The evaluation of the thermodynamic properties as well as the phase diagrams for the binary Na2O–SiO2, K2O–SiO2, and Li2O–SiO2 systems are carried out with a structural model for silicate melts and glasses. This thermodynamic model is based on the assumption that each metallic oxide produces the depolymerization reaction of silica network with a characteristic free-energy change. A least squares optimization program permits all available thermodynamic and phase diagram data to be optimized simultaneously. In this manner, data for these binary systems have been analyzed and represented with a small number of parameters. The resulting equations represent the thermodynamic and phase diagram data for these alkali metal oxide–silica systems within experimental error limits. In particular, the measured limiting liquidus slope at is well reproduced. 相似文献
The aim of this research is to find a segment of consumers of fashion products based on their personal visions of personalization of shoppable ads on mobile social media. To meet this objective, three operational objectives are defined. First, a theoretical model is evaluated based on the stimulus-organism-response framework (S–O–R). This examines, with a PLS-SEM approach, how the stimulation of personalization will affect consumers' internal cognitive state (perceived usefulness) and consequently generates a behavioral response (intention to buy). Second, we look for fashion consumer segments based on their perception of personalization through prediction-oriented segmentation (PLS-POS). Third, the segments are explained based on three constructs that were considered important in fashion consumption through mobile social networks: purchase intention, concern for privacy, and perception of trend. The inclusion of personalization and the perception of usefulness of advertisements can greatly help the intention to purchase clothing to be understood. The application of a posterior segmentation helps to better understand the different types of users exposed to shoppable ads on mobile social networks and their relationship with the purchase intention, concern for privacy and trend. While the measures and scales were tested in a context of mobile clothing trade, the methodology can be applied to other types of products or services.
In this work, biocomposites made of polyhydroxyalkanoates (PHA) with natural fibers were produced via compression molding. In particular, polyhydroxybutyrate (PHB) and polyhydroxybutyrate-co-hydroxyvalerate (PHBV) were reinforced with 20 wt% of agave fibers. Different compatibilization strategies were investigated to improve the fiber-matrix interaction: fiber surface treatment in PHA solution, fiber surface treatment in maleated PHA solution, fiber propionylation, and extrusion with maleated PHA. The biocomposites were characterized in terms of morphology, mechanical properties, water absorption, and biodegradability by CO2 production tracking. In general, fiber propionylation was the best strategy for mechanical properties enhancement and water uptake decreasing. Biocomposites with propionylated fibers showed improved flexural strength (170% for PHB and 84% for PHBV). The flexural modulus was also enhanced with propionylated fibers up to 19% and 18% compared to uncompatibilized biocomposites (PHB and PHBV, respectively). Tensile strength increased by 16% (PHB) and 14% (PHBV), and the water absorption was reduced using propionylated fibers going from 6.6% to 4.4% compared with biocomposites with untreated fibers. Most importantly, the impact strength was also improved for all biocomposites by up to 96% compared with the neat PHA matrices. Finally, it was found that the compatibilization did not negatively modify the PHA biodegradability. 相似文献
In the present paper, the identification of the corrosion product phases formed on copper under different atmospheres of Cuban tropical climate is reported. Cuprite (Cu2O), paratacamite (Cu2Cl(OH)3), posnjakite (Cu4SO4(OH)6 · 2H2O) and brochantite (Cu4SO4(OH)6) were the main phases identified by X-ray diffraction (XRD) analysis and Fourier transform infrared spectroscopy (FTIR).Copper corrosion products are known to have a protective effect against corrosion. However, a different behaviour was obtained under sheltered coastal conditions. This can be due to the corrosion products morphology and degree of crystallisation, rather than their phase composition. A higher time of wetness and the accumulation of pollutants not washed away from the metal surface can also play an important role. 相似文献
