944 resultados para Convolutional codes over finite rings


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents an accurate and robust geometric and material nonlinear formulation to predict structural behaviour of unprotected steel members at elevated temperatures. A fire analysis including large displacement effects for frame structures is presented. This finite element formulation of beam-column elements is based on the plastic hinge approach to model the elasto-plastic strain-hardening material behaviour. The Newton-Raphson method allowing for the thermal-time dependent effect was employed for the solution of the non-linear governing equations for large deflection in thermal history. A combined incremental and total formulation for determining member resistance is employed in this nonlinear solution procedure for the efficient modeling of nonlinear effects. Degradation of material strength with increasing temperature is simulated by a set of temperature-stress-strain curves according to both ECCS and BS5950 Part 8, which implicitly allows for creep deformation. The effects of uniform or non-uniform temperature distribution over the section of the structural steel member are also considered. Several numerical and experimental verifications are presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Finite element frame analysis programs targeted for design office application necessitate algorithms which can deliver reliable numerical convergence in a practical timeframe with comparable degrees of accuracy, and a highly desirable attribute is the use of a single element per member to reduce computational storage, as well as data preparation and the interpretation of the results. To this end, a higher-order finite element method including geometric non-linearity is addressed in the paper for the analysis of elastic frames for which a single element is used to model each member. The geometric non-linearity in the structure is handled using an updated Lagrangian formulation, which takes the effects of the large translations and rotations that occur at the joints into consideration by accumulating their nodal coordinates. Rigid body movements are eliminated from the local member load-displacement relationship for which the total secant stiffness is formulated for evaluating the large member deformations of an element. The influences of the axial force on the member stiffness and the changes in the member chord length are taken into account using a modified bowing function which is formulated in the total secant stiffness relationship, for which the coupling of the axial strain and flexural bowing is included. The accuracy and efficiency of the technique is verified by comparisons with a number of plane and spatial structures, whose structural response has been reported in independent studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper emphasizes material nonlinear effects on composite beams with recourse to the plastic hinge method. Numerous combinations of steel and concrete sections form arbitrary composite sections. Secondly, the material properties of composite beams vary remarkably across its section from ductile steel to brittle concrete. Thirdly, concrete is weak in tension, so composite section changes are dependent on load distribution. To this end, the plastic zone approach is convenient for inelastic analysis of composite sections that can evaluate member resistance, including material nonlinearities, by routine numerical integration with respect to every fiber across the composite section. As a result, many researchers usually adopt the plastic zone approach for numerical inelastic analyses of composite structures. On the other hand, the plastic hinge method describes nonlinear material behaviour of an overall composite section integrally. Consequently, proper section properties for use in plastic hinge spring stiffness are required to represent the material behaviour across the arbitrary whole composite section. In view of numerical efficiency and convergence, the plastic hinge method is superior to the plastic zone method. Therefore, based on the plastic hinge approach, how to incorporate the material nonlinearities of the arbitrary composite section into the plastic hinge stiffness formulation becomes a prime objective of the present paper. The partial shear connection in this paper is by virtue of the effective flexural rigidity as AISC 1993 [American Institute of Steel Construction (AISC). Load and resistance factor design specifications. 2nd ed., Chicago; 1993]. Nonlinear behaviour of different kinds of composite beam is investigated in this paper, including two simply supported composite beams, a cantilever and a two span continuous composite beam.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this article I briefly trace the complex and incremental but significant ways that social media platforms have been transformed since the ‘Web 2.0’ moment of the early 2000s, identifying some common trajectories across several platforms, and discussing their consequences for how users – and their capacity for creative agency – are positioned. I argue that the maintenance of balanced tensions between accessibility and openness is important to the ongoing prospects of social and cultural innovation in social media.