803 resultados para composite web services
Resumo:
Lipped channel beams (LCBs) are commonly used as flexural members such as floor joists and bearers in the construction 6 industry. These thin-walled LCBs are subjected to specific buckling and failure modes, one of them being web crippling. Despite considerable 7 research in this area, some recent studies have shown that the current web crippling design rules are unable to predict the test capacities under 8 end-two-flange (ETF) and interior-two-flange (ITF) load conditions. In many instances, web crippling predictions by the available design 9 standards such as AISI S100, AS/NZS 4600 and Eurocode 3 Part 1-3 are inconsistent, i.e., unconservative in some cases, although they 10 are conservative in other cases. Hence, experimental studies consisting of 36 tests were conducted in this research to assess the web crippling 11 behavior and capacities of high-strength LCBs under two-flange load cases (ETF and ITF). Experimental results were then compared with the 12 predictions from current design rules. Comparison of the ultimate web crippling capacities from tests showed that the design equations are 13 very unconservative for LCB sections under the ETF load case and are conservative for the ITF load case. Hence, improved equations were 14 proposed to determine the web crippling capacities of LCBs based on the experimental results from this study. Current design equations do 15 not provide the direct strength method (DSM) provisions for web crippling. Hence, suitable design rules were also developed under the DSM 16 format using the test results and buckling analyses using finite-element analyses.
Resumo:
Thin-walled steel hollow flange channel beams known as LiteSteel beam (LSB) sections were developed for use as joists and bearers in various flooring systems. However, they are subjected to specific buckling and failure modes, one of them being web crippling. Despite considerable research in this area, much of the current design predictions for cold-formed steel sections are not directly applicable to LSBs. This is due to the geometry of the LSB, which consists of two closed rectangular hollow flanges, and its unique residual stress characteristics and initial geometric imperfections. Hence an experimental study was conducted to investigate the web crippling behaviour and capacities of LSBs with their flanges fastened to supports. Thirty nine web crippling tests were conducted under two flange load cases (End Two Flange (ETF) and Interior Two Flange (ITF)). Test results showed that for ETF load case the web crippling capacities increased by 50% on average while they increased by 97% for ITF load case when flanges were fastened to supports. Comparison of the ultimate web crippling capacities from tests showed that AS/NZS 4600 and AISI S100 web crippling design equations are conservative for LSB sections with flanges fastened to supports under ETF and ITF load cases. Hence new equations were proposed to determine the web crippling capacities of LSBs with flanges fastened to supports. This paper presents the details of the experimental study into the web crippling behaviour of LSB sections with their flanges fastened under ETF and ITF load cases, and the results.
Resumo:
As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform’s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.
Resumo:
As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform s suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data.
Guided Wave based Damage Detection in a Composite T-joint using 3D Scanning Laser Doppler Vibrometer
Resumo:
Composite T-joints are commonly used in modern composite airframe, pressure vessels and piping structures, mainly to increase the bending strength of the joint and prevents buckling of plates and shells, and in multi-cell thin-walled structures. Here we report a detailed study on the propagation of guided ultrasonic wave modes in a composite T-joint and their interactions with delamination in the co-cured co-bonded flange. A well designed guiding path is employed wherein the waves undergo a two step mode conversion process, one is due to the web and joint filler on the back face of the flange and the other is due to the delamination edges close to underneath the accessible surface of the flange. A 3D Laser Doppler Vibrometer is used to obtain the three components of surface displacements/velocities of the accessible face of the flange of the T-joint. The waves are launched by a piezo ceramic wafer bonded on to the back surface of the flange. What is novel in the proposed method is that the location of any change in material/geometric properties can be traced by computing a frequency domain power flow along a scan line. The scan line can be chosen over a grid either during scan or during post-processing of the scan data off-line. The proposed technique eliminates the necessity of baseline data and disassembly of structure for structural interrogation.
Guided-wave-based damage detection in a composite T-joint using 3D scanning laser Doppler vibrometer
Resumo:
Composite T-joints are commonly used in modern composite airframe, pressure vessels and piping structures, mainly to increase the bending strength of the joint and prevents buckling of plates and shells, and in multi-cell thin-walled structures. Here we report a detailed study on the propagation of guided ultrasonic wave modes in a composite T-joint and their interactions with delamination in the co-cured co-bonded flange. A well designed guiding path is employed wherein the waves undergo a two step mode conversion process, one is due to the web and joint filler on the back face of the flange and the other is due to the delamination edges close to underneath the accessible surface of the flange. A 3D Laser Doppler Vibrometer is used to obtain the three components of surface displacements/velocities of the accessible face of the flange of the T-joint. The waves are launched by a piezo ceramic wafer bonded on to the back surface of the flange. What is novel in the proposed method is that the location of any change in material/geometric properties can be traced by computing a frequency domain power flow along a scan line. The scan line can be chosen over a grid either during scan or during post-processing of the scan data off-line. The proposed technique eliminates the necessity of baseline data and disassembly of structure for structural interrogation.
