621 resultados para Sergio Ramírez
Resumo:
A procedure is proposed to accurately model thin wires in lossy media by finite element analysis. It is based on the determination of a suitable element width in the vicinity of the wire, which strongly depends on the wire radius to yield accurate results. The approach is well adapted to the analysis of grounding systems. The numerical results of the application of finite element analysis with the suitably chosen element width are compared with both analytical results and those computed by a commercial package for the analysis of grounding systems, showing very good agreement.
Resumo:
Sigma phase is a deleterious one which can be formed in duplex stainless steels during heat treatment or welding. Aiming to accompany this transformation, ferrite and sigma percentage and hardness were measured on samples of a UNS S31803 duplex stainless steel submitted to heat treatment. These results were compared to measurements obtained from ultrasound and eddy current techniques, i.e., velocity and impedance, respectively. Additionally, backscattered signals produced by wave propagation were acquired during ultrasonic inspection as well as magnetic Barkhausen noise during magnetic inspection. Both signal types were processed via a combination of detrended-fluctuation analysis (DFA) and principal component analysis (PCA). The techniques used were proven to be sensitive to changes in samples related to sigma phase formation due to heat treatment. Furthermore, there is an advantage using these methods since they are nondestructive. (C) 2010 Elsevier B.V. All rights reserved.
Resumo:
Crushed stone mining is the third largest mining economy in Brazil, where almost half is produced in the Sao Paulo metropolitan region. The segment registers the highest number of accidents among the extractive industries, which justifies the concern with workers` health and safety, and the importance of controlling occupational hazards. Since 2002, the NR-22 Standard (NR-22: Occupational Health and Safety in Mining) makes compulsory the elaboration of a Risk Management Program that identifies risks and establishes control measures. Considering the crushed stone mining industry importance to the state, this paper evaluates and discusses the risks identified in unit operations during the production process of crushed stone in an open pit mine in order to propose control measures for the development of the Risk Management Program. Although this study refers to a specific quarry, it can be applied to other mines from the same sector since some considerations are made regarding differences in manufacturing processes. The research was based on the identification of the main risks associated with drilling, blasting, load & haulage, crushing and screening through field measurements of some hazardous agents, together with company reports. The results contributed to the choice of the appropriate control measures for the improvement Of workers` health and safety conditions.
Resumo:
The purpose of this study was to investigate the respiratory protective device selection process and to identify changes in this process when an exposure limit value is updated. Two previous studies conducted in mining industries in the metropolitan area of Sao Paulo were put through the respiratory protective device selection process. The protection factors of the equipment provided by the companies were compared with the required protection factors and with the FUNDACENTRO`s respiratory protection program. The results showed that until 2005, some companies were providing inadequate protection, and after the change in crystalline silica exposure limit value in 2006, all the analyzed companies were providing inadequate respirators. This study suggests that there is an opportunity to create a web portal, where the selection process can be done by the companies with updated information.
Resumo:
The purpose of this paper was to study the main effects of the turning in the superficial integrity of the duplex stainless steel ASTM A890-6A. The tests were conducted on a turning centre with carbide tools and the main entrances variables were: tool material class, feed rate, cutting depth, cutting speed and cutting fluid utilisation. The answers were analysed: microstructural analysis by optical microscopy and x-ray diffraction, cutting forces measurements by a piezoelectric dynamometer, surface roughness, residual stress by x-ray diffraction technique and the microhardness measurements. The results do not show any changes in the microstructural of the material, even when the greater cutting parameters were used. The smaller feed rate (0.1 mm/v), smaller cutting speed (110 m/min) and the greater cutting depth (0.5 mm) provided the smaller values for the tensile residual stress, the smaller surface roughness and the greater microhardness.
