46 resultados para Restriction ring


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A one-dimensional ring-pack lubrication model developed at MIT is applied to simulate the oil film behavior during the warm-up period of a Kohler spark ignition engine [1]. This is done by making assumptions for the evolution of the oil temperatures during warm-up and that the oil control ring during downstrokes is fully flooded. The ring-pack lubrication model includes features such as three different lubrication regimes, i.e. pure hydrodynamic lubrication, boundary lubrication and pure asperity contact, non-steady wetting of both inlet and outlet of the piston ring, capability to use all ring face profiles that can be approximated by piece-wise polynomials and, finally, the ability to model the rheology of multi-grade oils. Not surprisingly, the simulations show that by far the most important parameter is the temperature dependence of the oil viscosity. This dependence is subsequently examined further by choosing different oils. The baseline oil is SAE 10W30 and results are compared to those using the SAE 30 and the SAE 10W50 oils.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although a wide range of techniques exist for slope monitoring, the task of monitoring slopes is sometimes complicated by the extensive nature and unpredictability of slope movements. The Brillouin optical time-domain reflectometer (BOTDR) is a distributed optical fiber strain measurement technology utilising Brillouin scattering. This method measures continuous strain along a standard optical fibre over a distance up to 10 km and hence has potential to detect deformations and diagnose problems along large sections of slopes and embankments. This paper reports the demonstration of BOTDR method for monitoring surface ground movements of clay cuttings and embankments along London's ring M25 motorway. A field trial investigating varying methods of onsite fibre optic installations was conducted. The surrounding ground was artificially moved by excavating a 3 m deep trench perpendicular to the instrumented sections. Results obtained from onsite installations after slope movement demonstrate a half-pipe covered fibre optic installed on wide (200mm) Tensar ™SS20 geogrid gives the most consistent recorded strain change profile. Initial conclusions suggest this method best represents induced ground motion at the surface and hence is recommended for implementation in future sitework. Copyright ASCE 2008.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RFID is a technology that enables the automated capture of observations of uniquely identified physical objects as they move through supply chains. Discovery Services provide links to repositories that have traceability information about specific physical objects. Each supply chain party publishes records to a Discovery Service to create such links and also specifies access control policies to restrict who has visibility of link information, since it is commercially sensitive and could reveal inventory levels, flow patterns, trading relationships, etc. The requirement of being able to share information on a need-to-know basis, e.g. within the specific chain of custody of an individual object, poses a particular challenge for authorization and access control, because in many supply chain situations the information owner might not have sufficient knowledge about all the companies who should be authorized to view the information, because the path taken by an individual physical object only emerges over time, rather than being fully pre-determined at the time of manufacture. This led us to consider novel approaches to delegate trust and to control access to information. This paper presents an assessment of visibility restriction mechanisms for Discovery Services capable of handling emergent object paths. We compare three approaches: enumerated access control (EAC), chain-of-communication tokens (CCT), and chain-of-trust assertions (CTA). A cost model was developed to estimate the additional cost of restricting visibility in a baseline traceability system and the estimates were used to compare the approaches and to discuss the trade-offs. © 2012 IEEE.