363 resultados para fracture network
Resumo:
To evaluate the parameters in the two-parameter fracture model, i.e. the critical stress intensity factor and critical crack tip opening displacement for the fracture of plain concrete in Mode 1 for the given test configuration and geometry, considerable computational effort is necessary. A simple graphical method has been proposed using normalized fracture parameters for the three-point bend (3PB) notched specimen and the double-edged notched (DEN) specimen. A similar graphical method is proposed to compute the maximum load carrying capacity of a specimen, using the critical fracture parameters both for 3PB and DEN configurations.
Resumo:
With increased number of new services and users being added to the communication network, management of such networks becomes crucial to provide assured quality of service. Finding skilled managers is often a problem. To alleviate this problem and also to provide assistance to the available network managers, network management has to be automated. Many attempts have been made in this direction and it is a promising area of interest to researchers in both academia and industry. In this paper, a review of the management complexities in present day networks and artificial intelligence approaches to network management are presented. Published by Elsevier Science B.V.
Resumo:
Cure kinetics for the formation of copolyurethane networks of various compositions based on hydroxy-terminated polybutadiene(HTPB), poly(12-hydroxy stearic acid-co-TMP) ester polyol(PEP), and different isocyanates has been studied through viscosity build up during the cure reaction. The viscosity (N)-time (t) plots conform to the equation N = ae(bt), where a and b are empirical constants, dependent on the composition and the nature of the polyols and the isocyanates. The rate constants (b) for viscosity build up, evaluated from the slopes of dN/dt versus N plots at different temperatures, were found to vary significantly from 0.0073 to 0.25 min(-1); and the activation energies for gelation were found to be in the range 20 to 40 kJ mol(-1). The results have been interpreted in terms of the dependence of the rate constants on structural characteristics of the prepolymers. (C) 1997 John Wiley & Sons, Inc.
Resumo:
In this article, we present a novel application of a quantum clustering (QC) technique to objectively cluster the conformations, sampled by molecular dynamics simulations performed on different ligand bound structures of the protein. We further portray each conformational population in terms of dynamically stable network parameters which beautifully capture the ligand induced variations in the ensemble in atomistic detail. The conformational populations thus identified by the QC method and verified by network parameters are evaluated for different ligand bound states of the protein pyrrolysyl-tRNA synthetase (DhPylRS) from D. hafniense. The ligand/environment induced re-distribution of protein conformational ensembles forms the basis for understanding several important biological phenomena such as allostery and enzyme catalysis. The atomistic level characterization of each population in the conformational ensemble in terms of the re-orchestrated networks of amino acids is a challenging problem, especially when the changes are minimal at the backbone level. Here we demonstrate that the QC method is sensitive to such subtle changes and is able to cluster MD snapshots which are similar at the side-chain interaction level. Although we have applied these methods on simulation trajectories of a modest time scale (20 ns each), we emphasize that our methodology provides a general approach towards an objective clustering of large-scale MD simulation data and may be applied to probe multistate equilibria at higher time scales, and to problems related to protein folding for any protein or protein-protein/RNA/DNA complex of interest with a known structure.
Resumo:
In this paper, an overview of some recent computational studies by the authors on ductile crack initiation under mode I, dynamic loading is presented. In these studies, a large deformation finite element procedure is employed along with the viscoplastic version of the Gurson constitutive model that accounts for the micro-mechanical processes of void nucleation, growth and coalescence. A three-point bend fracture specimen subjected to impact, and a single edge notched specimen loaded by a tensile stress pulse are analysed. Several loading rates are simulated by varying the impact speed or the rise time and magnitude of the stress pulse. A simple model involving a semi-circular notch with a pre-nucleated circular hole situated ahead of it is considered. The growth of the hole and its interaction with the notch tip, which leads to plastic strain and porosity localization in the ligament connecting them, is simulated. The role of strain-rate dependence on ductile crack initiation at high loading rates, and the specimen geometry effect on the variation of dynamic fracture toughness with loading rate are Investigated.
