928 resultados para sloping side walls
Resumo:
River training walls have been built at scores of locations along the NSW coast and their impacts on shoreline change are still not fully understood. In this study, the Brunswick River entrance and adjacent beaches are selected for examination of the impact of the construction of major training walls. Thirteen sets of aerial photographs taken between 1947 and 1994 are used in a CIS approach to accurately determine tire shoreline Position, beach contours and sand volumes, and their changes in both time and space, and then to assess the contribution of both tire structures and natural hydrodynamic conditions to large scale (years-decades and kilometres) beach changes. The impact of the training walls can be divided into four stages: natural conditions prior to their construction (pre 1959), major downdrift erosion and updrift accretion during and. following the construction of the walls in 1959 similar to 1962 and 1966. diminishing impact of the walls between 1966 and 1987, and finally no apparent impact between 1987 similar to 1994. The impact extends horizontally about 8 km updrift and 17 km downdrift, and temporally up to 25 years..
Resumo:
The embryological characters of Crawfurdia delavayi Frabnch. are described and the systematic relationships of Crawfurdia discussed. Anthers are tetrasporangiate. The development of anther walls conforms to the Dicotyledonous type. The tapetum is of single origin. The development of the tapetum with uninucleate cells is of the glandular type. The tapetal cells on the connective side show radial elongation or periclinal division and intrude into the anther locule. The epidermis of anther walls persists and its cells become pillar and fibrous, and the endothecium degenerates. The ovary is bicarpellary and unilocular. The placentation is typically parietal with 8 rows of anatropous ovules. The development of embryo sac is of the polygonum type. Before fertilization, two polar nuclei fuse into a secondary nucleus. Three antipodal cells persist. Flowers are protandrous. Fertilization is porogamous. The development of the endosperm is of the nuclear type. The embryogeny corresponds to the solanad type physalis II variation. The embryological data indicate that it is better to separate Crawfurdia from Gentiana as an independent genus.
Resumo:
Mudstone reservoir is a subtle reservoir with extremely inhomogeneous, whose formation is greatly related to the existence of fracture. For this kind of reservoir, mudstone is oil source rock, cover rock and reservoir strata, reservoir type is various, attitude of oil layer changes greatly, and the distribution of oil and gas is different from igneous or clastic rock reservoir as well as from carbonate reservoir of self-producing and self-containing of oil and gas. No mature experience has been obtained in the description, exploration and development of the reservoir by far. Taking Zhanhua depression as an example, we studied in this thesis the tectonic evolution, deposit characteristics, diagenesis, hydrocarbon formation, abnormal formation pressure, forming of fissure in mudstone reservoir, etc. on the basis of core analysis, physical simulation, numerical simulation, integrated study of well logging and geophysical data, and systematically analyzed the developing and distributing of mudstone fissure reservoir and set up a geological model for the formation of mudstone fissure reservoir, and predicted possible fractural zone in studied area. Mudstone reservoir mainly distributed on the thrown side of sedimentary fault along the sloping area of the petroleum generatiion depression in Zhanhua depression. Growing fault controlled subsidence and sedimentation. Both the rate of subsidence and thickness of mudstone are great on the thrown side of growing fault, which result in the formation of surpressure in the area. The unlocking of fault which leads to the pressure discharges and the upward conduct of below stratum, also makes for the surpressure in mudstone. In Zhanhua depression, mudstone reservior mainly developed in sub-compacted stratum in the third segment of Shahejie formation, which is the best oil source rock because of its wide spread in distribution, great in thickness, and rich in organic matter, and rock types of which are oil source mudstone and shale of deep water or semi-deep water sediment in lacustrine facies. It revealed from core analysis that the stratum is rich in limestone, and consists of lamina of dark mudstone and that of light grey limestone alternately, such rock assemblage is in favor of high pressure and fracture in the process of hydrocarbon generation. Fracture of mudstone in the third segment of Shahejie formation was divided into structure fracture, hydrocarbon generation fracture and compound fracture and six secondary types of fracture for the fist time according to the