86 resultados para Combined sewer overflows.
Resumo:
We present a novel method and instrument for in vivo imaging and measurement of the human corneal dynamics during an air puff. The instrument is based on high-speed swept source optical coherence tomography (ssOCT) combined with a custom adapted air puff chamber from a non-contact tonometer, which uses an air stream to deform the cornea in a non-invasive manner. During the short period of time that the deformation takes place, the ssOCT acquires multiple A-scans in time (M-scan) at the center of the air puff, allowing observation of the dynamics of the anterior and posterior corneal surfaces as well as the anterior lens surface. The dynamics of the measurement are driven by the biomechanical properties of the human eye as well as its intraocular pressure. Thus, the analysis of the M-scan may provide useful information about the biomechanical behavior of the anterior segment during the applanation caused by the air puff. An initial set of controlled clinical experiments are shown to comprehend the performance of the instrument and its potential applicability to further understand the eye biomechanics and intraocular pressure measurements. Limitations and possibilities of the new apparatus are discussed.
Resumo:
We present here a numerical study of laminar doubly diffusive free convection flows adjacent to a vertical surface in a stable thermally stratified medium. The governing equations of mass, momentum, energy and species are non-dimensionalized. These equations have been solved by using an implicit finite difference method and local non-similarity method. The results show many interesting aspects of complex interaction of the two buoyant mechanisms that have been shown in both the tabular as well as graphical form.
Resumo:
A time-resolved inverse spatially offset Raman spectrometer was constructed for depth profiling of Raman-active substances under both the lab and the field environments. The system operating principles and performance are discussed along with its advantages relative to traditional continuous wave spatially offset Raman spectrometer. The developed spectrometer uses a combination of space- and time-resolved detection in order to obtain high-quality Raman spectra from substances hidden behind coloured opaque surface layers, such as plastic and garments, with a single measurement. The time-gated spatially offset Raman spectrometer was successfully used to detect concealed explosives and drug precursors under incandescent and fluorescent background light as well as under daylight. The average screening time was 50 s per measurement. The excitation energy requirements were relatively low (20 mW) which makes the probe safe for screening hazardous substances. The unit has been designed with nanosecond laser excitation and gated detection, making it of lower cost and complexity than previous picosecond-based systems, to provide a functional platform for in-line or in-field sensing of chemical substances.
Resumo:
In this paper, No-Wait, No-Buffer, Limited-Buffer, and Infinite-Buffer conditions for the flow-shop problem (FSP) have been investigated. These four different buffer conditions have been combined to generate a new class of scheduling problem, which is significant for modelling many real-world scheduling problems. A new heuristic algorithm is developed to solve this strongly NP-hard problem. Detailed numerical implementations have been analysed and promising results have been achieved.
Resumo:
Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.
Resumo:
Australasian marsupials include three major radiations, the insectivorous/carnivorous Dasyuromorphia, the omnivorous bandicoots (Peramelemorphia), and the largely herbivorous diprotodontians. Morphologists have generally considered the bandicoots and diprotodontians to be closely related, most prominently because they are both syndactylous (with the 2nd and 3rd pedal digits being fused). Molecular studies have been unable to confirm or reject this Syndactyla hypothesis. Here we present new mitochondrial (mt) genomes from a spiny bandicoot (Echymipera rufescens) and two dasyurids, a fat-tailed dunnart (Sminthopsis crassicaudata) and a northern quoll (Dasyurus hallucatus). By comparing trees derived from pairwise base-frequency differences between taxa with standard (absolute, uncorrected) distance trees, we infer that composition bias among mt protein-coding and RNA sequences is sufficient to mislead tree reconstruction. This can explain incongruence between trees obtained from mt and nuclear data sets. However, after excluding major sources of compositional heterogeneity, both the “reduced-bias” mt and nuclear data sets clearly favor a bandicoot plus dasyuromorphian association, as well as a grouping of kangaroos and possums (Phalangeriformes) among diprotodontians. Notably, alternatives to these groupings could only be confidently rejected by combining the mt and nuclear data. Elsewhere on the tree, Dromiciops appears to be sister to the monophyletic Australasian marsupials, whereas the placement of the marsupial mole (Notoryctes) remains problematic. More generally, we contend that it is desirable to combine mt genome and nuclear sequences for inferring vertebrate phylogeny, but as separately modeled process partitions. This strategy depends on detecting and excluding (or accounting for) major sources of nonhistorical signal, such as from compositional nonstationarity.
