904 resultados para Thermo dynamic analysis
Resumo:
Kinetics of 1,3-dipolar cycloaddition involving azomethine ylides, generated from thermal [1,2]-prototropy of the corresponding imino ester, employing differential scanning calorimetry (DSC), is surveyed. Glycine and phenylalanine derived imino esters have different behavior. The first one prefers reacting with itself at 75 ºC, rather than with the dipolarophile. However, the α-substituted imino ester gives the cycloadduct at higher temperatures. The thermal dynamic analysis by 1H NMR of the neat reaction mixture of the glycine derivative reveals the presence of signals corresponding to the dipole in very small proportion. The non-isothermal and isothermal DSC curves of the cycloaddition of phenylalaninate and diisobutyl fumarate are obtained from freshly prepared samples. The application of known kinetic models and mathematical multiple non-linear regressions (NLR) allow to determine and to compare Ea, lnA, reaction orders, and reaction enthalpy. Finally a rate equation for each different temperature can be established for this particular thermal cycloaddition.
Resumo:
The paper presents the analysis of an important historical building: the Saint James Theater in the city of Corfù (Greece) actually used as the Municipality House. The building, located in the center of the city, is made of carves stones and is characterized by a stocky shape and by the presence of wooden floors. The study deals with the structural identification of such structure through the analysis of its ambient vibrations recorded by means of accelerometers with high accuracy. A full dynamic testing was developed using ambient vibrations to identify the main modal parameters and to make a non-destructive characterization of this building. The results of these dynamic tests are compared with the modal analysis of a complex finite element (FE) simulation of the structure. This analysis may present several problems and uncertainties for this stocky building. Due to the presence of wooden floors, the local modes can be highly excited and, as a consequence, the evaluation of the structural modal parameters presents some difficulties.
Resumo:
Called Symposium on Shock and Vibration in vols. 2-5.
Resumo:
The oxidation behaviour of porous, sintered iron was studied by thermo-gravimetric analysis (TGA), at temperatures between 300oC and 700oC, in a flowing atmosphere of 20% O2/80% N2. Samples for TGA tests were compacted from pure iron powder, at 150MPa to 550MPa, and vacuum sintered at 1120oC. The mass gain of samples during oxidation was recorded continuously for a period of 24 hours. It was found that the oxidation mass gain of PM samples depended on the permeability of the pore structure and the temperature. At low temperatures, the oxidising gas was able to permeate through the pore structure, causing the oxidation of a large active surface area. At high temperatures the active surface area was smaller, because oxygen diffusing into the pore structure, from the external atmosphere, was adsorbed by pore surfaces close to the external surface of the compact. Although the weight of the external oxide scale on compacts increased with increasing oxidation temperature, the absence of oxide in the core porosity in compacts oxidised at higher temperatures resulted in smaller mass gains than were observed for compacts oxidised at lower temperatures. The heat generated by the oxidation of the large active surface areas of porous samples was studied by thermo-calorimetric analysis (TCA). It was determined that this phenomenon could raise the core temperature of samples significantly above the ambient furnace temperature, and affecting the morphology of the oxide scale formed. The effects (on oxidation behaviour at 500oC) of small, elemental alloy additions of Al, Cu, P and Si to pure iron powder were studied. It was found that elements that promote pore rounding during sintering caused a significant reduction in the mass gain rate of the PM alloys, compared to the PM pure iron. The oxidation resistance due to these elements prevented pore closure by oxide growth, so that the active surface area of these PM alloys remained high. The PM alloys were also studied by thermo-mechanical analysis (TMA, dilatometry), to determine their dimensional stability during sintering and subsequent elevated temperature service. The oxidation experiment was augmented with optical and electron microscopy, and X-ray analysis of alloy and scale compositions.