cause of their formation in the thesis. Structural fracture is formed by tectonic movement such as fold or fault, which develops mainly near the faults, especially in the protrude area and the edge of faults, such fracture has obvious directivity, and tend to have more width and extension in length and obvious direction, and was developed periodically, discontinuously in time and successively as the result of multi-tectonic movement in studied area. Hydrocarbon generation fracture was formed in the process of hydrocarbon generation, the fracture is numerous in number and extensively in distribution, but the scale of it is always small and belongs to microfracture. The compound fracture is the result of both tectonic movement and hydrocarbon forming process. The combination of above fractures in time and space forms the three dimension reservoir space network of mudstone, which satellites with abnormal pressure zone in plane distribution and relates to sedimentary faces, rock combination, organic content, structural evolution, and high pressure, etc.. In Zhanhua depression, the mudstone of third segment in shahejie formation corresponds with a set of seismic reflection with better continuous. When mudstone containing oil and gas of abnormal high pressure, the seismic waveform would change as a result of absorb of oil and gas to the high-frequency composition of seismic reflection, and decrease of seismic reflection frequency resulted from the breakage of mudstone structure. The author solved the problem of mudstone reservoir predicting to some degree through the use of coherent data analysis in Zhanhua depression. Numerical modeling of basin has been used to simulate the ancient liquid pressure field in Zhanhua depression, to quantitative analysis the main controlling factor (such as uncompaction, tectonic movement, hydrocarbon generation) to surpressure in mudstone. Combined with factual geologic information and references, we analyzed the characteristic of basin evolution and factors influence the pressure field, and employed numerical modeling of liquid pressure evolution in 1-D and 2-D section, modeled and analyzed the forming and evolution of pressure in plane for main position in different periods, and made a conclusion that the main factors for surpressure in studied area are tectonic movement, uncompaction and hydrocarbon generation process. In Zhanhua depression, the valid fracture zone in mudstone was mainly formed in the last stage of Dongying movement, the mudstone in the third segment of Shahejie formation turn into fastigium for oil generation and migration in Guantao stage, and oil and gas were preserved since the end of the stage. Tectonic movement was weak after oil and gas to be preserved, and such made for the preserve of oil and gas. The forming of fractured mudstone reservoir can be divided into four different stages, i.e. deposition of muddy oil source rock, draining off water by compacting to producing hydrocarbon, forming of valid fracture and collecting of oil, forming of fracture reservoir. Combined with other regional geologic information, we predicted four prior mudstone fracture reservoirs, which measured 18km2 in area and 1200 X 104t in geological reserves.
Resumo:
The advent of virtualization and cloud computing technologies necessitates the development of effective mechanisms for the estimation and reservation of resources needed by content providers to deliver large numbers of video-on-demand (VOD) streams through the cloud. Unfortunately, capacity planning for the QoS-constrained delivery of a large number of VOD streams is inherently difficult as VBR encoding schemes exhibit significant bandwidth variability. In this paper, we present a novel resource management scheme to make such allocation decisions using a mixture of per-stream reservations and an aggregate reservation, shared across all streams to accommodate peak demands. The shared reservation provides capacity slack that enables statistical multiplexing of peak rates, while assuring analytically bounded frame-drop probabilities, which can be adjusted by trading off buffer space (and consequently delay) and bandwidth. Our two-tiered bandwidth allocation scheme enables the delivery of any set of streams with less bandwidth (or equivalently with higher link utilization) than state-of-the-art deterministic smoothing approaches. The algorithm underlying our proposed frame-work uses three per-stream parameters and is linear in the number of servers, making it particularly well suited for use in an on-line setting. We present results from extensive trace-driven simulations, which confirm the efficiency of our scheme especially for small buffer sizes and delay bounds, and which underscore the significant realizable bandwidth savings, typically yielding losses that are an order of magnitude or more below our analytically derived bounds.
