Practical Relevance of Bifurcation, Instability and Chaos in Catalytic Reactors

2022 ◽  
pp. 112-138
Author(s):  
S. S. E. H. Elnashaie ◽  
S. S. Elshishini
Author(s):  
G. I. Korshunov ◽  
V. A. Lipatnikov ◽  
A. A. Shevchenko ◽  
V. Y. Malyshev

Introduction:The known methods of adaptive management of information network protection with special security measures are not effective enough in modern conditions, as they only take into account collected and processed data on security events and do not analyze the dynamics of the actions.Purpose:Developing a method of adaptive control of information network protection based on the analysis of violator's actions.Results:A method has been proposed for adaptive management of information network protection. Unlike other known methods, it is based on analyzing the dynamics of the violator's actions and determining the situational confrontation parameters under stochastic uncertainty. The method includes situation monitoring, operational control of the sequence of violator's actions, modeling the attacker's strategy, determining the situational parameters with a reliable prediction of the intrusion strategy. During the analysis, the network administrator receives information about the priority purposes of an intruder, the tools used and the vulnerabilities of the network. This provides an opportunity to promptly take measures to increase the security of the network and avoid its compromise.Practical relevance: Тhis approach allows you to maintain the operation of automated management systems for an organization with integrated structure, taking into account the scaling in planning and making changes to the structure on the background of information confrontation at the required level when multiple threats are changing their dynamics. 


Author(s):  
R. A. Morozov ◽  
P. V. Trifonov

Introduction:Practical implementation of a communication system which employs a family of polar codes requires either to store a number of large specifications or to construct the codes by request. The first approach assumes extensive memory consumption, which is inappropriate for many applications, such as those for mobile devices. The second approach can be numerically unstable and hard to implement in low-end hardware. One of the solutions is specifying a family of codes by a sequence of subchannels sorted by reliability. However, this solution makes it impossible to separately optimize each code from the family.Purpose:Developing a method for compact specifications of polar codes and subcodes.Results:A method is proposed for compact specification of polar codes. It can be considered a trade-off between real-time construction and storing full-size specifications in memory. We propose to store compact specifications of polar codes which contain frozen set differences between the original pre-optimized polar codes and the polar codes constructed for a binary erasure channel with some erasure probability. Full-size specification needed for decoding can be restored from a compact one by a low-complexity hardware-friendly procedure. The proposed method can work with either polar codes or polar subcodes, allowing you to reduce the memory consumption by 15–50 times.Practical relevance:The method allows you to use families of individually optimized polar codes in devices with limited storage capacity. 


2019 ◽  
Vol 33 (4) ◽  
pp. 1-14 ◽  
Author(s):  
William R. Kinney

SYNOPSIS This Commentary is intended to help beginning Ph.D. students identify, evaluate, and communicate essential components of proposed empirical accounting research using a three-step process. The first step is a structured top-down approach of writing answers to three related questions—What, Why, How—that emphasize the central role of conceptual thinking in research design, as well as practical relevance. The second step is a predictive validity assessment that anticipates concerns likely to arise in the scholarly review process, and the third is consideration of the likely outcome and potential problems to be encountered if the proposal is implemented as planned. First-hand accounts of Ph.D. student experiences using the three paragraphs and three-step approach are presented, along with an exercise that beginners can use to help themselves identify, analyze, and anticipate problems to improve chances for research success ex ante.


This book aims to answer key questions surrounding (purported) conflicts of human rights at the European Court of Human Rights. Some of these questions concern the very existence of human rights conflicts. Can human rights really conflict with one another? Or should they be interpreted in harmony with one another? Other questions relate to the resolution of genuine human rights conflicts. How should such genuine conflicts be resolved? To what extent is balancing desirable? And which understanding of balancing should be employed? Throughout the book, contributors aim to answer these questions by engaging in concerted debate on both the existence and resolution of human rights conflicts. To increase its practical relevance, the discussion is framed around leading judgments of the European Court. The book ultimately aims to suggests, through the prism of reasonable disagreement, concrete ways forward in the ongoing debate on human rights conflicts at Europe’s human rights court.


2021 ◽  
Vol 7 (7) ◽  
pp. eabc3847
Author(s):  
Armin Tavakoli ◽  
Máté Farkas ◽  
Denis Rosset ◽  
Jean-Daniel Bancal ◽  
Jedrzej Kaniewski

Mutually unbiased bases (MUBs) and symmetric informationally complete projectors (SICs) are crucial to many conceptual and practical aspects of quantum theory. Here, we develop their role in quantum nonlocality by (i) introducing families of Bell inequalities that are maximally violated by d-dimensional MUBs and SICs, respectively, (ii) proving device-independent certification of natural operational notions of MUBs and SICs, and (iii) using MUBs and SICs to develop optimal-rate and nearly optimal-rate protocols for device-independent quantum key distribution and device-independent quantum random number generation, respectively. Moreover, we also present the first example of an extremal point of the quantum set of correlations that admits physically inequivalent quantum realizations. Our results elaborately demonstrate the foundational and practical relevance of the two most important discrete Hilbert space structures to the field of quantum nonlocality.


Author(s):  
Nils Cwiekala ◽  
David A Hills

The state of stress present in an elastic half-plane contact problem, where one or both bodies is subject to remote tension has been investigated, both for conditions of full stick and partial slip. The state of stress present near the contact edges is studied for different loading scenarios in an asymptotic form. This is of practical relevance to the study of contacts experiencing fretting fatigue, and enables the environment in which cracks nucleate to be specified.


Author(s):  
Yihuang Xiong ◽  
Quinn Campbell ◽  
Julian Fanghanel ◽  
Cathy Badding ◽  
Huaiyu Wang ◽  
...  

The production of hydrogen fuels, via water splitting, is of practical relevance for meeting global energy needs and mitigating the environmental consequences of fossil-fuel-based transportation. Water photoelectrolysis has been proposed...


Sign in / Sign up

Export Citation Format

Share Document