[60]Fullerene (C60) was mono-substituted with well-defined poly(methyl methacrylate) (PMMA-b-C60) using the atom transfer radical polymerization (ATRP) technique. The self-assembly behaviors of PMMA-b-C60 in ethyl acetate (EA) and decalin mixtures were studied using laser light scattering (LLS) and transmission electron microscopy (TEM). Homogeneous solutions of PMMA-b-C60 can be obtained in the solvent mixtures containing more than 40 wt% EA, where the molar ratio of decalin to EA is close to 1. For each solvent mixture, unimers coexist with micelles and large aggregates. The sizes of PMMA-b-C60 micelles and aggregates are independent of polymer concentration, confirming that they are produced via the closed association mechanism. For the various solvent mixtures, the weight-averaged molecular weights, Mw of the PMMA-b-C60 aggregates range from 4.1×107 to 12.5×107 g/mol. The hydrodynamic radii of the large aggregate, Rh, vary from 90 to 136 nm, while the z-averaged radii of gyration, Rg, range from 210 to 311 nm. The Rg/Rh value for each solvent mixture is ∼2.3, which is independent of decalin contents in the mixed solvents. The morphological study using the transmission electron microscope suggests that the large aggregates are composed of porous large compound micelles (LCM) in solution. 相似文献
Software end-users need to sign licenses to seal an agreement with the product
providers. Habitually, users agree with the license (i.e. terms and conditions) without fully
understanding the agreement. To address this issue, an ontological model is developed to
formulate the user requirements and license agreements formally. This paper, introduces
ontological model that includes the abstract license ontology of common features found in
di?erent license agreements. The abstract license ontology is then extended to a few real
world license agreements. The resulting model can be used for di?erent purposes such as
querying the appropriate licenses for a speciˉc requirement or checking the license terms and
conditions with user requirements. 相似文献
Parents of six children are facing a trial on charges of aggravated manslaughter in the care a 5 1/2 month old infant who
died suddenly and neglect of their four older children for causing them to be malnourished by feeding them all an exclusively
raw foods vegan diet. Both parents declined plea bargains and plan to defend themselves in court. 相似文献
Olfactory responses of the cereal stemborer parasitoid Cotesiasesamiae to volatiles emitted by gramineous host and nonhost plants of the stemborers were studied in a Y-tube olfactometer. The host plants were maize (Zea mays) and sorghum ( Sorghum bicolor), while the nonhost plant was molasses grass (Melinis minutiflora). In single-choice tests, females of C. sesamiae chose volatiles from infested and uninfested host plants and molasses grass over volatiles from the control (soil). In dual-choice tests, the wasp preferred volatiles from infested host plants to those from uninfested host plants. There was no discrimination between molasses grass volatiles and those of uninfested maize, uninfested sorghum, or infested maize. The wasp preferred sorghum volatiles over maize. Combining uninfested maize or sorghum with molasses grass did not make volatiles from the combination more attractive as compared to only uninfested host plants. Infested maize alone was as attractive as when combined with molasses grass. Infested sorghum was preferred over its combination with molasses grass. Local growth conditions of the molasses grasses influenced attractiveness to the parasitoids. Volatiles from Thika molasses grass were attractive, while those from Mbita molasses grass were not. Growing the Thika molasses grass in Mbita rendered it unattractive and vice versa with the Mbita molasses grass. This is a case of the same genotype expressing different phenotypes due to environmental factors. 相似文献
Visual Cryptography (VC) is gaining attraction during the past few years to secure the visual information in the transmission network. It enables the visual data i.e. handwritten notes, photos, printed text, etc. to encrypt in such a way that their decryption can be done through the human visual framework. Hence, no computational assistance is required for the decryption of the secret images they can be seen through naked eye. In this paper, a novel enhanced halftoning-based VC scheme is proposed that works for both binary and color images. Fake share is generated by the combination of random black and white pixels. The proposed algorithm consists of 3 stages i.e., detection, encryption, and decryption. Halftoning, Encryption, (2, 2) visual cryptography and the novel idea of fake share, make it even more secure and improved. As a result, it facilitates the original restored image to the authentic user, however, the one who enters the wrong password gets the combination of fake share with any real share. Both colored and black images can be processed with minimal capacity using the proposed scheme.
Most schemes exhibit low robustness due to LSB’s (Least Significant Bit) and MSB’s (Most Significant Bit) based information hiding in the cover image. However, most of these IW schemes have low imperceptibility as the cover image distortion reveals to the attacker due to information hiding in MSB’s. In this paper, a hybrid image watermarking scheme is proposed based on integrating Robust Principal Component Analysis (R-PCA), Discrete Tchebichef Transform (DTT), and Singular Value Decomposition (SVD). A grayscale watermark image is twisted/scrambled using a 2D Discrete Hyper-chaotic Encryption System (2D-DHCES) to boost up the robustness/heftiness and security. The original cover image is crumbled into sparse components using R-PCA and using DTT the substantial component is additionally decomposed and the watermark will be embedded in the cover image using SVD processing. In DTT, scarcer coefficients hold the utmost energy, also provide an optimum sparse depiction of the substantial image edges and features that supports proficient retrieval of the watermark image even after unadorned image distortion based channel attacks. The imperceptibility and robustness of the proposed method are corroborated against a variety of signal processing channel attacks (salt and pepper noise, multi-directional shearing, cropping, and frequency filtering, etc.). The visual and quantifiable outcomes reveal that the proposed image watermarking scheme is much effective and delivers high forbearance against several image processing and geometric attacks.
International Journal of Control, Automation and Systems - The fault and disturbances estimation has an important role in the modern traction railway system. This paper proposes a unique method for... 相似文献