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective To evaluate the current management of over-the-counter (OTC) insomnia complaints in Australian community pharmacies using standardized patient methodology. Methods Trained standardized patients visited a sample of 100 randomly selected South East Queensland community pharmacies in June 2011. The standardized patients enacted two OTC insomnia scenarios: a direct product request (DPR) (n = 50) and a symptom-based request (SBR) (n = 50). Results of the interactions were documented immediately after each visit and evaluated using the Pharmaceutical Society of Australia's WHAT STOP GO protocol as a standard comparison. Key findings Of all DPRs, 30% were handled entirely by the pharmacist, 70% of staff enquired about specific symptoms and 28% investigated the cause of insomnia. No staff investigated the frequency of product use. The DPR scenario resulted in a 92% supply of the requested doxylamine product (Restavit). In the SBR scenario, 18% of requests were handled entirely by the pharmacist, 58% of staff enquired about specific symptoms and 44% investigated the cause of insomnia. Staff recommended medicated products (38%), or herbal (78%) or non-drug techniques (18%). Investigation into smoking and alcohol intake was not undertaken in DPR or SBR interactions, while questioning on caffeine intake was undertaken in 2 and 14% of cases respectively. There were no significant differences found in the handling of sleep requests by pharmacists compared to pharmacy assistants. Conclusion The standardized patient methodology was a successful way to assess the community pharmacy counselling provided with OTC sleep requests and suboptimal staff responses were found when compared with recommended practice standards.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The goal of this study was to utilise an objective measurement tool, via an on-board Diagnostic tool (OBDII), to explore the effectiveness of a behaviour modification intervention designed to reduce over-speed violations in a group of work-related drivers. It was predicted that over-speed violations would be decreased following participation in a behaviour modification intervention where drivers received weekly feedback on their speeding performance and goal setting exercises. The final analysis included the on-road behaviour of 16 drivers, all of whom completed each stage of the intervention program. As predicted, over-speed violations significantly decreased from pre-test to post-test, after controlling for kilometres driven. These findings offer practical guidance for industry in developing interventions designed to improve work-related driving behaviour.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A combination of factors has dictated patterns of prescribing to contact lens wearers in different age groups over time, such as the evolution of manufacturing technology in bringing better lens designs and replacement frequency options; the aging population demographic; and the knowledge and attitudes of practitioners. Here we explore evolving lens fitting practices at the opposite poles of the age spectrum—children and presbyopes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Terrorists usually target high occupancy iconic and public buildings using vehicle borne incendiary devices in order to claim a maximum number of lives and cause extensive damage to public property. While initial casualties are due to direct shock by the explosion, collapse of structural elements may extensively increase the total figure. Most of these buildings have been or are built without consideration of their vulnerability to such events. Therefore, the vulnerability and residual capacity assessment of buildings to deliberately exploded bombs is important to provide mitigation strategies to protect the buildings' occupants and the property. Explosive loads and their effects on a building have therefore attracted significant attention in the recent past. Comprehensive and economical design strategies must be developed for future construction. This research investigates the response and damage of reinforced concrete (RC) framed buildings together with their load bearing key structural components to a near field blast event. Finite element method (FEM) based analysis was used to investigate the structural framing system and components for global stability, followed by a rigorous analysis of key structural components for damage evaluation using the codes SAP2000 and LS DYNA respectively. The research involved four important areas in structural engineering. They are blast load determination, numerical modelling with FEM techniques, material performance under high strain rate and non-linear dynamic structural analysis. The response and damage of a RC framed building for different blast load scenarios were investigated. The blast influence region for a two dimensional RC frame was investigated for different load conditions and identified the critical region for each loading case. Two types of design methods are recommended for RC columns to provide superior residual capacities. They are RC columns detailing with multi-layer steel reinforcement cages and a composite columns including a central structural steel core. These are to provide post blast gravity load resisting capacity compared to typical RC column against a catastrophic collapse. Overall, this research broadens the current knowledge of blast and residual capacity analysis of RC framed structures and recommends methods to evaluate and mitigate blast impact on key elements of multi-storey buildings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The numerical solution in one space