Resumo:
Duplex and superduplex stainless steels present superior mechanical and corrosion properties when compared to usual stainless steels. This superiority is based on chemical composition when in a balanced microstructure (approximately 50% of ferrite). During welding, changes may occur in both, the chemical composition and volume fraction of phases in the material, which may generate the presence of intermetallic phases and, as a consequence, modify the mechanical and corrosion properties of this group of stainless steels. The objective of this work is to apply ASTM A923- Practice A to verify the presence of intermetallic phases in welded joints of UNS 32750 su-perduplex stainless steel. Tubes of UNS 32750, with external diameters of 18 and 44 mm and a thickness of 1.5 mm, were welded using orbital GTAW, with filler metal 25Cr-10Ni-4Mo and a diameter of 0.8 mm. The metal-based and welded joints were characterized by optical and scanning electron microscopy. The results showed that there was no precipitation of the intermetallic phase, such as sigma phase, detected by ASTM A923, but the HAZ of the two tubes studied presented small regions with chromium nitrides, which can also change the properties of welded joins.
Resumo:
The premature failure of a horizontal heat-exchanger, which occurred after service exposure at 580 degrees C for 50,000 h, revealed the occurrence of extensive through-thickness cracking in approximately 40% of the tube/stationary tube-sheet welds. Additionally, the internal surface of the welded joint featured intensive secondary intergranular cracking (up to 250 mu m deep), preferential formation of a 150 mu m thick layer of (Fe, Cr)(3)O-4 and internal intergranular oxidation (40 mu m deep). The welded region also showed intense carbon pick-up and, as consequence, severe precipitation of intergranular M7C3 and M23C6 carbides. The fracture surface was composed of two distinct regions: a ""planar"" region of 250 mu m, formed due to the stable crack growth along by the intergranular oxidation; and a slant region with radial marks, formed by the fast crack growth along the network of intergranular carbides. The association of intergranular oxidation pre-cracks with microstructural embrittlement promoted the premature failure, which took place by an overload mechanism, probably due to the jamming of the floating tube-sheet during the maintenance halt (cooling operation). (C) 2007 Elsevier Ltd. All rights reserved.
Resumo:
The paper proposes a methodology and design rules for organisational structures facing higher necessity of rapidly reconfigure themselves to cope with unpredictable situations-new markets, new products, changing mix of production, problems in production process or flows etc. It implies changing and often conflictive criteria for production goals and for the allocation of work. The methodology was developed based on a large field action research and consulting. Their basis is the design of auto-reconfigurable working groups-or groups with variable geometry, depending on the events to face. (C) 2009 Elsevier B.V. All rights reserved.
Resumo:
Scheduling parallel and distributed applications efficiently onto grid environments is a difficult task and a great variety of scheduling heuristics has been developed aiming to address this issue. A successful grid resource allocation depends, among other things, on the quality of the available information about software artifacts and grid resources. In this article, we propose a semantic approach to integrate selection of equivalent resources and selection of equivalent software artifacts to improve the scheduling of resources suitable for a given set of application execution requirements. We also describe a prototype implementation of our approach based on the Integrade grid middleware and experimental results that illustrate its benefits. Copyright (C) 2009 John Wiley & Sons, Ltd.
Resumo:
The TCP/IP architecture was consolidated as a standard to the distributed systems. However, there are several researches and discussions about alternatives to the evolution of this architecture and, in this study area, this work presents the Title Model to contribute with the application needs support by the cross layer ontology use and the horizontal addressing, in a next generation Internet. For a practical viewpoint, is showed the network cost reduction for the distributed programming example, in networks with layer 2 connectivity. To prove the title model enhancement, it is presented the network analysis performed for the message passing interface, sending a vector of integers and returning its sum. By this analysis, it is confirmed that the current proposal allows, in this environment, a reduction of 15,23% over the total network traffic, in bytes.
Resumo:
Intravascular ultrasound (IVUS) image segmentation can provide more detailed vessel and plaque information, resulting in better diagnostics, evaluation and therapy planning. A novel automatic segmentation proposal is described herein; the method relies on a binary morphological object reconstruction to segment the coronary wall in IVUS images. First, a preprocessing followed by a feature extraction block are performed, allowing for the desired information to be extracted. Afterward, binary versions of the desired objects are reconstructed, and their contours are extracted to segment the image. The effectiveness is demonstrated by segmenting 1300 images, in which the outcomes had a strong correlation to their corresponding gold standard. Moreover, the results were also corroborated statistically by having as high as 92.72% and 91.9% of true positive area fraction for the lumen and media adventitia border, respectively. In addition, this approach can be adapted easily and applied to other related modalities, such as intravascular optical coherence tomography and intravascular magnetic resonance imaging. (E-mail: matheuscardosomg@hotmail.com) (C) 2011 World Federation for Ultrasound in Medicine & Biology.