Resumo:
Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underlying structure of a cipher. Side-channel attacks, however, look to extract secret key information based on the leakage from the device on which the cipher is implemented, be it smart-card, microprocessor, dedicated hardware or personal computer. Attacks based on the power consumption, electromagnetic emanations and execution time have all been practically demonstrated on a range of devices to reveal partial secret-key information from which the full key can be reconstructed. The focus of this thesis is power analysis, more specifically a class of attacks known as profiling attacks. These attacks assume a potential attacker has access to, or can control, an identical device to that which is under attack, which allows him to profile the power consumption of operations or data flow during encryption. This assumes a stronger adversary than traditional non-profiling attacks such as differential or correlation power analysis, however the ability to model a device allows templates to be used post-profiling to extract key information from many different target devices using the power consumption of very few encryptions. This allows an adversary to overcome protocols intended to prevent secret key recovery by restricting the number of available traces. In this thesis a detailed investigation of template attacks is conducted, along with how the selection of various attack parameters practically affect the efficiency of the secret key recovery, as well as examining the underlying assumption of profiling attacks in that the power consumption of one device can be used to extract secret keys from another. Trace only attacks, where the corresponding plaintext or ciphertext data is unavailable, are then investigated against both symmetric and asymmetric algorithms with the goal of key recovery from a single trace. This allows an adversary to bypass many of the currently proposed countermeasures, particularly in the asymmetric domain. An investigation into machine-learning methods for side-channel analysis as an alternative to template or stochastic methods is also conducted, with support vector machines, logistic regression and neural networks investigated from a side-channel viewpoint. Both binary and multi-class classification attack scenarios are examined in order to explore the relative strengths of each algorithm. Finally these machine-learning based alternatives are empirically compared with template attacks, with their respective merits examined with regards to attack efficiency.
Resumo:
The clinical use of stem cells, such as bone marrow-derived and, more recently, resident cardiac stem cells, offers great promise for treatment of myocardial infarction and heart failure. The epicardium-derived cells have also attracted attention for their angiogenic paracrine actions and ability to differentiate into cardiomyocytes and vascular cells when activated during cardiac injury. In a recent study, Chong and colleagues have described a distinct population of epicardium-derived mesenchymal stem cells that reside in a perivascular niche of the heart and have a broad multilineage potential. Exploring the therapeutic capacity of these cells will be an exciting future endeavor.
Resumo:
The micromagnetic structure and energy of 180° domain walls spanning laminar crystals of iron having (100) or (110) surfaces and ranging in thickness from 145 to 580 nm have been investigated by numerical integration of the Landau-Lifshitz-Gilbert equation. Stable equilibrium structures with two flux symmetries were obtained for both crystal orientations at all thicknesses studied.
Resumo:
The main sources of financing for small and medium sized enterprises (SMEs) are equity (internally generated cash), trade credit paid on time, long and short term bank credits, delayed payment on trade credit and other debt. The marginal costs of each financing instrument are driven by asymmetric information (cost of gathering and analysing information) and transactions costs associated with non-payment (costs of collecting and selling collateral). According to the Pecking Order Theory, firms will choose the cheapest source in terms of cost. In the case of the static trade-off theory, firms choose finance so that the marginal costs across financing sources are all equal, thus an additional Euro of financing is obtained from all the sources whereas under the Pecking Order Theory the source is determined by how far down the Pecking Order the firm is presently located. In this paper, we argue that both of these theories miss the point that the marginal costs are dependent of the use of the funds, and the asset side of the balance sheet primarily determines the financing source for an additional Euro. An empirical analysis on a unique dataset of Portuguese SME's confirms that the composition of the asset side of the balance sheet has an impact of the type of financing used and the Pecking Order Theory and the traditional Static Trade-off theory are rejected.
Resumo:
Based on the IMP research tradition this paper regards relationships and networks as key issues in the product development and supply management agenda. Within business networks, co-development is only possible to be analysed when emphasis is placed on interdependences and interactive relationships. Co-development usually implies close relationships that allow companies to rely on each other's resources. Close relationships imply interdependences, which may improve companies' technical and product development. By looking at the actual interactions - between a UK company and its Chinese suppliers - that led to an innovative solution and a successful product launch, evolving relationship patterns are identified and analysed in a case study. Both the literature review and case study findings highlight the importance of the 'guanxi' concept (meaning interpersonal relationships in Mandarin) when analysing business-to-business networks in China. Hence, it is suggested that guanxi-based thinking and acting should be incorporated into the interaction model when considering business networking that embrace China. 'Guanxi' broadens the validity of the interaction model, in terms of geographical proximity, and deepens its theoretical base. The case study provides valuable insights for supply management under a product development context in China. In practice, the main point of interest is that Chinese suppliers are important 'resource' providers as well as 'network' providers. Hence, it is suggested that guanxi practice should be reflected into theoretical developments.