973 resultados para static recrystallization


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a new approach to the design of a rough fuzzy controller for the control loop of the SVC (static VAR system) in a two area power system for stability enhancement with particular emphasis on providing effective damping for oscillatory instabilities. The performances of the rough fuzzy and the conventional fuzzy controller are compared with that of the conventional PI controller for a variety of transient disturbances, highlighting the effectiveness of the rough fuzzy controller in damping the inter-area oscillations. The effect of the rough fuzzy controller in improving the CCT (critical clearing time) of the two area system is elaborated in this paper as well.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Noncompliance with speed limits is one of the major safety concerns in roadwork zones. Although numerous studies have attempted to evaluate the effectiveness of safety measures on speed limit compliance, many report inconsistent findings. This paper aims to review the effectiveness of four categories of roadwork zone speed control measures: Informational, Physical, Enforcement, and Educational measures. While informational measures (static signage, variable message signage) evidently have small to moderate effects on speed reduction, physical measures (rumble strips, optical speed bars) are found ineffective for transient and moving work zones. Enforcement measures (speed camera, police presence) have the greatest effects, while educational measures also have significant potential to improve public awareness of roadworker safety and to encourage slower speeds in work zones. Inadequate public understanding of roadwork risks and hazards, failure to notice signs, and poor appreciation of safety measures are the major causes of noncompliance with speed limits.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increasing ecological awareness and stringent requirements for environmental protection have led to the development of water lubricated bearings in many applications where oil was used as the lubricant. The chapter details the theoretical analysis to determine both the static and dynamic characteristics,including the stability (using both the linearised perturbation method and the nonlinear transient analysis) of multiple axial groove water lubricated bearings. Experimental measurements and computational fluid dynamics (CFD) simulations by the Tribology research group at Queensland University of Technology,Australia and Manipal Institute of Technology, India, have highlighted a significant gap in the understanding of the flow phenomena and pressure conditions within the lubricating fluid. An attempt has been made to present a CFD approach to model fluid flow in the bearing with three equi-spaced axial grooves and supplied with water from one end of the bearing. Details of the experimental method used to measure the film pressure in the bearing are outlined. The lubricant is subjected to a velocity induced flow (as the shaft rotates) and a pressure induced flow (as the water is forced from one end of the bearing to the other). Results are presented for the circumferential and axial pressure distribution in the bearing clearance for different loads, speeds and supply pressures. The axial pressure profile along the axial groove located in the loaded part of the bearing is measured. The theoretical analysis shows that smaller the groove angle better will be the load-carrying capacity and stability of these bearings. Results are compared with experimentally measured pressure distributions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a reactive Sense and Avoid approach using spherical image-based visual servoing. Avoidance of point targets in the lateral or vertical plane is achieved without requiring an estimate of range. Simulated results for static and dynamic targets are provided using a realistic model of a small fixed wing unmanned aircraft.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The automotive industry has been the focus of digital human modeling (DHM) research and application for many years. In the highly competitive marketplace for personal transportation, the desire to improve the customer’s experience has driven extensive research in both the physical and cognitive interaction between the vehicle and its occupants. Human models provide vehicle designers with tools to view and analyze product interactions before the first prototypes are built, potentially improving the design while reducing cost and development time. The focus of DHM research and applications began with prediction and representation of static postures for purposes of driver workstation layout, including assessments of seat adjustment ranges and exterior vision. Now DHMs are used for seat design and assessment of driver reach and ingress/egress. DHMs and related simulation tools are expanding into the cognitive domain, with computational models of perception and motion, and into the dynamic domain with models of physical responses to ride and vibration. Moreover, DHMs are now widely used to analyze the ergonomics of vehicle assembly tasks. In this case, the analysis aims to determine whether workers can be expected to complete the tasks safely and with good quality. This preface provides a review of the literature to provide context for the nine new papers presented in this special issue.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Distributed Genetic Algorithms (DGAs) designed for the Internet have to take its high communication cost into consideration. For island model GAs, the migration topology has a major impact on DGA performance. This paper describes and evaluates an adaptive migration topology optimizer that keeps the communication load low while maintaining high solution quality. Experiments on benchmark problems show that the optimized topology outperforms static or random topologies of the same degree of connectivity. The applicability of the method on real-world problems is demonstrated on a hard optimization problem in VLSI design.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The objective of this research was to investigate the effect of suspension parameters on dynamic load-sharing of longitudinal-connected air suspensions of a tri-axle semi-trailer. A novel nonlinear model of a multi-axle semi-trailer with longitudinal-connected air suspension was formulated based on fluid mechanics and thermodynamics and was validated through test results. The effects of suspension parameters on dynamic load-sharing and road-friendliness of the semi-trailer were analyzed. Simulation results indicate that the road-friendliness metric DLC (Dynamic Load Coefficient), is generally in accordance with the load-sharing metric - DLSC (Dynamic Load Sharing Coefficient). When the static height or static pressure increases, the DLSC optimization ratio declines monotonically. The effect of employing larger air lines and connectors on the DLSC optimization ratio gives varying results as road roughness increases and as driving speed increases. The results also indicate that if the air line diameter is always assumed to be larger than the connector diameter, the influence of air line diameter on load-sharing is more significant than that of the connector.