Computational design of corrosion-resistant and wear-resistant titanium alloys for orthopedic implants
- Award ID(s):
- 1954621
- PAR ID:
- 10361377
- Date Published:
- Journal Name:
- Materials Today Communications
- Volume:
- 33
- Issue:
- C
- ISSN:
- 2352-4928
- Page Range / eLocation ID:
- 104465
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
"This paper studies the lap shear, in which both the adhesive and adherends are elastic, but the adhesive is much softer than the adherends. The shear lag model identifies a length, called the shear lag length Ls. The energy release rate of a debond crack is affected by the elasticity of both the adhesive and adherends. Their relative importance is characterized by the ratio of the length of the remaining joint, L, to the shear lag length, Ls. In the short-joint limit, L/Ls→0, the adherends do not deform, and the elasticity of the adhesive gives the energy release rate. In the long-joint limit, L/Ls→∞, the interior of the adhesive does not deform, and the elasticity of the adherends gives the energy release rate. The shear lag model gives an approximate expression of the energy release rate for all values of L/Ls. This expression is in excellent agreement with the results obtained by finite element calculations, so long as the crack is long compared to the thickness of the adhesive."more » « less
-
null (Ed.)Hydraphiles are synthetic amphiphiles that form pores in bilayer membranes. A study was undertaken to determine if the formation of pores could assist the penetration of antibiotics into bacteria. The disruption of ion homeostasis by the pore-formers leads to microbial toxicity. Co-administration of hydraphiles at concentration ≤ ½ MIC and antimicrobials to E. coli or P. aeruginosa showed potency enhancements of up to 30-fold. A possible mechanism is the enhancement of antibiotic influx owing to membrane disruption and/or altering the ion balance within the bacterial cells.more » « less
-
Canteaut, A. (Ed.)The increasing deployment of end-to-end encrypted communications services has ignited a debate between technology firms and law enforcement agencies over the need for lawful access to encrypted communications. Unfortunately, existing solutions to this problem suffer from serious technical risks, such as the possibility of operator abuse and theft of escrow key material. In this work we investigate the problem of constructing law enforcement access systems that mitigate the possibility of unauthorized surveillance. We first define a set of desirable properties for an abuse-resistant law enforcement access system (ARLEAS), and motivate each of these properties. We then formalize these definitions in the Universal Composability (UC) framework, and present two main constructions that realize this definition. The first construction enables prospective access, allowing surveillance only if encryption occurs after a warrant has been issued and activated. The second, more powerful construction, allows retrospective access to communications that occurred prior to a warrant’s issuance. To illustrate the technical challenge of constructing the latter type of protocol, we conclude by investigating the minimal assumptions required to realize these systems.more » « less
An official website of the United States government

