In recent years, trimeric surfactants have created excitement in the surfactant field because of their properties, which have been found to be better than monomeric or dimeric homologues. Only a limited number of trimeric surfactants have been synthesized and studied so far, probably owing to the difficulty in synthesis. In this article, we synthesized some novel star‐shaped trimeric cationic surfactants based on the alkylation of the 3 hydroxyl groups of the phloroglucinol nuclei as a core (i.e., spacer) with 3 dodecyl or 3 octyl groups (as tails) for the surfactant. The chemical structures were confirmed by nuclear magnetic resonance, Fourier transform infrared, mass spectrometry, and elemental analysis; also the critical micelle concentration was determined by electrical conductivity measurements. These surfactants were used in the synthesis of mesoporous silica nanoparticles by the sol–gel method. The silica particles shape and size were determined using field emission scanning electron microscopy and high‐resolution transmission electron microscopy images. Furthermore, the corrosion inhibitor capability of these surfactants was investigated by monitoring the corrosion rate of iron sheets in 0.5 M hydrochloric acid in the presence and in the absence of different surfactants at 45°C based on the weight loss method. We have used cetyltrimethylammonium bromide (CTAB) as a positive control, the obtained results showed a high inhibition efficiency at very low concentrations, and the prepared trimeric surfactants exhibited a higher anticorrosion efficiency than the CTAB surfactants. 相似文献
In this work, thermally insulating composite mats of poly(vinylidene fluoride) (PVDF) and polyacrylonitrile (PAN) blends are used as the separator membranes. The membranes improve the thermal‐to‐electrical energy conversion efficiency of a thermally driven electrochemical cell (i.e., thermocell) up to 95%. The justification of the improved performance is an intricate relationship between the porosity, electrolyte uptake, electrolyte uptake rate of the electrospun fibrous mat, and the actual temperature gradient at the electrode surface. When the porosity is too high (87%) in PAN membranes, the electrolyte uptake and electrolyte uptake rate are significantly high as 950% and 0.53 µL s?1, respectively. In such a case, the convective heat flow within the cell is high and the power density is limited to 32.7 mW m?2. When the porosity is lesser (up to 81%) in PVDF membranes, the electrolyte uptake and uptake rate are relatively low as 434% and 0.13 µL s?1, respectively. In this case, the convective flow shall be low, however, the maximum power density of 63.5 mW m?2 is obtained with PVDF/PAN composites as the aforementioned parameters are optimized. Furthermore, multilayered membrane structures are also investigated for which a bilayered architecture produces highest power density of 102.7 mW m?2. 相似文献
This research tests and develops the Technology Acceptance Model (TAM), introduced by Davis (1986), which attempts to explain end users' attitudes to computing technologies. It introduces several new variables, including compatibility, user characteristics, system rating and the enduser computing satisfaction (EUCS) construct, a surrogate measure for IT success and acceptance. A questionnaire with over seventy items was completed by a large number of users and LISREL, a technique for modelling a system of structural equations, was used to analyse the responses. The output shows the model as a whole fits the data very well and indicates significant relationships between variables in the model. These results confirm that TAM is a valuable tool for predicting attitudes, satisfaction, and usage from beliefs and external variables. They also show that relative advantage of the system contributed most to attitudes and satisfaction. Compatibility (of the system to the task performed) contributed most to usage and was the most important antecedent of the belief variables, including relative advantage. 相似文献
Automatic key concept identification from text is the main challenging task in information extraction, information retrieval, digital libraries, ontology learning, and text analysis. The main difficulty lies in the issues with the text data itself, such as noise in text, diversity, scale of data, context dependency and word sense ambiguity. To cope with this challenge, numerous supervised and unsupervised approaches have been devised. The existing topical clustering-based approaches for keyphrase extraction are domain dependent and overlooks semantic similarity between candidate features while extracting the topical phrases. In this paper, a semantic based unsupervised approach (KP-Rank) is proposed for keyphrase extraction. In the proposed approach, we exploited Latent Semantic Analysis (LSA) and clustering techniques and a novel frequency-based algorithm for candidate ranking is introduced which considers locality-based sentence, paragraph and section frequencies. To evaluate the performance of the proposed method, three benchmark datasets (i.e. Inspec, 500N-KPCrowed and SemEval-2010) from different domains are used. The experimental results show that overall, the KP-Rank achieved significant improvements over the existing approaches on the selected performance measures.
This paper describes a variable structure control for fractional‐order systems with delay in both the input and state variables. The proposed method includes a fractional‐order state predictor to eliminate the input delay. The resulting state‐delay system is controlled through a sliding mode approach where the controller uses a sliding surface defined by fractional order integral. Then, the proposed control law ensures that the state trajectories reach the sliding surface in finite time. Based on recent results of Lyapunov stability theory for fractional‐order systems, the stability of the closed loop is studied. Finally, an illustrative example is given to show the interest of the proposed approach. 相似文献
Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distributing a secret K among a finite set of participants, in such a way that only predefined subset of participant is enabled to reconstruct a secret from their shares. A secret sharing scheme realizing uniform access structure described by a graph has received a considerable attention. In this scheme, each vertex represents a participant and each edge represents a minimum authorized subset. In this paper, an independent dominating set of vertices in a graph G is introduced and applied as a novel idea to construct a secret sharing scheme such that the vertices of the graph represent the participants and the dominating set of vertices in G represents the minimal authorized set. While most of the previous schemes were based on the principle of adjacent vertices, the proposed scheme is based upon the principle of non-adjacent vertices. We prove that the scheme is perfect, and the lower bound of the information rate of this new construction is improved when compared to some well-known previous constructions. We include an experiment involving security threats to demonstrate the effectiveness of the proposed scheme. 相似文献
Multimedia Tools and Applications - One of the most critical aspects of this technologically progressive era is the propagation of information through an unsecured communication channel. The... 相似文献
Multimedia Tools and Applications - In this paper, we present a novel classification approach based on Extreme Learning Machine (ELM) and Wavelet Neural Networks. We introduce two novel... 相似文献
The unified theory of acceptance and use of technology (UTAUT), a model of the user acceptance of IT, synthesizes elements from several prevailing user acceptance models. It has been credited with explaining a larger proportion of the variance of ‘intention to use’ and ‘usage behavior’ than do preceding models. However, it has not been validated in non-Western cultures. Using a survey sample collected from 722 knowledge workers using desktop computer applications on a voluntary basis in Saudi Arabia, we examined the relative power of a modified version of UTAUT in determining ‘intention to use’ and ‘usage behavior’. We found that the model explained 39.1% of intention to use variance, and 42.1% of usage variance. In addition, drawing on the theory of cultural dimensions, we hypothesized and tested the similarities and differences between the North American and Saudi validations of UTAUT in terms of cultural differences that affected the organizational acceptance of IT in the two societies. 相似文献