Resumo:
The possible evaporation of lubricant in fluid film bearings has been investigated theoretically and by experiment using a radial flow hydrostatic bearing supplied with liquid refrigerant R114. Good correlation between measured and theoretical values was obtained using a bespoke computational fluid dynamic model in which the flow was assumed to be laminar and adiabatic. The effects of viscous dissipation and vapour generation within the fluid film are fully accounted for by applying a fourth order Runge-Kutta routine to satisfy the radial and filmwise transverse constraints of momentum, energy and mass conservation. The results indicate that the radial velocity profile remains parabolic while the flow remains in the liquid phase and that the radial rate of enthalpy generation is then constant across the film at a given radius. The results also show that evaporation will commence at a radial location determined by geometry and flow conditions and in fluid layers adjacent to the solid boundaries. Evaporation is shown to progress in the radial direction and the load carrying capacity of such a bearing is reduced significantly. Expressions for the viscosity of the liquid/vapour mixture found in the literature survey have not been tested against experimental data. A new formulation is proposed in which the suitable choice of a characteristic constant yields close representation to any of these expressions. Operating constraints imposed by the design of the experimental apparatus limited the extent of the surface over which evaporation could be obtained, and prevented clear identification of the most suitable relationship for the viscosity of the liquid/vapour mixture. The theoretical model was extended to examine the development of two phase flow in a rotating shaft face seal of uniform thickness. Previous theoretical analyses have been based on the assumption that the radial velocity profile of the flow is always parabolic, and that the tangential component of velocity varies linearly from the value at the rotating surface, to zero at the stationary surface. The computational fluid dynamic analysis shows that viscous shear and dissipation in the fluid adjacent to the rotating surface leads to developing evaporation with a consequent reduction in tangential shear forces. The tangential velocity profile is predicted to decay rapidly through the film, exhibiting a profile entirely different to that assumed by previous investigators. Progressive evaporation takes place close to the moving wall and does not occur completely at a single radial location, as has been claimed in earlier work.
Resumo:
This thesis presents an approach to cutting dynamics during turning based upon the mechanism of deformation of work material around the tool nose known as "ploughing". Starting from the shearing process in the cutting zone and accounting for "ploughing", new mathematical models relating turning force components to cutting conditions, tool geometry and tool vibration are developed. These models are developed separately for steady state and for oscillatory turning with new and worn tools. Experimental results are used to determine mathematical functions expressing the parameters introduced by the steady state model in the case of a new tool. The form of these functions are of general validity though their coefficients are dependent on work and tool materials. Good agreement is achieved between experimental and predicted forces. The model is extended on one hand to include different work material by introducing a hardness factor. The model provides good predictions when predicted forces are compared to present and published experimental results. On the other hand, the extension of the ploughing model to taming with a worn edge showed the ability of the model in predicting machining forces during steady state turning with the worn flank of the tool. In the development of the dynamic models, the dynamic turning force equations define the cutting process as being a system for which vibration of the tool tip in the feed direction is the input and measured forces are the output The model takes into account the shear plane oscillation and the cutting configuration variation in response to tool motion. Theoretical expressions of the turning forces are obtained for new and worn cutting edges. The dynamic analysis revealed the interaction between the cutting mechanism and the machine tool structure. The effect of the machine tool and tool post is accounted for by using experimental data of the transfer function of the tool post system. Steady state coefficients are corrected to include the changes in the cutting configuration with tool vibration and are used in the dynamic model. A series of oscillatory cutting tests at various conditions and various tool flank wear levels are carried out and experimental results are compared with model—predicted forces. Good agreement between predictions and experiments were achieved over a wide range of cutting conditions. This research bridges the gap between the analysis of vibration and turning forces in turning. It offers an explicit expression of the dynamic turning force generated during machining and highlights the relationships between tool wear, tool vibration and turning force. Spectral analysis of tool acceleration and turning force components led to define an "Inertance Power Ratio" as a flank wear monitoring factor. A formulation of an on—line flank wear monitoring methodology is presented and shows how the results of the present model can be applied to practical in—process tool wear monitoring in • turning operations.
