5 resultados para CFP
em Indian Institute of Science - Bangalore - Índia
Resumo:
Ballast fouling is created by the breakdown of aggregates or outside contamination by coal dust from coal trains, or from soil intrusion beneath rail track. Due to ballast fouling, the conditions of rail track can be deteriorated considerably depending on the type of fouling material and the degree of fouling. So far there is no comprehensive guideline available to identify the critical degree of fouling for different types of fouling materials. This paper presents the identification of degree of fouling and types of fouling using non-destructive testing, namely seismic surface-wave and ground penetrating radar (GPR) survey. To understand this, a model rail track with different degree of fouling has been constructed in Civil engineering laboratory, University of Wollongong, Australia. Shear wave velocity obtained from seismic survey has been employed to identify the degree of fouling and types of fouling material. It is found that shear wave velocity of fouled ballast increases initially, reaches optimum fouling point (OFP), and decreases when the fouling increases. The degree of fouling corresponding after which the shear wave velocity of fouled ballast will be smaller than that of clean ballast is called the critical fouling point (CFP). Ground penetrating radar with four different ground coupled antennas (500 MHz, 800 MHz, 1.6 GHz and 2.3 GHz) was also used to identify the ballast fouling condition. It is found that the 800 MHz ground coupled antenna gives a better signal in assessing the ballast fouling condition. Seismic survey is relatively slow when compared to GPR survey however it gives quantifiable results. In contrast, GPR survey is faster and better in estimating the depth of fouling. (C) 2011 Elsevier B.V. All rights reserved.
Resumo:
The efficiency of track foundation material gradually decreases due to insufficient lateral confinement, ballast fouling, and loss of shear strength of the subsurface soil under cyclic loading. This paper presents characterization of rail track subsurface to identify ballast fouling and subsurface layers shear wave velocity using seismic survey. Seismic surface wave method of multi-channel analysis of surface wave (MASW) has been carried out in the model track and field track for finding out shear wave velocity of the clean and fouled ballast and track subsurface. The shear wave velocity (SWV) of fouled ballast increases with increase in fouling percentage, and reaches a maximum value and then decreases. This character is similar to typical compaction curve of soil, which is used to define optimum and critical fouling percentage (OFP and CFP). Critical fouling percentage of 15 % is noticed for Coal fouled ballast and 25 % is noticed for clayey sand fouled ballast. Coal fouled ballast reaches the OFP and CFP before clayey sand fouled ballast. Fouling of ballast reduces voids in ballast and there by decreases the drainage. Combined plot of permeability and SWV with percentage of fouling shows that after critical fouling point drainage condition of fouled ballast goes below acceptable limit. Shear wave velocities are measured in the selected location in the Wollongong field track by carrying out similar seismic survey. In-situ samples were collected and degrees of fouling were measured. Field SWV values are more than that of the model track SWV values for the same degree of fouling, which might be due to sleeper's confinement. This article also highlights the ballast gradation widely followed in different countries and presents the comparison of Indian ballast gradation with international gradation standards. Indian ballast contains a coarser particle size when compared to other countries. The upper limit of Indian gradation curve matches with lower limit of ballast gradation curves of America and Australia. The ballast gradation followed by Indian railways is poorly graded and more favorable for the drainage conditions. Indian ballast engineering needs extensive research to improve presents track conditions.
Resumo:
Mobile ad hoc networks (MANETs) is one of the successful wireless network paradigms which offers unrestricted mobility without depending on any underlying infrastructure. MANETs have become an exciting and im- portant technology in recent years because of the rapid proliferation of variety of wireless devices, and increased use of ad hoc networks in various applications. Like any other networks, MANETs are also prone to variety of attacks majorly in routing side, most of the proposed secured routing solutions based on cryptography and authentication methods have greater overhead, which results in latency problems and resource crunch problems, especially in energy side. The successful working of these mechanisms also depends on secured key management involving a trusted third authority, which is generally difficult to implement in MANET environ-ment due to volatile topology. Designing a secured routing algorithm for MANETs which incorporates the notion of trust without maintaining any trusted third entity is an interesting research problem in recent years. This paper propose a new trust model based on cognitive reasoning,which associates the notion of trust with all the member nodes of MANETs using a novel Behaviors-Observations- Beliefs(BOB) model. These trust values are used for detec- tion and prevention of malicious and dishonest nodes while routing the data. The proposed trust model works with the DTM-DSR protocol, which involves computation of direct trust between any two nodes using cognitive knowledge. We have taken care of trust fading over time, rewards, and penalties while computing the trustworthiness of a node and also route. A simulator is developed for testing the proposed algorithm, the results of experiments shows incorporation of cognitive reasoning for computation of trust in routing effectively detects intrusions in MANET environment, and generates more reliable routes for secured routing of data.
Resumo:
One of the challenges for accurately estimating Worst Case Execu-tion Time(WCET) of executables is to accurately predict their cache behaviour. Various techniques have been developed to predict the cache contents at different program points to estimate the execution time of memory-accessing instructions. One of the most widely used techniques is Abstract Interpretation based Must Analysis, which de-termines the cache blocks guaranteed to be present in the cache, and hence provides safe estimation of cache hits and misses. However,Must Analysis is highly imprecise, and platforms using Must Analysis have been known to produce blown-up WCET estimates. In our work, we propose to use May Analysis to assist the Must Analysis cache up-date and make it more precise. We prove the safety of our approach as well as provide examples where our Improved Must Analysis provides better precision. Further, we also detect a serious flaw in the original Persistence Analysis, and use Must and May Analysis to assist the Persistence Analysis cache update, to make it safe and more precise than the known solutions to the problem.
Resumo:
We previously reported that Rv1860 protein from Mycobacterium tuberculosis stimulated CD4(+) and CD8(+) T cells secreting gamma interferon (IFN-gamma) in healthy purified protein derivative (PPD)-positive individuals and protected guinea pigs immunized with a DNA vaccine and a recombinant poxvirus expressing Rv1860 from a challenge with virulent M. tuberculosis. We now show Rv1860-specific polyfunctional T (PFT) cell responses in the blood of healthy latently M. tuberculosis-infected individuals dominated by CD8(+) T cells, using a panel of 32 overlapping peptides spanning the length of Rv1860. Multiple subsets of CD8(+) PFT cells were significantly more numerous in healthy latently infected volunteers (HV) than in tuberculosis (TB) patients (PAT). The responses of peripheral blood mononuclear cells (PBMC) from PAT to the peptides of Rv1860 were dominated by tumor necrosis factor alpha (TNF-alpha) and interleukin-10 (IL-10) secretions, the former coming predominantly from non-T cell sources. Notably, the pattern of the T cell response to Rv1860 was distinctly different from those of the widely studied M. tuberculosis antigens ESAT-6, CFP-10, Ag85A, and Ag85B, which elicited CD4(+) T cell-dominated responses as previously reported in other cohorts. We further identified a peptide spanning amino acids 21 to 39 of the Rv1860 protein with the potential to distinguish latent TB infection from disease due to its ability to stimulate differential cytokine signatures in HV and PAT. We suggest that a TB vaccine carrying these and other CD8(+) T-cell-stimulating antigens has the potential to prevent progression of latent M. tuberculosis infection to TB disease.