dimension of advection--reaction--diffusion systems with nonlinear source terms may invoke a high computational cost when the presently available methods are used. Numerous examples of finite volume schemes with high order spatial discretisations together with various techniques for the approximation of the advection term can be found in the literature. Almost all such techniques result in a nonlinear system of equations as a consequence of the finite volume discretisation especially when there are nonlinear source terms in the associated partial differential equation models. This work introduces a new technique that avoids having such nonlinear systems of equations generated by the spatial discretisation process when nonlinear source terms in the model equations can be expanded in positive powers of the dependent function of interest. The basis of this method is a new linearisation technique for the temporal integration of the nonlinear source terms as a supplementation of a more typical finite volume method. The resulting linear system of equations is shown to be both accurate and significantly faster than methods that necessitate the use of solvers for nonlinear system of equations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a finite volume method to solve the time-space two-sided fractional advection-dispersion equation on a one-dimensional domain. The spatial discretisation employs fractionally-shifted Grünwald formulas to discretise the Riemann-Liouville fractional derivatives at control volume faces in terms of function values at the nodes. We demonstrate how the finite volume formulation provides a natural, convenient and accurate means of discretising this equation in conservative form, compared to using a conventional finite difference approach. Results of numerical experiments are presented to demonstrate the effectiveness of the approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Transport processes within heterogeneous media may exhibit non- classical diffusion or dispersion which is not adequately described by the classical theory of Brownian motion and Fick’s law. We consider a space-fractional advection-dispersion equation based on a fractional Fick’s law. Zhang et al. [Water Resources Research, 43(5)(2007)] considered such an equation with variable coefficients, which they dis- cretised using the finite difference method proposed by Meerschaert and Tadjeran [Journal of Computational and Applied Mathematics, 172(1):65-77 (2004)]. For this method the presence of variable coef- ficients necessitates applying the product rule before discretising the Riemann–Liouville fractional derivatives using standard and shifted Gru ̈nwald formulas, depending on the fractional order. As an alternative, we propose using a finite volume method that deals directly with the equation in conservative form. Fractionally-shifted Gru ̈nwald formulas are used to discretise the Riemann–Liouville fractional derivatives at control volume faces, eliminating the need for product rule expansions. We compare the two methods for several case studies, highlighting the convenience of the finite volume approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The double burden of childhood undernutrition and adult-onset adiposity in transitioning societies poses a significant public health challenge. The development of suboptimal lean body mass (LBM) could partly explain the link between these two forms of malnutrition. This review examines the evidence on both the role of nutrition in “developmental programming” of LBM and the nutritional influences that affect LBM throughout the life course. Studies from developing countries assessing the relationship of early nutrition with later LBM provide important insights. Overall, the evidence is consistent in suggesting a positive association of early nutritional status (indicated by birth weight and growth during first 2 years) with LBM in later life. Evidence on the impact of maternal nutritional supplementation during pregnancy on later LBM is inconsistent. In addition, the role of nutrients (protein, zinc, calcium, vitamin D) that can affect LBM throughout the life course is described. Promoting optimal intakes of these important nutrients throughout the life course is important for reducing childhood undernutrition as well as for improving the LBM of adults.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We propose to use a simple and effective way to achieve secure quantum direct secret sharing. The proposed scheme uses the properties of fountain codes to allow a realization of the physical conditions necessary for the implementation of no-cloning principle for eavesdropping-check and authentication. In our scheme, to achieve a variety of security purposes, nonorthogonal state particles are inserted in the transmitted sequence carrying the secret shares to disorder it. However, the positions of the inserted nonorthogonal state particles are not announced directly, but are obtained by sending degrees and positions of a sequence that are pre-shared between Alice and each Bob. Moreover, they can confirm that whether there exists an eavesdropper without exchanging classical messages. Most importantly, without knowing the positions of the inserted nonorthogonal state particles and the sequence constituted by the first particles from every EPR pair, the proposed scheme is shown to be secure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,⋅), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.