Resumo:
Brewers spent grain (BSG) is a widely available feedstock representing approximately 85% of the total by-products generated in the brewing industry. This is currently either disposed of to landfill or used as cattle feed due to its high protein content. BSG has received little or no attention as a potential energy resource, but increasing disposal costs and environmental constraints are now prompting the consideration of this. One possibility for the utilisation of BSG for energy is via intermediate pyrolysis to produce gases, vapours and chars. Intermediate pyrolysis is characterised by indirect heating in the absence of oxygen for short solids residence times of a few minutes, at temperatures of 350-450 °C. In the present work BSG has been characterised by chemical, proximate, ultimate and thermo-gravimetric analysis. Intermediate pyrolysis of BSG at 450 °C was carried out using a twin coaxial screw reactor known as Pyroformer to give yields of char 29%, 51% of bio-oil and 19% of permanent gases. The bio-oil liquid was found to separate in to an aqueous phase and organic phase. The organic phase contained viscous compounds that could age over time leading to solid tars that can present problems in CHP application. The quality of the pyrolysis vapour products before quenching can be upgraded to achieve much improved suitability as a fuel by downstream catalytic reforming. A Bench Scale batch pyrolysis reactor has then been used to pyrolyse small samples of BSG under a range of conditions of heating rate and temperature simulating the Pyroformer. A small catalytic reformer has been added downstream of the reactor in which the pyrolysis vapours can be further cracked and reformed. A commercial reforming nickel catalyst was used at 500, 750 and 850 °C at a space velocity about 10,000 L/h with and without the addition of steam. Results are presented for the properties of BSG, and the products of the pyrolysis process both with and without catalytic post-processing. Results indicate that catalytic reforming produced a significant increase in permanent gases mainly (H2 and CO) with H2 content exceeding 50 vol% at higher reforming temperatures. Bio-oil yield decreased significantly as reforming temperature increased with char remaining the same as pyrolysis condition remained unchanged. The process shows an increase in heating value for the product gas ranging between 10.8-25.2 MJ/m as reforming temperature increased. © 2012 Elsevier B.V. All rights reserved.
Resumo:
Aquatic biomass is seen as one of the major feedstocks to overcome difficulties associated with 1st generation biofuels, such as competition with food production, change of land use and further environmental issues. Although, this finding is widely accepted only little work has been carried out to investigate thermo-chemical conversion of algal specimen to produce biofuels, power and heat. This work aims at contributing fundamental knowledge for thermo-chemical processing of aquatic biomass via intermediate pyrolysis. Therefore, it was necessary to install and commission an analytical pyrolysis apparatus which facilitates intermediate pyrolysis process conditions as well as subsequent separation and detection of pyrolysates (Py- GC/MS). In addition, a methodology was established to analyse aquatic biomass under intermediate conditions by Thermo-Gravimetric Analysis (TGA). Several microalgae (e.g. Chlamydomonas reinhardtii, Chlorella vulgaris) and macroalgae specimen (e.g. Fucus vesiculosus) from main algal divisions and various natural habitats (fresh and saline water, temperate and polar climates) were chosen and their thermal degradation under intermediate pyrolysis conditions was studied. In addition, it was of interest to examine the contribution of biochemical constituents of algal biomass onto the chemical compounds contained in pyrolysates. Therefore, lipid and protein fractions were extracted from microalgae biomass and analysed separately. Furthermore, investigations of residual algal materials obtained by extraction of high valuable compounds (e.g. lipids, proteins, enzymes) were included to evaluate their potential for intermediate pyrolysis processing. On basis of these thermal degradation studies, possible applications of algal biomass and from there derived materials in the Bio-thermal Valorisation of Biomass-process (BtVB-process) are presented. It was of interest to evaluate the combination of the production of high valuable products and bioenergy generation derived by micro- and macro algal biomass.
Resumo:
Stone-fruit activated carbon (SAC) and modified versions containing acidic oxygen and basic nitrogen groups have been used to prepare palladium catalysts by wet impregnation. Carbon supports and catalysts are investigated by thermo-gravimetric analysis, TPD, oxygen chemisorption, TEM and XPS. The influence of the nature of the functional groups on the dispersion and oxidation state of palladium and its activity in hydrogen oxidation is investigated. Pd dispersion is found to increase with the basic strength of functional groups on the support. XPS reveals that introduction of amine groups in SAC results in an increased proportion of Pd0, resistant to re-oxidation. Palladium catalysts supported on activated carbon modified by diethylamine groups are found to exhibit the highest metal dispersion and greatest activity in hydrogen oxidation. © 2007 Elsevier B.V. All rights reserved.