Resumo:
This work investigates the potential of graphene oxide-cobalt ferrite nanoparticle (GO-CoFe2O4) composite as image contrast enhancing material in Magnetic Resonance Imaging (MRI). In the preset work, GO-CoFe2O4 composites were produced by a two-step synthesis process. In the first step, graphene oxide (GO) was synthesized, and in the second step CoFe2O4 nanoparticles were synthesized in a reaction mixture containing GO to yield graphene GO-CoFe2O4 composite. Proton relaxivity value obtained from the composite was 361 mM(-1)s(-1). This value of proton relaxivity is higher than a majority of reported relaxivity values obtained using several ferrite based contrast agents.
Resumo:
25 p.
Resumo:
[EN]Nowadays the use of web applications is a routine not only for companies but also for anyone interested in them. Thus, this market has risen hugely since the introduction of The Internet in our daily lives. Everyone has experienced the moment when you have to choose an access service and you do not know which one to select. At that moment, it is when this web application comes into action. It provides a useful interface in order to choose between access services as well as an analysis tool for the different access technologies in the market. Written in Java language, this web application is as simple as it can be, offering a complete interface that meets the needs of everyone, from the people at home to the largest company.
Resumo:
Limitações de altura têm sido impostas sobre edificações por regulamentos de zoneamento urbano e aspectos econômicos e estéticos. Além disso, para se proporcionar a passagem de tubulações de grande diâmetro sob vigas de aço, um pé-direito alto é normalmente requerido. Uma solução frequentemente utilizada em projeto diz respeito à abertura de furos na alma das vigas de aço para passagem das tubulações de serviço. Assim sendo, este trabalho de pesquisa objetiva a avaliação da resposta dinâmica de passarelas para pedestres, onde o projeto estrutural prevê a utilização de vigas celulares em aço. Objetiva-se verificar a influência das aberturas nas almas dessas vigas sobre a resposta dinâmica das passarelas. As ações dinâmicas representativas do caminhar dos pedestres são simuladas por meio de um modelo matemático que considera uma descrição espacial e temporal e, ainda, inclui o efeito do impacto do calcanhar humano. Os modelos estruturais investigados correspondem a passarelas mistas (aço-concreto) com 10m a 30m de extensão. São empregadas técnicas usuais de discretização, via método dos elementos finitos, por meio do programa Ansys. A resposta dinâmica das passarelas é obtida para duas situações distintas: vigas de alma cheia e vigas celulares. Uma avaliação crítica sobre a resposta dinâmica das passarelas possibilita verificar a influência dos furos nas almas das vigas metálicas, mediante a obtenção das acelerações de pico, focando aspectos associados ao conforto humano, considerando-se comparações com normas e recomendações de projeto.
Resumo:
1:12-Silicomolybdic acid (SiMo12) doped carbon ceramic composite electrodes were fabricated by incorporating SiMo12 and graphite powder in a methyltrimethoxysilane-based gel and characterized by cyclic and square-wave voltammetry, It was demonstrated that the chemically modified electrodes were suitable for electrocatalytic reduction of bromate, The electrodes had the remarkable advantage of surface renewal owing to bulk modification, as web as simple preparation, good mechanical and chemical stability and reproducibility.
Resumo:
Urquhart, C., Lonsdale, R.,Thomas, R., Spink, S., Yeoman, A., Armstrong, C. & Fenton, R. (2003). Uptake and use of electronic information services: trends in UK higher education from the JUSTEIS project. Program, 37(3), 167-180. Sponsorship: JISC
Resumo:
Urquhart,C., Thomas, R., Spink, S., Fenton, R., Yeoman, A., Lonsdale, R., Armstrong, C., Banwell, L., Ray, K., Coulson, G. & Rowley, J. (2005). Student use of electronic information services in further education. International Journal of Information Management, 25(4), 347-362. Sponsorship: JISC
Resumo:
Urquhart, C., Spink, S., Thomas, R., Yeoman, A., Durbin, J., Turner, J., Fenton, R. & Armstrong, C. (2004). JUSTEIS: JISC Usage Surveys: Trends in Electronic Information Services Final report 2003/2004 Cycle Five. Aberystwyth: Department of Information Studies, University of Wales Aberystwyth. Sponsorship: JISC