Resumo:
Aims: We aimed to evaluate if the co-localisation of calcium and necrosis in intravascular ultrasound virtual histology (IVUS-VH) is due to artefact, and whether this effect can be mathematically estimated. Methods and results: We hypothesised that, in case calcium induces an artefactual coding of necrosis, any addition in calcium content would generate an artificial increment in the necrotic tissue. Stent struts were used to simulate the ""added calcium"". The change in the amount and in the spatial localisation of necrotic tissue was evaluated before and after stenting (n=17 coronary lesions) by means of a especially developed imaging software. The area of ""calcium"" increased from a median of 0.04 mm(2) at baseline to 0.76 mm(2) after stenting (p<0.01). In parallel the median necrotic content increased from 0.19 mm(2) to 0.59 mm(2) (p<0.01). The ""added"" calcium strongly predicted a proportional increase in necrosis-coded tissue in the areas surrounding the calcium-like spots (model R(2)=0.70; p<0.001). Conclusions: Artificial addition of calcium-like elements to the atherosclerotic plaque led to an increase in necrotic tissue in virtual histology that is probably artefactual. The overestimation of necrotic tissue by calcium strictly followed a linear pattern, indicating that it may be amenable to mathematical correction.
Resumo:
This work considers a semi-implicit system A, that is, a pair (S, y), where S is an explicit system described by a state representation (x)over dot(t) = f(t, x(t), u(t)), where x(t) is an element of R(n) and u(t) is an element of R(m), which is subject to a set of algebraic constraints y(t) = h(t, x(t), u(t)) = 0, where y(t) is an element of R(l). An input candidate is a set of functions v = (v(1),.... v(s)), which may depend on time t, on x, and on u and its derivatives up to a Finite order. The problem of finding a (local) proper state representation (z)over dot = g(t, z, v) with input v for the implicit system Delta is studied in this article. The main result shows necessary and sufficient conditions for the solution of this problem, under mild assumptions on the class of admissible state representations of Delta. These solvability conditions rely on an integrability test that is computed from the explicit system S. The approach of this article is the infinite-dimensional differential geometric setting of Fliess, Levine, Martin, and Rouchon (1999) (`A Lie-Backlund Approach to Equivalence and Flatness of Nonlinear Systems`, IEEE Transactions on Automatic Control, 44(5), (922-937)).
Resumo:
The increasing adoption of information systems in healthcare has led to a scenario where patient information security is more and more being regarded as a critical issue. Allowing patient information to be in jeopardy may lead to irreparable damage, physically, morally, and socially to the patient, potentially shaking the credibility of the healthcare institution. Medical images play a crucial role in such context, given their importance in diagnosis, treatment, and research. Therefore, it is vital to take measures in order to prevent tampering and determine their provenance. This demands adoption of security mechanisms to assure information integrity and authenticity. There are a number of works done in this field, based on two major approaches: use of metadata and use of watermarking. However, there still are limitations for both approaches that must be properly addressed. This paper presents a new method using cryptographic means to improve trustworthiness of medical images, providing a stronger link between the image and the information on its integrity and authenticity, without compromising image quality to the end user. Use of Digital Imaging and Communications in Medicine structures is also an advantage for ease of development and deployment.
Resumo:
This paper presents a novel algorithm to successfully achieve viable integrity and authenticity addition and verification of n-frame DICOM medical images using cryptographic mechanisms. The aim of this work is the enhancement of DICOM security measures, especially for multiframe images. Current approaches have limitations that should be properly addressed for improved security. The algorithm proposed in this work uses data encryption to provide integrity and authenticity, along with digital signature. Relevant header data and digital signature are used as inputs to cipher the image. Therefore, one can only retrieve the original data if and only if the images and the inputs are correct. The encryption process itself is a cascading scheme, where a frame is ciphered with data related to the previous frames, generating also additional data on image integrity and authenticity. Decryption is similar to encryption, featuring also the standard security verification of the image. The implementation was done in JAVA, and a performance evaluation was carried out comparing the speed of the algorithm with other existing approaches. The evaluation showed a good performance of the algorithm, which is an encouraging result to use it in a real environment.