8 resultados para INTRUSIVE LUXATION
em Aston University Research Archive
Resumo:
The Criffell-Dalbeattie pluton from SW Scotland is one of a suite of late Caledonian granitoids which are associated with extensive, contemporaneous and compositionally diverse suits of minor intrusions. The minor intrusive suite associated with the Criffell-Dalbeattie pluton is dominantly composed of a series of porphyritic microdiorites, microgranodiorites and microgranites known collectively as the porphyrite-porphyry series. This series can be divided into two groups, the porphyrites and the quartz porphyries, on the basis of petrography and geochemistry although there is some compositional overlap between the two. Compositionally, the porphyrites and quartz porphyries appear to correspond to the granodiorites and granites, respectively, which comprise the Criffell-Dalbeattie pluton, suggesting that the porphyrite-porphyry series of dykes represent magmas which were tapped from the evolving granitic magma chamber. The most mafic component of the minor intrusive suite is represented by calc-alkaline hornblende- and mica bearing lamprophyres. Geochemical studies, including fractional crystallisation, combine assimilation-fractional crystallisation (AFC) show that these are mafic, LILE and LREE enriched melts derived by low degrees of partial melting of a subduction-modified mantle source. It is suggested that the source of the lamprophyres is "Lake District" lithosphere, metasomatised by Lower Palaeozoic subduction, and thrust under the southern part of the Southern Uplands. AFC modelling using chemical and isotopic data further suggest that there is a close genetic link between the lamprophyres and the Criffell-Dalbeattie granitoids and that lamprophyres represent the mantle derived precursors of the Criffell-Dalbeattie granitoids.
Resumo:
Purpose - Managers at the company attempt to implement a knowledge management information system in an attempt to avoid loss of expertise while improving control and efficiency. The paper seeks to explore the implications of the technological solution to employees within the company. Design/methodology/approach - The paper reports qualitative research conducted in a single organization. Evidence is presented in the form of interview extracts. Findings - The case section of the paper presents the accounts of organizational participants. The accounts reveal the workers' reactions to the technology-based system and something of their strategies of resistance to the system. These accounts also provide glimpses of the identity construction engaged in by these knowledge workers. The setting for the research is in a knowledge-intensive primary industry. Research was conducted through observation and interviews. Research limitations/implications - The issues identified are explored in a single case-study setting. Future research could look at the relevance of the findings to other settings. Practical implications - The case evidence presented indicates some of the complexity of implementation of information systems in organizations. This could certainly be seen as more evidence of the uncertainty associated with organizational change and of the need for managers not to expect an easy adoption of intrusive IT solutions. Originality/value - This paper adds empirical insight to a largely conceptual literature. © Emerald Group Publishing Limited.
Resumo:
This thesis addresses the viability of automatic speech recognition for control room systems; with careful system design, automatic speech recognition (ASR) devices can be useful means for human computer interaction in specific types of task. These tasks can be defined as complex verbal activities, such as command and control, and can be paired with spatial tasks, such as monitoring, without detriment. It is suggested that ASR use be confined to routine plant operation, as opposed the critical incidents, due to possible problems of stress on the operators' speech. It is proposed that using ASR will require operators to adapt a commonly used skill to cater for a novel use of speech. Before using the ASR device, new operators will require some form of training. It is shown that a demonstration by an experienced user of the device can lead to superior performance than instructions. Thus, a relatively cheap and very efficient form of operator training can be supplied by demonstration by experienced ASR operators. From a series of studies into speech based interaction with computers, it is concluded that the interaction be designed to capitalise upon the tendency of operators to use short, succinct, task specific styles of speech. From studies comparing different types of feedback, it is concluded that operators be given screen based feedback, rather than auditory feedback, for control room operation. Feedback will take two forms: the use of the ASR device will require recognition feedback, which will be best supplied using text; the performance of a process control task will require task feedback integrated into the mimic display. This latter feedback can be either textual or symbolic, but it is suggested that symbolic feedback will be more beneficial. Related to both interaction style and feedback is the issue of handling recognition errors. These should be corrected by simple command repetition practices, rather than use error handling dialogues. This method of error correction is held to be non intrusive to primary command and control operations. This thesis also addresses some of the problems of user error in ASR use, and provides a number of recommendations for its reduction.
Resumo:
Particulate solids are complex redundant systems which consist of discrete particles. The interactions between the particles are complex and have been the subject of many theoretical and experimental investigations. Invetigations of particulate material have been restricted by the lack of quantitative information on the mechanisms occurring within an assembly. Laboratory experimentation is limited as information on the internal behaviour can only be inferred from measurements on the assembly boundary, or the use of intrusive measuring devices. In addition comparisons between test data are uncertain due to the difficulty in reproducing exact replicas of physical systems. Nevertheless, theoretical and technological advances require more detailed material information. However, numerical simulation affords access to information on every particle and hence the micro-mechanical behaviour within an assembly, and can replicate desired systems. To use a computer program to numerically simulate material behaviour accurately it is necessary to incorporte realistic interaction laws. This research programme used the finite difference simulation program `BALL', developed by Cundall (1971), which employed linear spring force-displacement laws. It was thus necessary to incorporate more realistic interaction laws. Therefore, this research programme was primarily concerned with the implementation of the normal force-displacement law of Hertz (1882) and the tangential force-displacement laws of Mindlin and Deresiewicz (1953). Within this thesis the contact mechanics theories employed in the program are developed and the adaptations which were necessary to incorporate these laws are detailed. Verification of the new contact force-displacement laws was achieved by simulating a quasi-static oblique contact and single particle oblique impact. Applications of the program to the simulation of large assemblies of particles is given, and the problems in undertaking quasi-static shear tests along with the results from two successful shear tests are described.