Resumo:
The first essay developed a respondent model of Bayesian updating for a double-bound dichotomous choice (DB-DC) contingent valuation methodology. I demonstrated by way of data simulations that current DB-DC identifications of true willingness-to-pay (WTP) may often fail given this respondent Bayesian updating context. Further simulations demonstrated that a simple extension of current DB-DC identifications derived explicitly from the Bayesian updating behavioral model can correct for much of the WTP bias. Additional results provided caution to viewing respondents as acting strategically toward the second bid. Finally, an empirical application confirmed the simulation outcomes. The second essay applied a hedonic property value model to a unique water quality (WQ) dataset for a year-round, urban, and coastal housing market in South Florida, and found evidence that various WQ measures affect waterfront housing prices in this setting. However, the results indicated that this relationship is not consistent across any of the six particular WQ variables used, and is furthermore dependent upon the specific descriptive statistic employed to represent the WQ measure in the empirical analysis. These results continue to underscore the need to better understand both the WQ measure and its statistical form homebuyers use in making their purchase decision. The third essay addressed a limitation to existing hurricane evacuation modeling aspects by developing a dynamic model of hurricane evacuation behavior. A household's evacuation decision was framed as an optimal stopping problem where every potential evacuation time period prior to the actual hurricane landfall, the household's optimal choice is to either evacuate, or to wait one more time period for a revised hurricane forecast. A hypothetical two-period model of evacuation and a realistic multi-period model of evacuation that incorporates actual forecast and evacuation cost data for my designated Gulf of Mexico region were developed for the dynamic analysis. Results from the multi-period model were calibrated with existing evacuation timing data from a number of hurricanes. Given the calibrated dynamic framework, a number of policy questions that plausibly affect the timing of household evacuations were analyzed, and a deeper understanding of existing empirical outcomes in regard to the timing of the evacuation decision was achieved.
Resumo:
The relationship between trade policy and productivity growth is regarded as ambiguous in the literature. This dissertation examines under what condition the relationship would be positive (or negative). Through the use of static and dynamic analysis, we find two conflicting effects (the pro-protection effect and the pro-competitive effect) that cause the relationship to be ambiguous. If there exists a productivity gap between the import-competing and foreign industries, and if the level of protection is low (high), the relationship is positive (negative). We also show that the import-competing firm responds to a change in the protection level by choosing a level of investment in innovation which yields a different rate of productivity growth. The policy implication, therefore, is that a trade-policy maker should set the trade protection at a level which induces the firm to choose the highest rate of productivity growth, and, as a result, leading the firm to close the initial productivity gap in the most efficient way. ^
Resumo:
The first essay developed a respondent model of Bayesian updating for a double-bound dichotomous choice (DB-DC) contingent valuation methodology. I demonstrated by way of data simulations that current DB-DC identifications of true willingness-to-pay (WTP) may often fail given this respondent Bayesian updating context. Further simulations demonstrated that a simple extension of current DB-DC identifications derived explicitly from the Bayesian updating behavioral model can correct for much of the WTP bias. Additional results provided caution to viewing respondents as acting strategically toward the second bid. Finally, an empirical application confirmed the simulation outcomes. The second essay applied a hedonic property value model to a unique water quality (WQ) dataset for a year-round, urban, and coastal housing market in South Florida, and found evidence that various WQ measures affect waterfront housing prices in this setting. However, the results indicated that this relationship is not consistent across any of the six particular WQ variables used, and is furthermore dependent upon the specific descriptive statistic employed to represent the WQ measure in the empirical analysis. These results continue to underscore the need to better understand both the WQ measure and its statistical form homebuyers use in making their purchase decision. The third essay addressed a limitation to existing hurricane evacuation modeling aspects by developing a dynamic model of hurricane evacuation behavior. A household’s evacuation decision was framed as an optimal stopping problem where every potential evacuation time period prior to the actual hurricane landfall, the household’s optimal choice is to either evacuate, or to wait one more time period for a revised hurricane forecast. A hypothetical two-period model of evacuation and a realistic multi-period model of evacuation that incorporates actual forecast and evacuation cost data for my designated Gulf of Mexico region were developed for the dynamic analysis. Results from the multi-period model were calibrated with existing evacuation timing data from a number of hurricanes. Given the calibrated dynamic framework, a number of policy questions that plausibly affect the timing of household evacuations were analyzed, and a deeper understanding of existing empirical outcomes in regard to the timing of the evacuation decision was achieved.