Resumo:
The complex singularity associated with a crack at the interface between two dissimilar, isotropic and homogeneous materials leads to mathematical artefacts, such as stress oscillations and crack face interpenetrations in the vicinity of the crack tip. To avoid these unrealistic features, Sinclair (Sinclair GB. On the stress singularity at an interface crack. International Journal of Fracture 1980;16(2):111-9) assumed a finite crack opening angle (COA) such that the singularity lambda became real equal to 1/2. This paper extends the COA model by considering real singularities not necessarily equal to 1/2. When COA is 0 degrees: the interface crack singularity is complex with a real part equal to 1/2. On increasing COA, the imaginary part of the singularity decreases and becomes zero at a threshold value of COA; at this point, the singularity is a real, repeated value. A further increase in COA results in a pair of real singularities. Different crack opening configurations and material combinations are studied, and results presented for threshold COAs and associated values of singularity. Stress analyses for these three regimes: (a) complex, (b) real pair and (c) real repeated singularities, are reported. It is seen that additional complexities are present in the last case. Typical results for stress fields are also included for comparing with standard fields. (C) 1999 Elsevier Science Ltd. All rights reserved.
Resumo:
This paper is aimed at investigating the acoustic emission activities during indentation toughness tests on an alumina based wear resistant ceramic and 25 wt% silicon carbide whisker (SIC,) reinforced alumina composite. It has been shown that the emitted acoustic emission signals characterize the crack growth during loading. and unloading cycles in an indentation test. The acoustic emission results indicate that in the case of the composite the amount of crack growth during unloading is higher than that of loading, while the reverse is true in case of the wear resistant ceramics. Acoustic emission activity observed in wear resistant ceramic is less than that in the case of composite. An attempt has been made to correlate the acoustic emission signals with crack growth during indentation test.
Resumo:
Hardened concrete is a three-phase composite consisting of cement paste, aggregate and interface between cement paste and aggregate. The interface in concrete plays a key role on the overall performance of concrete. The interface properties such as deformation, strength, fracture energy, stress intensity and its influence on stiffness and ductility of concrete have been investigated. The effect of composition of cement, surface characteristics of aggregate and type of loading have been studied. The load-deflection response is linear showing that the linear elastic fracture mechanics (LEFM) is applicable to characterize interface. The crack deformation increases with large rough aggregate surfaces. The strength of interface increases with the richness of concrete mix. The interface fracture energy increases as the roughness of the aggregate surface increases. The interface energy under mode II loading increases with the orientation of aggregate surface with the direction of loading. The chemical reaction between smooth aggregate surface and the cement paste seems to improve the interface energy. The ductility of concrete decreases as the surface area of the strong interface increases. The fracture toughness (stress intensity factor) of the interface seems to be very low, compared with hardened cement paste, mortar and concrete.
Resumo:
A neural network has been used to predict the flow intermittency from velocity signals in the transition zone in a boundary layer. Unlike many of the available intermittency detection methods requiring a proper threshold choice in order to distinguish between the turbulent and non-turbulent parts of a signal, a trained neural network does not involve any threshold decision. The intermittency prediction based on the neural network has been found to be very satisfactory.
Resumo:
Representatives of several Internet access providers have expressed their wish to see a substantial change in the pricing policies of the Internet. In particular, they would like to see content providers pay for use of the network, given the large amount of resources they use. This would be in clear violation of the �network neutrality� principle that had characterized the development of the wireline Internet. Our first goal in this paper is to propose and study possible ways of implementing such payments and of regulating their amount. We introduce a model that includes the internaut�s behavior, the utilities of the ISP and of the content providers, and the monetary flow that involves the internauts, the ISP and content provider, and in particular, the content provider�s revenues from advertisements. We consider various game models and study the resulting equilibrium; they are all combinations of a noncooperative game (in which the service and content providers determine how much they will charge the internauts) with a cooperative one - the content provider and the service provider bargain with each other over payments to one another. We include in our model a possible asymmetric bargaining power which is represented by a parameter (that varies between zero to one). We then extend our model to study the case of several content providers. We also provide a very brief study of the equilibria that arise when one of the content providers enters into an exclusive contract with the ISP.
Resumo:
A single source network is said to be memory-free if all of the internal nodes (those except the source and the sinks) do not employ memory but merely send linear combinations of the symbols received at their incoming edges on their outgoing edges. In this work, we introduce network-error correction for single source, acyclic, unit-delay, memory-free networks with coherent network coding for multicast. A convolutional code is designed at the source based on the network code in order to correct network- errors that correspond to any of a given set of error patterns, as long as consecutive errors are separated by a certain interval which depends on the convolutional code selected. Bounds on this interval and the field size required for constructing the convolutional code with the required free distance are also obtained. We illustrate the performance of convolutional network error correcting codes (CNECCs) designed for the unit-delay networks using simulations of CNECCs on an example network under a probabilistic error model.
