• Title/Summary/Keyword: complex zero

Search Result 297, Processing Time 0.024 seconds

The Kinetics of Complexation of Nickel(II) and Cobalt(II) Mandelates in Aqueous Solution

  • Choi, Ki-Young;Yun, Sock-Sung;Kim, Mal-Jin
    • Bulletin of the Korean Chemical Society
    • /
    • v.12 no.6
    • /
    • pp.629-632
    • /
    • 1991
  • The rate constants for the formation and dissociation of nickel(II) and cobalt(II) complexes with mandelate have been determined by the pressure-jump relaxation study. The forward and reverse rate constants for the mandelate complex formation reactions were obtained to be $k_f=3.60{\times}10^4\;M^{-1}s^{-1}$ and $k_r=1.73{\times}10^2\;s^{-1}$ for the nickel(II), and $k_f=1.75{\times}10^5\;M^{-1}s{-1}$ and $2.33{\times}10^3\;s^{-1}$ for the cobalt(II) in aqueous solution of zero ionic strength ($(\mu{\to}0)\;at\;25^{\circ}C$. The results were interpreted by the use of the multistep complex formation mechanism. The rate constants evaluated for each individual steps in the multistep mechanism draw a conclusion that the rate of the reaction would be controlled by the chelate ring closure step in concert with the solvent exchange step in the nickel(II) complexation, while solely by the chelate ring closure step for the cobalt(II) complex.

SOME REMARKS FOR λ-SPIRALLIKE FUNCTION OF COMPLEX ORDER AT THE BOUNDARY OF THE UNIT DISC

  • Akyel, Tugba
    • Communications of the Korean Mathematical Society
    • /
    • v.36 no.4
    • /
    • pp.743-757
    • /
    • 2021
  • We consider a different version of Schwarz Lemma for λ-spirallike function of complex order at the boundary of the unit disc D. We estimate the modulus of the angular derivative of the function $\frac{zf^{\prime}(z)}{f(z)}$ from below for λ-spirallike function f(z) of complex order at the boundary of the unit disc D by taking into account the zeros of the function f(z)-z which are different from zero. We also estimate the same function with the second derivatives of the function f at the points z = 0 and z = z0 ≠ 0. We show the sharpness of these estimates and present examples.

ON SOME NEW SOLITONS SOLUTIONS OF NONLINEAR COMPLEX GINZBURG-LANDAU EQUATION SOLVED BY MODIFIED JACOBI ELLIPTIC FUNCTIONS METHOD

  • AICHA BOUSSAHA;HALIM ZEGHDOUDI;RAMAN VINOTH
    • Journal of applied mathematics & informatics
    • /
    • v.42 no.2
    • /
    • pp.391-398
    • /
    • 2024
  • This article explains how solitons propagate when there is a detuning factor involved. The explanation is based on the nonlinear complex Ginzburg-Landau equation, and we first consider this equation before systematically deriving its solutions using Jacobian elliptic functions. We illustrate that one specific ellipticity modulus is on the verge of occurring. The findings from this study can contribute to the understanding of previous research on the Ginzburg-Landau equation. Additionally, we utilize Jacobi's elliptic functions to define specific solutions, especially when the ellipticity modulus approaches either unity or zero. These solutions correspond to particular periodic wave solitons, which have been previously discussed in the literature.

Strengthening Enterprise Security through the Adoption of Zero Trust Architecture - A Focus on Micro-segmentation Approach - (제로 트러스트 아키텍처 도입을 통한 기업 보안 강화 방안 - 마이크로 세그먼테이션 접근법 중심으로 -)

  • Seung-Hyun Joo;Jin-Min Kim;Dae-Hyun Kwon;Yong-Tae Shin
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.3-11
    • /
    • 2023
  • Zero Trust, characterized by the principle of "Never Trust, Always Verify," represents a novel security paradigm. The proliferation of remote work and the widespread use of cloud services have led to the establishment of Work From Anywhere (WFA) environments, where access to corporate systems is possible from any location. In such environments, the boundaries between internal and external networks have become increasingly ambiguous, rendering traditional perimeter security models inadequate to address the complex and diverse nature of cyber threats and attacks. This research paper introduces the implementation principles of Zero Trust and focuses on the Micro Segmentation approach, highlighting its relevance in mitigating the limitations of perimeter security. By leveraging the risk management framework provided by the National Institute of Standards and Technology (NIST), this paper proposes a comprehensive procedure for the adoption of Zero Trust. The aim is to empower organizations to enhance their security strategies.

A NOTE ON DERIVATIONS OF A SULLIVAN MODEL

  • Kwashira, Rugare
    • Communications of the Korean Mathematical Society
    • /
    • v.34 no.1
    • /
    • pp.279-286
    • /
    • 2019
  • Complex Grassmann manifolds $G_{n,k}$ are a generalization of complex projective spaces and have many important features some of which are captured by the $Pl{\ddot{u}}cker$ embedding $f:G_{n,k}{\rightarrow}{\mathbb{C}}P^{N-1}$ where $N=\(^n_k\)$. The problem of existence of cross sections of fibrations can be studied using the Gottlieb group. In a more generalized context one can use the relative evaluation subgroup of a map to describe the cohomology of smooth fiber bundles with fiber the (complex) Grassmann manifold $G_{n,k}$. Our interest lies in making use of techniques of rational homotopy theory to address problems and questions involving applications of Gottlieb groups in general. In this paper, we construct the Sullivan minimal model of the (complex) Grassmann manifold $G_{n,k}$ for $2{\leq}k<n$, and we compute the rational evaluation subgroup of the embedding $f:G_{n,k}{\rightarrow}{\mathbb{C}}P^{N-1}$. We show that, for the Sullivan model ${\phi}:A{\rightarrow}B$, where A and B are the Sullivan minimal models of ${\mathbb{C}}P^{N-1}$ and $G_{n,k}$ respectively, the evaluation subgroup $G_n(A,B;{\phi})$ of ${\phi}$ is generated by a single element and the relative evaluation subgroup $G^{rel}_n(A,B;{\phi})$ is zero. The triviality of the relative evaluation subgroup has its application in studying fibrations with fibre the (complex) Grassmann manifold.

