3 resultados para Cold-formed Steel structures
em Digital Commons at Florida International University
Resumo:
Based on theoretical considerations an explanation for the temperature dependence of the thermal expansion and the bulk modulus is proposed. A new equation state is also derived. Additionally a physical explanation for the latent heat of fusion is presented. These theoretical predictions are tested against experiments on highly symmetrical monatomic structures. ^ The volume is not an independent variable and must be broken down into its fundamental components when the relationships to the pressure and temperature are defined. Using zero pressure and temperature reference frame, the initial parameters, volume at zero pressure and temperature[V°], bulk modulus at zero temperature [K°] and volume coefficient of thermal expansion at zero pressure[α°] are defined. ^ The new derived EoS is tested against the experiments on perovskite and epsilon iron. The Root-mean-square-deviations (RMSD) of the residuals of the molar volume, pressure, and temperature are in the range of the uncertainty of the experiments. ^ Separating the experiments into 200 K ranges, the new EoS was compared to the most widely used finite strain, interatomic potential, and empirical isothermal EoSs such as the Burch-Murnaghan, the Vinet, and the Roy-Roy respectively. Correlation coefficients, RMSD's of the residuals, and Akaike Information Criteria were used for evaluating the fitting. Based on these fitting parameters, the new p-V-T EoS is superior in every temperature range relative to the investigated conventional isothermal EoS. ^ The new EoS for epsilon iron reproduces the preliminary-reference earth-model (PREM) densities at 6100-7400 K indicating that the presence of light elements might not be necessary to explain the Earth's inner core densities. ^ It is suggested that the latent heat of fusion supplies the energy required for overcoming on the viscous drag resistance of the atoms. The calculated energies for melts formed from highly symmetrical packing arrangements correlate very well with experimentally determined latent heat values. ^ The optical investigation of carhonado-diamond is also part of the dissertation. The collected first complete infrared FTIR absorption spectra for carhonado-diamond confirm the interstellar origin for the most enigmatic diamonds known as carbonado. ^
Resumo:
Since the Morris worm was released in 1988, Internet worms continue to be one of top security threats. For example, the Conficker worm infected 9 to 15 million machines in early 2009 and shut down the service of some critical government and medical networks. Moreover, it constructed a massive peer-to-peer (P2P) botnet. Botnets are zombie networks controlled by attackers setting out coordinated attacks. In recent years, botnets have become the number one threat to the Internet. The objective of this research is to characterize spatial-temporal infection structures of Internet worms, and apply the observations to study P2P-based botnets formed by worm infection. First, we infer temporal characteristics of the Internet worm infection structure, i.e., the host infection time and the worm infection sequence, and thus pinpoint patient zero or initially infected hosts. Specifically, we apply statistical estimation techniques on Darknet observations. We show analytically and empirically that our proposed estimators can significantly improve the inference accuracy. Second, we reveal two key spatial characteristics of the Internet worm infection structure, i.e., the number of children and the generation of the underlying tree topology formed by worm infection. Specifically, we apply probabilistic modeling methods and a sequential growth model. We show analytically and empirically that the number of children has asymptotically a geometric distribution with parameter 0.5, and the generation follows closely a Poisson distribution. Finally, we evaluate bot detection strategies and effects of user defenses in P2P-based botnets formed by worm infection. Specifically, we apply the observations of the number of children and demonstrate analytically and empirically that targeted detection that focuses on the nodes with the largest number of children is an efficient way to expose bots. However, we also point out that future botnets may self-stop scanning to weaken targeted detection, without greatly slowing down the speed of worm infection. We then extend the worm spatial infection structure and show empirically that user defenses, e.g. , patching or cleaning, can significantly mitigate the robustness and the effectiveness of P2P-based botnets. To counterattack, we evaluate a simple measure by future botnets that enhances topology robustness through worm re-infection.
Resumo:
Climate change is one of the most important and urgent issues of our time. Since 2006, China has overtaken the United States as the world’s largest greenhouse gas (GHG) emitter. China’s role in an international climate change solution has gained increased attention. Although much literature has addressed the functioning, performance, and implications of existing climate change mitigation policies and actions in China, there is insufficient literature that illuminates how the national climate change mitigation policies have been formulated and shaped. This research utilizes the policy network approach to explore China’s climate change mitigation policy making by examining how a variety of government, business, and civil society actors have formed networks to address environmental contexts and influence the policy outcomes and changes. The study is qualitative in nature. Three cases are selected to illustrate structural and interactive features of the specific policy network settings in shaping different policy arrangements and influencing the outcomes in the Chinese context. The three cases include the regulatory evolution of China’s climate change policy making; the country’s involvement in the Clean Development Mechanism (CDM) activity, and China’s exploration of voluntary agreement through adopting the Top-1000 Industrial Energy Conservation Program. The historical analysis of the policy process uses both primary data from interviews and fieldwork, and secondary data from relevant literature. The study finds that the Chinese central government dominates domestic climate change policy making; however, expanded action networks that involve actors at all levels have emerged in correspondence to diverse climate mitigation policy arrangements. The improved openness and accessibility of climate change policy network have contributed to its proactive engagement in promoting mitigation outcomes. In conclusion, the research suggests that the policy network approach provides a useful tool for studying China’s climate change policy making process. The involvement of various types of state and non-state actors has shaped new relations and affected the policy outcomes and changes. In addition, through the cross-case analysis, the study challenges the “fragmented authoritarianism” model and argues that this once-influential model is not appropriate in explaining new development and changes of policy making processes in contemporary China.