Resumo:
A single-source network is said to be memory-free if all of the internal nodes (those except the source and the sinks) do not employ memory but merely send linear combinations of the incoming symbols (received at their incoming edges) on their outgoing edges. Memory-free networks with delay using network coding are forced to do inter-generation network coding, as a result of which the problem of some or all sinks requiring a large amount of memory for decoding is faced. In this work, we address this problem by utilizing memory elements at the internal nodes of the network also, which results in the reduction of the number of memory elements used at the sinks. We give an algorithm which employs memory at all the nodes of the network to achieve single- generation network coding. For fixed latency, our algorithm reduces the total number of memory elements used in the network to achieve single- generation network coding. We also discuss the advantages of employing single-generation network coding together with convolutional network-error correction codes (CNECCs) for networks with unit- delay and illustrate the performance gain of CNECCs by using memory at the intermediate nodes using simulations on an example network under a probabilistic network error model.
Resumo:
The integration of different wireless networks, such as GSM and WiFi, as a two-tier hybrid wireless network is more popular and economical. Efficient bandwidth management, call admission control strategies and mobility management are important issues in supporting multiple types of services with different bandwidth requirements in hybrid networks. In particular, bandwidth is a critical commodity because of the type of transactions supported by these hybrid networks, which may have varying bandwidth and time requirements. In this paper, we consider such a problem in a hybrid wireless network installed in a superstore environment and design a bandwidth management algorithm based on the priority level, classification of the incoming transactions. Our scheme uses a downlink transaction scheduling algorithm, which decides how to schedule the outgoing transactions based on their priority level with efficient use of available bandwidth. The transaction scheduling algorithm is used to maximize the number of transaction-executions. The proposed scheme is simulated in a superstore environment with multi Rooms. The performance results describe that the proposed scheme can considerably improve the bandwidth utilization by reducing transaction blocking and accommodating more essential transactions at the peak time of the business.
Resumo:
Syntactic foams made by mechanical mixing of polymeric binder and hollow spherical particles are used as core materials in sandwich structured materials. Low density of such materials makes them suitable for weight sensitive applications. The present study correlates various postcompression microscopic observations in syntactic foams to the localized events leading the material to fracture. Depending upon local stress conditions the fracture features of syntactic foam are identified for various modes of fracture such as compressive, shear and tensile. Microscopic observations were also taken at sandwich structures containing syntactic foam as core materials and also at reinforced syntactic foam containing glass fibers. These observations provide conclusive evidences for the fracture features generated under different failure modes. All the microscopic observations were taken using scanning electron microscope in secondary electron mode. (C) 2002 Kluwer Academic Publishers.
Resumo:
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level helps in designing efficient storage systems. Second, it helps create benchmarks that mimic realistic application behavior closely. Third, it enables autonomic systems as the information obtained can be used to adapt the system in a closed loop.All these use cases require the ability to extract the application-level semantics of I/O operations. Methods such as modifying application code to associate I/O operations with semantic tags are intrusive. It is well known that network file system traces are an important source of information that can be obtained non-intrusively and analyzed either online or offline. These traces are a sequence of primitive file system operations and their parameters. Simple counting, statistical analysis or deterministic search techniques are inadequate for discovering application-level semantics in the general case, because of the inherent variation and noise in realistic traces.In this paper, we describe a trace analysis methodology based on Profile Hidden Markov Models. We show that the methodology has powerful discriminatory capabilities that enable it to recognize applications based on the patterns in the traces, and to mark out regions in a long trace that encapsulate sets of primitive operations that represent higher-level application actions. It is robust enough that it can work around discrepancies between training and target traces such as in length and interleaving with other operations. We demonstrate the feasibility of recognizing patterns based on a small sampling of the trace, enabling faster trace analysis. Preliminary experiments show that the method is capable of learning accurate profile models on live traces in an online setting. We present a detailed evaluation of this methodology in a UNIX environment using NFS traces of selected commonly used applications such as compilations as well as on industrial strength benchmarks such as TPC-C and Postmark, and discuss its capabilities and limitations in the context of the use cases mentioned above.