44 resultados para medium-range order


Relevância:

30.00% 30.00%

Publicador:

Resumo:

A range of plain carbon, carbon-manganese and low alloy cast steels were tested in order to determine their various fracture toughness values under elastic and elastic-plastic conditions. The main fracture toughness parameters which are considered are (1) Linear Elastic Fracture Mechanics (LEFM), (2) the J-Contour Integral, and (3) Crack Opening Displacement (COD). Results are obtained from fracture toughness specimens of various dimensions and the relevance of the validity criteria to cast steels is considered in some detail. In addition, the effect of casting position on specimen toughness values was noted. Valid KIC results according to LEFM, were obtained for three of the eight cast steels tested. Although KIC values from LEFM were not obtained from the remaining five steels, critical COD and J-integral values were determined. It is postulated that these values and particularly the critical J values can be used, with confidence for material selection or in defect tolerance calculations using these steels. Toughness values were found to vary with casting position in several of the steels tested and the possible reasons for such variations are discussed in the Thesis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Dedicated short range communications (DSRC) has been regarded as one of the most promising technologies to provide robust communications for large scale vehicle networks. It is designed to support both road safety and commercial applications. Road safety applications will require reliable and timely wireless communications. However, as the medium access control (MAC) layer of DSRC is based on the IEEE 802.11 distributed coordination function (DCF), it is well known that the random channel access based MAC cannot provide guaranteed quality of services (QoS). It is very important to understand the quantitative performance of DSRC, in order to make better decisions on its adoption, control, adaptation, and improvement. In this paper, we propose an analytic model to evaluate the DSRC-based inter-vehicle communication. We investigate the impacts of the channel access parameters associated with the different services including arbitration inter-frame space (AIFS) and contention window (CW). Based on the proposed model, we analyze the successful message delivery ratio and channel service delay for broadcast messages. The proposed analytical model can provide a convenient tool to evaluate the inter-vehicle safety applications and analyze the suitability of DSRC for road safety applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We develop a perturbation analysis that describes the effect of third-order dispersion on the similariton pulse solution of the nonlinear Schrodinger equation in a fibre gain medium. The theoretical model predicts with sufficient accuracy the pulse structural changes induced, which are observed through direct numerical simulations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent developments in nonlinear optics reveal an interesting class of pulses with a parabolic intensity profile in the energy-containing core and a linear frequency chirp that can propagate in a fiber with normal group-velocity dispersion. Parabolic pulses propagate in a stable selfsimilar manner, holding certain relations (scaling) between pulse power, width, and chirp parameter. In the additional presence of linear amplification, they enjoy the remarkable property of representing a common asymptotic state (or attractor) for arbitrary initial conditions. Analytically, self-similar (SS) parabolic pulses can be found as asymptotic, approximate solutions of the nonlinear Schr¨odinger equation (NLSE) with gain in the semi-classical (largeamplitude/small-dispersion) limit. By analogy with the well-known stable dynamics of solitary waves - solitons, these SS parabolic pulses have come to be known as similaritons. In practical fiber systems, inherent third-order dispersion (TOD) in the fiber always introduces a certain degree of asymmetry in the structure of the propagating pulse, eventually leading to pulse break-up. To date, there is no analytic theory of parabolic pulses under the action of TOD. Here, we develop aWKB perturbation analysis that describes the effect of weak TOD on the parabolic pulse solution of the NLSE in a fiber gain medium. The induced perturbation in phase and amplitude can be found to any order. The theoretical model predicts with sufficient accuracy the pulse structural changes induced by TOD, which are observed through direct numerical NLSE simulations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper attempts to address the effectiveness of physical-layer network coding (PNC) on the throughput improvement for multi-hop multicast in random wireless ad hoc networks (WAHNs). We prove that the per session throughput order with PNC is tightly bounded as T((nvmR (n))-1) if m = O(R-2 (n)), where n is the total number of nodes, R(n) is the communication range, and m is the number of destinations for each multicast session. We also show that per-session throughput order with PNC is tight bounded as T(n-1), when m = O(R-2(n)). The results of this paper imply that PNC cannot improve the throughput order of multicast in random WAHNs, which is different from the intuition that PNC may improve the throughput order as it allows simultaneous signal access and combination.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Dedicated Short Range Communication (DSRC) is a promising technique for vehicle ad-hoc network (VANET) and collaborative road safety applications. As road safety applications require strict quality of services (QoS) from the VANET, it is crucial for DSRC to provide timely and reliable communications to make safety applications successful. In this paper we propose two adaptive message rate control algorithms for low priority safety messages, in order to provide highly available channel for high priority emergency messages while improve channel utilization. In the algorithms each vehicle monitors channel loads and independently controls message rate by a modified additive increase and multiplicative decrease (AIMD) method. Simulation results demonstrated the effectiveness of the proposed rate control algorithms in adapting to dynamic traffic load.