This article proposes Hefestos, an intelligent system applied to ubiquitous accessibility. This model uses ubiquitous computing concepts to manage accessibility resources for people with disabilities. Among the concepts employed, context awareness, user profiles and trails management can be highlighted. The paper proposes an ontology for accessibility and delineates scenarios of its application in everyday life of people with disabilities. Moreover, the implementation of a smart wheelchair prototype and its application in a practical experiment is described. Ten users with a range of disability degrees tried the system and filled out a survey based on the technology acceptance model. This experiment demonstrated the main functionalities and the acceptance of the system. The results showed 96 % of acceptance regarding perceived easy of use and 98 % in perceived usefulness. These results were encouraging and show the potential for implementing Hefestos in real life situations. 相似文献
This work describes a neural network based architecture that represents and estimates object motion in videos. This architecture addresses multiple computer vision tasks such as image segmentation, object representation or characterization, motion analysis and tracking. The use of a neural network architecture allows for the simultaneous estimation of global and local motion and the representation of deformable objects. This architecture also avoids the problem of finding corresponding features while tracking moving objects. Due to the parallel nature of neural networks, the architecture has been implemented on GPUs that allows the system to meet a set of requirements such as: time constraints management, robustness, high processing speed and re-configurability. Experiments are presented that demonstrate the validity of our architecture to solve problems of mobile agents tracking and motion analysis. 相似文献
While search engines have been a successful tool to search text information, image search systems still face challenges. The keyword-based query paradigm used to search in image collection systems, which has been successful in text retrieval, may not be useful in scenarios where the user does not have the precise way to express a visual query. Image collection exploration is a new paradigm where users interact with the image collection to discover useful and relevant pictures. This paper proposes a framework for the construction of an image collection exploration system based on kernel methods, which offers a mathematically strong basis to address each stage of an image collection exploration system: image representation, summarization, visualization and interaction. In particular, our approach emphasizes a semantic representation of images using kernel functions, which can be seamlessly harnessed across all system components. Experiments were conducted with real users to verify the effectiveness and efficiency of the proposed strategy. 相似文献
Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A public key infrastructure (PKI) can be used to provide these functionalities using digital certificates. However, if a vehicle is no longer trusted, its certificates have to be revoked and this status information has to be made available to other vehicles as soon as possible. In this paper, we propose a collaborative certificate status checking mechanism called COACH to efficiently distribute certificate revocation information in VANETs. In COACH, we embed a hash tree in each standard Certificate Revocation List (CRL). This dual structure is called extended-CRL. A node possessing an extended-CRL can respond to certificate status requests without having to send the complete CRL. Instead, the node can send a short response (less than 1 kB) that fits in a single UDP message. Obviously, the substructures included in the short responses are authenticated. This means that any node possessing an extended-CRL can produce short responses that can be authenticated (including Road Side Units or intermediate vehicles). We also propose an extension to the COACH mechanism called EvCOACH that is more efficient than COACH in scenarios with relatively low revocation rates per CRL validity period. To build EvCOACH, we embed an additional hash chain in the extended-CRL. Finally, by conducting a detailed performance evaluation, COACH and EvCOACH are proved to be reliable, efficient, and scalable. 相似文献
Malware is one of the main threats to the Internet security in general, and to commercial transactions in particular. However, given the high level of sophistication reached by malware (e.g. usage of encrypted payload and obfuscation techniques), malware detection tools and techniques still call for effective and efficient solutions. In this paper, we address a specific, dreadful, and widely diffused financial malware: Zeus.The contributions of this paper are manifold: first, we propose a technique to break the encrypted malware communications, extracting the keystream used to encrypt such communications; second, we provide a generalization of the proposed keystream extraction technique. Further, we propose Cronus, an IDS that specifically targets Zeus malware. The implementation of Cronus has been experimentally tested on a production network, and its high quality performance and effectiveness are discussed. Finally, we highlight some principles underlying malware—and Zeus in particular—that could pave the way for further investigation in this field. 相似文献