Resumo:
This study describes the design of a biphasic scaffold composed of a Fused Deposition Modeling scaffold (bone compartment) and an electrospun membrane (periodontal compartment) for periodontal regeneration. In order to achieve simultaneous alveolar bone and periodontal ligament regeneration a cell-based strategy was carried out by combining osteoblast culture in the bone compartment and placement of multiple periodontal ligament (PDL) cell sheets on the electrospun membrane. In vitro data showed that the osteoblasts formed mineralized matrix in the bone compartment after 21 days in culture and that the PDL cell sheet harvesting did not induce significant cell death. The cell-seeded biphasic scaffolds were placed onto a dentin block and implanted for 8 weeks in an athymic rat subcutaneous model. The scaffolds were analyzed by μCT, immunohistochemistry and histology. In the bone compartment, a more intense ALP staining was obtained following seeding with osteoblasts, confirming the μCT results which showed higher mineralization density for these scaffolds. A thin mineralized cementum-like tissue was deposited on the dentin surface for the scaffolds incorporating the multiple PDL cell sheets, as observed by H&E and Azan staining. These scaffolds also demonstrated better attachment onto the dentin surface compared to no attachment when no cell sheets were used. In addition, immunohistochemistry revealed the presence of CEMP1 protein at the interface with the dentine. These results demonstrated that the combination of multiple PDL cell sheets and a biphasic scaffold allows the simultaneous delivery of the cells necessary for in vivo regeneration of alveolar bone, periodontal ligament and cementum. © 2012 Elsevier Ltd.
Resumo:
This paper presents the details of an experimental study of a cold-formed steel beam known as LiteSteel Beam (LSB) subject to combined shear and bending actions. The LSBs have the beneficial characteristics of torsionally rigid rectangular hollow flanges combined with economical fabrication processes from a single strip of high strength steel. They combine the stability of hot-rolled steel sections with the high strength to weight ratio of conventional cold-formed steel sections. The LSB sections are commonly used as flexural members in residential, industrial and commercial buildings. In order to ensure safe and efficient designs of LSBs, many research studies have been undertaken on the flexural and shear strengths of LSBs. To date, however, no investigation has been conducted into the strength of LSB sections under combined shear and bending actions. Hence a detailed experimental study involving 18 tests was undertaken to investigate the behaviour and strength of LSBs under combined shear and bending actions. Test results showed that AS/NZS 4600 design rules for unstiffened webs grossly underestimated the capacity of LSBs. Therefore improved design equations were proposed for the combined shear and bending capacities of LSBs based on experimental results.
Resumo:
This paper presents the details of a numerical study of a cold-formed steel beam known as LiteSteel Beam (LSB) subject to combined shear and bending actions. The LSB sections are produced by a patented manufacturing process involving simultaneous cold-forming and electric resistance welding. They have a unique shape of a channel beam with two rectangular hollow flanges. To date, however, no investigation has been conducted into the strength of LSB sections under combined shear and bending actions. Hence a numerical study was undertaken to investigate the behaviour and strength of LSBs subject to combined shear and bending actions. In this research, finite element models of LSBs were developed to simulate the combined shear and bending behaviour and strength of LSBs. They were then validated by comparing their results with test results and used in a parametric study. Both experimental and finite element analysis results showed that the current design equations are not suitable for combined shear and bending capacities of LSBs. Hence improved design equations are proposed for the capacities of LSBs subject to combined shear and bending actions.