Resumo:
This thesis makes a contribution to the Change Data Capture (CDC) field by providing an empirical evaluation on the performance of CDC architectures in the context of realtime data warehousing. CDC is a mechanism for providing data warehouse architectures with fresh data from Online Transaction Processing (OLTP) databases. There are two types of CDC architectures, pull architectures and push architectures. There is exiguous data on the performance of CDC architectures in a real-time environment. Performance data is required to determine the real-time viability of the two architectures. We propose that push CDC architectures are optimal for real-time CDC. However, push CDC architectures are seldom implemented because they are highly intrusive towards existing systems and arduous to maintain. As part of our contribution, we pragmatically develop a service based push CDC solution, which addresses the issues of intrusiveness and maintainability. Our solution uses Data Access Services (DAS) to decouple CDC logic from the applications. A requirement for the DAS is to place minimal overhead on a transaction in an OLTP environment. We synthesize DAS literature and pragmatically develop DAS that eciently execute transactions in an OLTP environment. Essentially we develop effeicient RESTful DAS, which expose Transactions As A Resource (TAAR). We evaluate the TAAR solution and three pull CDC mechanisms in a real-time environment, using the industry recognised TPC-C benchmark. The optimal CDC mechanism in a real-time environment, will capture change data with minimal latency and will have a negligible affect on the database's transactional throughput. Capture latency is the time it takes a CDC mechanism to capture a data change that has been applied to an OLTP database. A standard definition for capture latency and how to measure it does not exist in the field. We create this definition and extend the TPC-C benchmark to make the capture latency measurement. The results from our evaluation show that pull CDC is capable of real-time CDC at low levels of user concurrency. However, as the level of user concurrency scales upwards, pull CDC has a significant impact on the database's transaction rate, which affirms the theory that pull CDC architectures are not viable in a real-time architecture. TAAR CDC on the other hand is capable of real-time CDC, and places a minimal overhead on the transaction rate, although this performance is at the expense of CPU resources.
Resumo:
Entrepreneurs in emerging market economies operate in weak institutional contexts, which can imply different types of government. In some countries (e.g., Russia), the government is predatory, and the main risk faced by (successful) entrepreneurs relates to expropriation. In other countries (like China) this kind of risk is lower; nevertheless the government is intrusive, and the rules of the game remain fluid. The implication of the latter for entrepreneurs is that they are more likely to spend time and resources on influence (rent seeking) activities rather than on productive activities.We illustrate this type of government by focusing on the distribution of subsidies in China.We present a simple formalmodel that explores not only the direct effects of rent seeking for a company but also externalities under a situation of policy-generated uncertainty in the distribution of subsidies.We explore how these effects differ for the entrepreneurial sector (young, private and small companies) compared with other sectors. We posit that while the performance of private companies is more affected than the performance of state firms, the impact of government-induced uncertainty on young and small companies is actually less pronounced. Our empirical analysis, based on a unique large dataset of 2.4 million observations on Chinese companies, takes advantage of the regional and sectoral heterogeneity of China for empirical tests.
Resumo:
Non-intrusive monitoring of health state of induction machines within industrial process and harsh environments poses a technical challenge. In the field, winding failures are a major fault accounting for over 45% of total machine failures. In the literature, many condition monitoring techniques based on different failure mechanisms and fault indicators have been developed where the machine current signature analysis (MCSA) is a very popular and effective method at this stage. However, it is extremely difficult to distinguish different types of failures and hard to obtain local information if a non-intrusive method is adopted. Typically, some sensors need to be installed inside the machines for collecting key information, which leads to disruption to the machine operation and additional costs. This paper presents a new non-invasive monitoring method based on GMRs to measure stray flux leaked from the machines. It is focused on the influence of potential winding failures on the stray magnetic flux in induction machines. Finite element analysis and experimental tests on a 1.5-kW machine are presented to validate the proposed method. With time-frequency spectrogram analysis, it is proven to be effective to detect several winding faults by referencing stray flux information. The novelty lies in the implement of GMR sensing and analysis of machine faults.
Resumo:
Over the last decade, there has been a trend where water utility companies aim to make water distribution networks more intelligent in order to improve their quality of service, reduce water waste, minimize maintenance costs etc., by incorporating IoT technologies. Current state of the art solutions use expensive power hungry deployments to monitor and transmit water network states periodically in order to detect anomalous behaviors such as water leakage and bursts. However, more than 97% of water network assets are remote away from power and are often in geographically remote underpopulated areas, facts that make current approaches unsuitable for next generation more dynamic adaptive water networks. Battery-driven wireless sensor/actuator based solutions are theoretically the perfect choice to support next generation water distribution. In this paper, we present an end-to-end water leak localization system, which exploits edge processing and enables the use of battery-driven sensor nodes. Our system combines a lightweight edge anomaly detection algorithm based on compression rates and an efficient localization algorithm based on graph theory. The edge anomaly detection and localization elements of the systems produce a timely and accurate localization result and reduce the communication by 99% compared to the traditional periodic communication. We evaluated our schemes by deploying non-intrusive sensors measuring vibrational data on a real-world water test rig that have had controlled leakage and burst scenarios implemented.