Resumo:
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. ^ We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. ^ We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. ^ We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). ^ In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.^
Resumo:
Human development requires a broad balance between ecological, social and economic factors in order to ensure its own sustainability. In this sense, the search for new sources of energy generation, with low deployment and operation costs, which cause the least possible impact to the environment, has been the focus of attention of all society segments. To do so, the reduction in exploration of fossil fuels and the encouragement of using renewable energy resources for distributed generation have proved interesting alternatives to the expansion of the energy matrix of various countries in the world. In this sense, the wind energy has acquired an increasingly significant role, presenting increasing rates of power grid penetration and highlighting technological innovations such as the use of permanent magnet synchronous generators (PMSG). In Brazil, this fact has also been noted and, as a result, the impact of the inclusion of this source in the distribution and sub-transmission power grid has been a major concern of utilities and agents connected to Brazilian electrical sector. Thus, it is relevant the development of appropriate computational tools that allow detailed predictive studies about the dynamic behavior of wind farms, either operating with isolated load, either connected to the main grid, taking also into account the implementation of control strategies for active/reactive power generation and the keeping of adequate levels of voltage and frequency. This work fits in this context since it comprises mathematical and computational developments of a complete wind energy conversion system (WECS) endowed with PMSG using time domain techniques of Alternative Transients Program (ATP), which prides itself a recognized reputation by scientific and academic communities as well as by electricity professionals in Brazil and elsewhere. The modeling procedures performed allowed the elaboration of blocks representing each of the elements of a real WECS, comprising the primary source (the wind), the wind turbine, the PMSG, the frequency converter, the step up transformer, the load composition and the power grid equivalent. Special attention is also given to the implementation of wind turbine control techniques, mainly the pitch control responsible for keeping the generator under the maximum power operation point, and the vector theory that aims at adjusting the active/reactive power flow between the wind turbine and the power grid. Several simulations are performed to investigate the dynamic behavior of the wind farm when subjected to different operating conditions and/or on the occurrence of wind intensity variations. The results have shown the effectiveness of both mathematical and computational modeling developed for the wind turbine and the associated controls.
Resumo:
Kernel-level malware is one of the most dangerous threats to the security of users on the Internet, so there is an urgent need for its detection. The most popular detection approach is misuse-based detection. However, it cannot catch up with today's advanced malware that increasingly apply polymorphism and obfuscation. In this thesis, we present our integrity-based detection for kernel-level malware, which does not rely on the specific features of malware. We have developed an integrity analysis system that can derive and monitor integrity properties for commodity operating systems kernels. In our system, we focus on two classes of integrity properties: data invariants and integrity of Kernel Queue (KQ) requests. We adopt static analysis for data invariant detection and overcome several technical challenges: field-sensitivity, array-sensitivity, and pointer analysis. We identify data invariants that are critical to system runtime integrity from Linux kernel 2.4.32 and Windows Research Kernel (WRK) with very low false positive rate and very low false negative rate. We then develop an Invariant Monitor to guard these data invariants against real-world malware. In our experiment, we are able to use Invariant Monitor to detect ten real-world Linux rootkits and nine real-world Windows malware and one synthetic Windows malware. We leverage static and dynamic analysis of kernel and device drivers to learn the legitimate KQ requests. Based on the learned KQ requests, we build KQguard to protect KQs. At runtime, KQguard rejects all the unknown KQ requests that cannot be validated. We apply KQguard on WRK and Linux kernel, and extensive experimental evaluation shows that KQguard is efficient (up to 5.6% overhead) and effective (capable of achieving zero false positives against representative benign workloads after appropriate training and very low false negatives against 125 real-world malware and nine synthetic attacks). In our system, Invariant Monitor and KQguard cooperate together to protect data invariants and KQs in the target kernel. By monitoring these integrity properties, we can detect malware by its violation of these integrity properties during execution.