WRF Sensitivity Experiments on the Formation of the Convergent Cloud Band in Relation to the Orographic Effect of the Korean Peninsula (한반도 지형이 대상수렴운의 생성에 미치는 영향에 관한 WRF 민감도 실험)

  • Kim, Yu-Jin;Lee, Jae Gyoo
    • Atmosphere
    • /
    • v.25 no.1
    • /
    • pp.51-66
    • /
    • 2015
  • This study was conducted to perform various sensitivity experiments using WRF (Weather Research and Forecasting) model in order to determine the effects of terrains of the Korean Peninsula and the land-sea thermal contrast on the formation and development of the convergent cloud band for the cases of 1 February 2012. The sensitivity experiments consist of the following five ones: CNTL experiment (control experiment), and TMBT experiment, BDMT experiment and ALL experiment that set the terrain altitude of Taeback Mountains and Northern mountain complex as zero, respectively, and the altitude of the above-mentioned two mountains as zero, and LANDSEA experiment that set to change the Korean Peninsula into sea in order to find out the land-sea thermal contrast effect. These experiment results showed that a cold air current stemming from the Siberian high pressure met the group of northern mountains with high topography altitude and was separated into two air currents. These two separated air currents met each other again on the Middle and Northern East Sea, downstream of the group of northern mountains and converged finally, creating the convergent cloud band. And these experiments suggested that the convergent cloud band located on the Middle and Northern East Sea, and the cloud band lying on the southern East sea to the coastal waters of the Japanese Island facing the East Sea, were generated and developed by different dynamical mechanisms. Also it was found that the topography of Taeback Mountains created a warm air advection region due to temperature rise by adiabatic compression near the coastal waters of Yeongdong Region, downstream of the mountains. In conclusion, these experiment results clearly showed that the most essential factor having an effect on the generation and development of the convergent cloud band was the topography effect of the northern mountain complex, and that the land-sea thermal contrast effect was insignificant.

Experimental and mathematical evaluation of solar powered still equipped by nano plate as the principle stage of zero discharge desalination process

  • Jadidoleslami, Milad;Farahbod, Farshad
    • Advances in Energy Research
    • /
    • v.4 no.2
    • /
    • pp.147-161
    • /
    • 2016
  • To start with, finding a sustainable method to produce sweet water and electricity by using renewable energies is one of the most important issues at this time. So, experimental and theoretical analysis of the performance of a closed solar powered still, which is jointed to photovoltaic cells and vacuum pump and equipped by nano plate, as the principle stage of zero discharge desalination process is investigated in this project. Major goal of this work is to reuse the concentrated brine of the Mobin petrochemical complex in order to produce potable, sweet water from effluent saline wastewater and generating electricity in the same time by using solar energy instead of discharging them to the environment. It is observed the increase in brackish water temperature increases the average daily production of solar desalination still considerably. Therefore, the nano plate and vacuum pump are added to augment the evaporation rate. The insolation rate, evaporation rate, the average brackish temperature, ambient temperature, density are investigated during a year 2013. In addition to obtain the capacity of solar powered still, the highest and lowest amount of water and electricity generation are reported during a twelvemonth (2013). Results indicate the average daily production is increased 16%, which represents 7.78 kW.h energy saving comparing with traditional solar still.

A Fast and Secure Method to Preserve Anonymity in Electronic Voting (전자투표에서 익명성 보장을 위한 빠르고 안전한 방식)

  • Yang, Hyung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.245-251
    • /
    • 2014
  • Mix network plays a key role in electronic voting to preserve anonymity and lots of mixnet schemes have been proposed so far. However, they requires complex and costly zero-knowledge proofs to provide their correct mixing operations. In 2010, Seb$\acute{e}$ et al. proposed an efficient and lightweight mixnet scheme based on a cryptographic secure hash function instead of zero-knowledge proofs. In this paper, we present a more efficient and faster mixnet scheme than Seb$\acute{e}$ et al.'s scheme under the same assumption. Also, our scheme is secure.

A Study of Consistency in Estimating the Number of Vacant Jobs Using the Labor Force Survey at Establishments (사업체노동력조사를 활용한 빈 일자리 수 추정에 대한 정합성 연구)

  • Park, Seung-Hwan
    • Asia-Pacific Journal of Business
    • /
    • v.13 no.3
    • /
    • pp.329-341
    • /
    • 2022
  • Purpose - The purpose of this study was to investigate consistency in estimating the number of vacant jobs using the two business labor force survey with two different time points of survey. Design/methodology/approach - We studied the cause of the differences in estimating the number of vacant jobs between the monthly sample and the new sample in business labor force survey. Findings - To summarize our findings, As the size of the company increases, the number of vacant jobs in the company also increases, and the probability that the number of vacant jobs in the company is zero decreases. The monthly sample was assessed to have a higher likelihood that the number of vacant jobs in the company was zero and the number of vacant jobs was considerable compared to the local sample. Research implications or Originality - Because local survey sample companies tend to minimize the number of vacant jobs even when they reply under the same conditions, the estimation result of the number of vacant jobs in the current monthly survey differs significantly from the estimation result of the local survey. Divergent "degrees of knowledge of question items," survey methodologies, or investigators could be the causes of the various response trends.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.