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recently underwater sensor networks (UWSN) attracted large research interests. Medium access control (MAC) is one of the major challenges faced by UWSN due to the large propagation delay and narrow channel bandwidth of acoustic communications used for UWSN. Widely used slotted aloha (S-Aloha) protocol suffers large performance loss in UWSNs, which can only achieve performance close to pure aloha (P-Aloha). In this paper we theoretically model the performances of S-Aloha and P-Aloha protocols and analyze the adverse impact of propagation delay. According to the observation on the performances of S-Aloha protocol we propose two enhanced S-Aloha protocols in order to minimize the adverse impact of propagation delay on S-Aloha protocol. The first enhancement is a synchronized arrival S-Aloha (SA-Aloha) protocol, in which frames are transmitted at carefully calculated time to align the frame arrival time with the start of time slots. Propagation delay is taken into consideration in the calculation of transmit time. As estimation error on propagation delay may exist and can affect network performance, an improved SA-Aloha (denoted by ISA-Aloha) is proposed, which adjusts the slot size according to the range of delay estimation errors. Simulation results show that both SA-Aloha and ISA-Aloha perform remarkably better than S-Aloha and P-Aloha for UWSN, and ISA-Aloha is more robust even when the propagation delay estimation error is large. © 2011 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Kozlov & Maz'ya (1989, Algebra Anal., 1, 144–170) proposed an alternating iterative method for solving Cauchy problems for general strongly elliptic and formally self-adjoint systems. However, in many applied problems, operators appear that do not satisfy these requirements, e.g. Helmholtz-type operators. Therefore, in this study, an alternating procedure for solving Cauchy problems for self-adjoint non-coercive elliptic operators of second order is presented. A convergence proof of this procedure is given.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We present a perturbation analysis that describes the effect of third-order dispersion on the similariton pulse solution of the nonlinear Schrödinger equation in a fibre gain medium. The theoretical model predicts with sufficient accuracy the pulse structural changes induced, which are observed through direct numerical simulations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A novel distributed amplification scheme for quasi-lossless transmission is presented. The system is studied numerically and shown to be able to strongly reduce signal power variations in comparison with currently employed schemes of similar complexity. As an example, variations of less than 3.1 dB for 100 km distance between pumps and below 0.42 dB for 60 km are obtained when using standard single-mode fibre as the transmission medium with an input signal average power of 0 dBm, and a total pump power of about 1.7 W. © 2004 Optical Society of America.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cyberstalking describes a relatively new form of stalking behaviour where technology is used as the medium of harassment. The term corporate cyberstalking is often used to describe incidents that involve organisations, such as companies and government departments. This paper uses a number of case studies in order to propose a typology of corporate cyberstalking. It is suggested that incidents involving corporate cyberstalking can be divided into two broad groups, depending on whether or not the organisation acts as a stalker or as a victim. Examining the motivations behind corporate cyberstalking allows these groups to be subdidvided further. The motives behind corporate cyberstalking can range from a desire for revenge against an employer to cyberterrorism. The paper also briefly discusses definitions of stalking and cyberstalking, concluding with a revised definition of cyberstalking that is more in keeping with the material discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Whether to assess the functionality of equipment or as a determinate for the accuracy of assays, reference standards are essential for the purposes of standardisation and validation. The ELISPOT assay, developed over thirty years ago, has emerged as a leading immunological assay in the development of novel vaccines for the assessment of efficacy. However, with its widespread use, there is a growing demand for a greater level of standardisation across different laboratories. One of the major difficulties in achieving this goal has been the lack of definitive reference standards. This is partly due to the ex vivo nature of the assay, which relies on cells being placed directly into the wells. Thus, the aim of this thesis was to produce an artificial reference standard using liposomes, for use within the assay. Liposomes are spherical bilayer vesicles with an enclosed aqueous compartment and therefore are models for biological membranes. Initial work examined pre-design considerations in order to produce an optimal formulation that would closely mimic the action of the cells ordinarily placed on the assay. Recognition of the structural differences between liposomes and cells led to the formulation of liposomes with increased density. This was achieved by using a synthesised cholesterol analogue. By incorporating this cholesterol analogue in liposomes, increased sedimentation rates were observed within the first few hours. The optimal liposome formulation from these studies was composed of 2-dipalmitoyl-sn-glycero-3-phosphocholine (DPPC), cholesterol (Chol) and brominated cholesterol (Brchol) at a 16:4:12 µMol ratio, based on a significantly higher (p<0.01) sedimentation (as determined by a percentage transmission of 59 ± 5.9 % compared to the control formulation at 29 ± 12 % after four hours). By considering a range of liposome formulations ‘proof of principle’ for using liposomes as ELISPOT reference standards was shown; recombinant IFN? cytokine was successfully entrapped within vesicles of different lipid compositions, which were able to promote spot formation within the ELISPOT assay. Using optimised liposome formulations composed of phosphatidylcholine with or without cholesterol (16 µMol total lipid) further development was undertaken to produce an optimised, scalable protocol for the production of liposomes as reference standards. A linear increase in spot number by the manipulation of cytokine concentration and/or lipid concentrations was not possible, potentially due to the saturation that occurred within the base of wells. Investigations into storage of the formulations demonstrated the feasibility of freezing and lyophilisation with disaccharide cryoprotectants, but also highlighted the need for further protocol optimisation to achieve a robust reference standard upon storage. Finally, the transfer of small-scale production to a medium lab-scale batch (40 mL) demonstrated this was feasible within the laboratory using the optimised protocol.