs, on the average, an equivalent or smaller formula \({\hat{\phi}}\) in time polynomial in the size of its output \({\hat{\phi}}\). Specifically, we consider arithmetic formulas wherein the underlying tree is a complete binary tree, the leaf nodes are labeled by affine forms (i.e., degree one polynomials) over the input variables and where the internal nodes consist of alternating layers of addition and multiplication gates. We call these alternating normal form (ANF) formulas. If a polynomial f can be computed by an arithmetic formula μ of size s, it can also be computed by an ANF formula ?, possibly of slightly larger size sO(1). Our algorithm gets as input black-box access to the output polynomial f (i.e., for any point x in the domain, it can query the black box and obtain f(x) in one step) of a random ANF formula ? of size s (wherein the coefficients of the affine forms in the leaf nodes of ? are chosen independently and uniformly at random from a large enough subset of the underlying field). With high probability (over the choice of coefficients in the leaf nodes), the algorithm efficiently (i.e., in time sO(1)) computes an ANF formula \({\hat{\phi}}\) of size s computing f. This then is the strongest model of arithmetic computation for which a reconstruction algorithm is presently known, albeit efficient in a distributional sense rather than in the worst case. 相似文献
Dynamic, in situ wide angle X-ray scattering (WAXS) studies of the melt crystallization of injection-molded poly(ether ether ketone) (PEEK) have been carried out using an X-ray diffractometer and a position-sensitive detector. A test cell has been fabricated to fit inside the diffractometer and yet work as a complete injection molding apparatus. The rate of crystallization has been shown to increase with decreasing crystallization temperature and/or increasing flow rate in the mold. The crystallization rate decreases dramatically with increase in melt soak time at 400°C. The crystallinity index, which affects the stiffness, toughness, and fracture behavior of PEEK, has been measured under various processing conditions, by wide angle X-ray scattering, so as to optimize the process parameters: molding time, mold temperature, melt temperature, soak time at melt temperature, and flow rate. It has been shown that the crystallinity and hence the elastic modulus increase with increase in crystallization temperature and/or flow rate. Chain orientation has been shown to be absent in the bulk of the injection-molded specimens under normal molding conditions. 相似文献
With the advancement of image acquisition devices and social networking services, a huge volume of image data is generated. Using different image and video processing applications, these image data are manipulated, and thus, original images get tampered. These tampered images are the prime source of spreading fake news, defaming the personalities and in some cases (when used as evidence) misleading the law bodies. Hence before relying totally on the image data, the authenticity of the image must be verified. Works of the literature are reported for the verification of the authenticity of an image based on noise inconsistency. However, these works suffer from limitations of confusion between edges and noise, post-processing operation for localization and need of prior knowledge about an image. To handle these limitations, a noise inconsistency-based technique has been presented here to detect and localize a false region in an image. This work consists of three major steps of pre-processing, noise estimation and post-processing. For the experimental purpose two, publicly available datasets are used. The result is discussed in terms of precision, recall, accuracy and f1-score on the pixel level. The result of the presented work is also compared with the recent state-of-the-art techniques. The average accuracy of the proposed work on datasets is 91.70%, which is highest among state-of-the-art techniques.
The Session Initiation Protocol (SIP) is a signaling communications protocol, which has been chosen for controlling multimedia communication in 3G mobile networks. In recent years, password-based authenticated key exchange protocols are designed to provide strong authentication for SIP. In this paper, we address this problem in two-party setting where the user and server try to authenticate each other, and establish a session key using a shared password. We aim to propose a secure and anonymous authenticated key exchange protocol, which can achieve security and privacy goal without increasing computation and communication overhead. Through the analysis, we show that the proposed protocol is secure, and has computational and computational overheads comparable to related authentication protocols for SIP using elliptic curve cryptography. The proposed protocol is also provably secure in the random oracle model. 相似文献
A low speed single barrel pellet injector, using a mechanical punch device has been developed for alternative injection in the large helical device. A pellet is injected by the combined operation of a mechanical punch and a pneumatic propellant system. The pellet shape is cylindrical, 3 mm in diameter and 3 mm in length. Using this technique the speed of the pellet can be controlled flexibly in the range of 100-450 m/s, and a higher speed can be feasible for a higher gas pressure. The injector is equipped with a guide tube selector to direct the pellet to different injection locations. Pellets are exposed to several curved parts with the curvature radii R(c) = 0.8 and 0.3 m when they are transferred in guided tubes to the respective injection locations. Pellet speed variation with pressure at different pellet formation temperatures has been observed. Pellet intactness tests through these guide tubes show a variation in the intact speed limit over a range of pellet formation temperatures from 6.5 to 9.8 K. Pellet speed reduction of less than 6% has been observed after the pellet moves through the curved guide tubes. 相似文献
We propose an optical scheme for quantum key distribution in which bits are encoded in relative phases of four bipartite weak coherent states${|\alpha, \alpha\rangle, |-\alpha, -\alpha\rangle, |-\alpha, \alpha\rangle}$ and ${|\alpha, -\alpha \rangle}$, with respect to a strong reference pulse. We discuss security of the scheme against eavesdropping strategies like, photon number splitting, photon beam splitting and intercept-resend attacks. It is found that present scheme is more sensitive against these eavesdropping strategies than the two-dimensional non-orthogonal state based protocol and BB84 protocol. Our scheme is very simple, requires only passive optical elements like beam splitters, phase shifters and photon detectors, hence is at the reach of presently available technology. 相似文献
We advocate the use of quickly‐adjustable, computer‐controlled color spectra in photography, lighting and displays. We present an optical relay system that allows mechanical or electronic color spectrum control and use it to modify a conventional camera and projector. We use a diffraction grating to disperse the rays into different colors, and introduce a mask (or LCD/DMD) in the optical path to modulate the spectrum. We analyze the trade‐offs and limitations of this design, and demonstrate its use in a camera, projector and light source. We propose applications such as adaptive color primaries, metamer detection, scene contrast enhancement, photographing fluorescent objects, and high dynamic range photography using spectrum modulation. 相似文献