scholarly journals Pairing transition in a double layer with interlayer Coulomb repulsion

2020 ◽  
Vol 2 (3) ◽  
Author(s):  
Andreas Sinner ◽  
Yurii E. Lozovik ◽  
Klaus Ziegler
Author(s):  
P. Fraundorf ◽  
J. Tentschert

Since the discovery of their etchability in the early 1960‘s, nuclear particle tracks in insulators have had a diverse and exciting history of application to problems ranging from the selective filtration of cancer cells from blood to the detection of 244Pu in the early solar system. Their usefulness stems from the fact that they are comprised of a very thin (e.g. 20-40Å) damage core which etches more rapidly than does the bulk material. In fact, because in many insulators tracks are subject to radiolysis damage (beam annealing) in the transmission electron microscope, the body of knowledge concerning etched tracks far outweighs that associated with latent (unetched) tracks in the transmission electron microscope.With the development of scanned probe microscopies with lateral resolutions on the near atomic scale, a closer look at the structure of unetched nuclear particle tracks, particularly at their point of interface with solid surfaces, is now warranted and we think possible. The ion explosion spike model of track formation, described loosely, suggests that a burst of ionization along the path of a charged particle in an insulator creates an electrostatically unstable array of adjacent ions which eject one another by Coulomb repulsion from substitutional into interstitial sites. Regardless of the mechanism, the ejection process which acts to displace atoms along the track core seems likely to operate at track entry and exit surfaces, with the added feature of mass loss at those surfaces as well. In other words, we predict pits whose size is comparable to the track core width.


TAPPI Journal ◽  
2019 ◽  
Vol 18 (2) ◽  
pp. 93-99
Author(s):  
SEYYED MOHAMMAD HASHEMI NAJAFI ◽  
DOUGLAS BOUSFIELD, ◽  
MEHDI TAJVIDI

Cracking at the fold of publication and packaging paper grades is a serious problem that can lead to rejection of product. Recent work has revealed some basic mechanisms and the influence of various parameters on the extent of crack area, but no studies are reported using coating layers with known mechanical properties, especially for double-coated systems. In this study, coating layers with different and known mechanical properties were used to characterize crack formation during folding. The coating formulations were applied on two different basis weight papers, and the coated papers were folded. The binder systems in these formulations were different combinations of a styrene-butadiene latex and mixtures of latex and starch for two different pigment volume concentrations (PVC). Both types of papers were coated with single and double layers. The folded area was scanned with a high-resolution scanner while the samples were kept at their folded angle. The scanned images were analyzed within a constant area. The crack areas were reported for different types of papers, binder system and PVC values. As PVC, starch content, and paper basis weight increased, the crack area increased. Double layer coated papers with high PVC and high starch content at the top layer had more cracks in comparison with a single layer coated paper, but when the PVC of the top layer was low, cracking area decreased. No measurable cracking was observed when the top layer was formulated with a 100% latex layer.


2019 ◽  
Vol 1 (2) ◽  
pp. 25-33
Author(s):  
Mei Ling Phang ◽  
Swee Huay Heng

Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks. Information might be disclosed, modified and accessed by an unauthorised third party which consequently leads to the breach of confidentiality, integrity and availability of the information. Therefore, it is of utmost importance to employ the technology of cryptography and steganography to protect information assets. Cryptography and steganography have weaknesses when they are working alone. Therefore, crypto-steganography, the combination of cryptography and steganography are introduced to overcome the weaknesses in order to provide a double layer of security and protection. This paper provides a general overview of steganography and cryptography as well as a comparison analysis of different crypto-steganographic schemes. A secure crypto-steganographic system for healthcare is then developed with the implementation and integration of the secure crypto-steganographic scheme proposed by Juneja and Sandhu. This healthcare system enables users to store and deliver message in a more secure way while achieving the main goals of both cryptography and steganography.


2014 ◽  
Vol 134 (5) ◽  
pp. 360-361
Author(s):  
Masumi Fukuma ◽  
Takayuki Uchida ◽  
Yukito Fukushima ◽  
Jinichi Ogawa ◽  
Katsumi Yoshino

Sign in / Sign up

Export Citation Format

Share Document