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent developments in nonlinear optics reveal an interesting class of pulses with a parabolic intensity profile in the energy-containing core and a linear frequency chirp that can propagate in a fiber with normal group-velocity dispersion. Parabolic pulses propagate in a stable selfsimilar manner, holding certain relations (scaling) between pulse power, width, and chirp parameter. In the additional presence of linear amplification, they enjoy the remarkable property of representing a common asymptotic state (or attractor) for arbitrary initial conditions. Analytically, self-similar (SS) parabolic pulses can be found as asymptotic, approximate solutions of the nonlinear Schr¨odinger equation (NLSE) with gain in the semi-classical (largeamplitude/small-dispersion) limit. By analogy with the well-known stable dynamics of solitary waves - solitons, these SS parabolic pulses have come to be known as similaritons. In practical fiber systems, inherent third-order dispersion (TOD) in the fiber always introduces a certain degree of asymmetry in the structure of the propagating pulse, eventually leading to pulse break-up. To date, there is no analytic theory of parabolic pulses under the action of TOD. Here, we develop aWKB perturbation analysis that describes the effect of weak TOD on the parabolic pulse solution of the NLSE in a fiber gain medium. The induced perturbation in phase and amplitude can be found to any order. The theoretical model predicts with sufficient accuracy the pulse structural changes induced by TOD, which are observed through direct numerical NLSE simulations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose - The main aim of the research is to shed light on the role of information and communication technology (ICT) in the logistics innovation process of small and medium-sized third party logistics providers (3PLs). Design/methodology/approach - A triangulated research strategy was designed using a combination of quantitative and qualitative methods. The former involved the use of a questionnaire survey of small and medium-sized Italian 3PLs with 153 usable responses received. The latter comprised a series of focus groups and the use of seven case studies. Findings - There is a relatively low level of ICT expenditure with few companies adopting formal technology investment strategies. The findings highlight the strategic importance of supply chain integration for 3PLs with companies that have embarked on an expansion of their service portfolios showing a higher level of both ICT usage and information integration. Lack of technology skills in the workforce is a major constraint on ICT adoption. Given the proliferation of logistics-related ICT tools and applications in recent years it has been difficult for small and medium-sized 3PLs to select appropriate applications. Research limitations/implications - The paper provides practical guidelines to researchers in the effective use of mixed-methods research based on the concept of methodological triangulation. In particular, it shows how questionnaire surveys, focus groups and case study analysis can be used in combination to provide insights into multi-faceted supply chain phenomena. It also identifies several potentially fruitful avenues for future research in this specific field. Practical implications - The paper's findings provide useful guidance for practitioners on the effective adoption of ICT as part of the logistics innovation process. The findings also provide support for ICT vendors in the design of ICT solutions that are aligned to the needs of small 3PLs. Originality/value - There is currently a paucity of research into the drivers and inhibitors of ICT in the innovation processes of small and medium-sized 3PLs. This paper fills this gap by exploring the issue using a range of complementary research approaches. Copyright © 2013 Emerald Group Publishing Limited. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the new ‘knowledge-intensive economies’ Intellectual assets increasingly play a key part on balance sheets. There is an increasing global awareness that in order to promote innovation and the growth of the economy, businesses must fully recognise and exploit their intellectual assets. A company’s ability to innovate rapidly and successfully is now regarded as essential and most breakthroughs are made by Small and Medium-sized Enterprises (SMEs), usually with no in-house legal professionals to help them. It is essential that those working with or creating intellectual property rights (IPR) are aware of the basics of Intellectual Property Law. Intellectual Property Asset Management provides business and management students at all levels with an accessible-straight-forward explanation of what the main Intellectual Property rights are and how these rights are protected. Locating the subject squarely in a business context and using case studies and examples throughout drawn from a wide range of business organisations, it explains how an organisation can exploit their rights through licensing, franchising and other means in order to make the best possible use of their IP assets. This book will provide students with: • the basic Intellectual Property law knowledge needed to identify a potential IP issue • the tools and understanding to assess an IP breach • the ability to identify where the problem cannot be solved in house and where expert legal assistance is required • the knowledge required to work effectively with lawyers and other legal professionals to achieve the desired outcome