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Refactoring is a common approach to producing better quality software. Its impact on many software quality properties, including reusability, maintainability and performance, has been studied and measured extensively. However, its impact on the information security of programs has received relatively little attention. In this work, we assess the impact of a number of the most common code-level refactoring rules on data security, using security metrics that are capable of measuring security from the viewpoint of potential information flow. The metrics are calculated for a given Java program using a static analysis tool we have developed to automatically analyse compiled Java bytecode. We ran our Java code analyser on various programs which were refactored according to each rule. New values of the metrics for the refactored programs then confirmed that the code changes had a measurable effect on information security.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wheel-rail interaction is one of the most important research topics in railway engineering. It includes track vibration, track impact response and safety of the track. Track structure failures caused by impact forces can lead to significant economic loss for track owners through damage to rails and to the sleepers beneath. The wheel-rail impact forces occur because of imperfections on the wheels or rails such as wheel flats, irregular wheel profile, rail corrugation and differences in the height of rails connected at a welded joint. The vehicle speed and static wheel load are important factors of the track design, because they are related to the impact forces under wheel-rail defects. In this paper, a 3-Dimensional finite element model for the study of wheel flat impact is developed by use of the FEA software package ANSYS. The effects of the wheel flat to impact force on sleepers with various speeds and static wheel loads under a critical wheel flat size are investigated. It has found that both wheel-rail impact force and impact force on sleeper induced by wheel flat are varying nonlinearly by increasing the vehicle speed; both impact forces are nonlinearly and monotonically increasing by increasing the static wheel load. The relationships between both of impact forces induced by wheel flat and vehicles speed or static load are important to the track engineers to improve the design and maintenance methods in railway industry.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper summarises the achievements of the Smart Skies Project, a three-year, multi-award winning international project that researched, developed and extensively flight tested four enabling aviation technologies: an electrooptical mid-air collision avoidance system, a static obstacle avoidance system, a mobile ground-based air traffic surveillance system, and a global automated airspace separation management system. The project included the development of manned and unmanned flight test aircraft, which were used to characterise the performance of the prototype systems for a range of realistic scenarios under a variety of environmental conditions. In addition to the collection of invaluable flight data, the project achieved world-firsts in the demonstration of future automated collision avoidance and separation management concepts. This paper summarises these outcomes, the overall objectives of the project, the research and the development of the prototype systems, the engineering of the flight test systems, and the results obtained from flight-testing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Conspicuity limitations make bicycling at night dangerous. This experiment quantified bicyclists’ estimates of the distance at which approaching drivers would first recognize them. Twenty five participants (including 13 bicyclists who rode at least once per week, and 12 who rode once per month or less) cycled in place on a closed-road circuit at night-time and indicated when they were confident that an approaching driver would first recognize that a bicyclist was present. Participants wore black clothing alone or together with a fluorescent bicycling vest, a fluorescent bicycling vest with additional retroreflective tape, or the fluorescent retroreflective vest plus ankle and knee reflectors in a modified ‘biomotion’ configuration. The bicycle had a light mounted on the handlebars which was either static, flashing or off. Participants judged that black clothing made them least visible, retroreflective strips on the legs in addition to a retroreflective vest made them most visible and that adding retroreflective materials to a fluorescent vest provides no conspicuity benefits. Flashing bicycle lights were associated with higher conspicuity than static lights. Additionally, occasional bicyclists judged themselves to be more visible than did frequent bicyclists. Overall, bicyclists overestimated their conspicuity compared to previously collected recognition distances and underestimated the conspicuity benefits of retroreflective markings on their ankles and knees. Participants mistakenly judged that a fluorescent vest that did not include retroreflective material would enhance their night-time conspicuity. These findings suggest that bicyclists have dangerous misconceptions concerning the magnitude of the night-time conspicuity problem and the potential value of conspicuity treatments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Load modeling plays an important role in power system dynamic stability assessment. One of the widely used methods in assessing load model impact on system dynamic response is through parametric sensitivity analysis. Load ranking provides an effective measure of such impact. Traditionally, load ranking is based on either static or dynamic load model alone. In this paper, composite load model based load ranking framework is proposed. It enables comprehensive investigation into load modeling impacts on system stability considering the dynamic interactions between load and system dynamics. The impact of load composition on the overall sensitivity and therefore on ranking of the load is also investigated. Dynamic simulations are performed to further elucidate the results obtained through sensitivity based load ranking approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Current state of the art robot mapping and navigation systems produce impressive performance under a narrow range of robot platform, sensor and environmental conditions, in contrast to animals such as rats that produce “good enough” maps that enable them to function under an incredible range of situations. In this paper we present a rat-inspired featureless sensor-fusion system that assesses the usefulness of multiple sensor modalities based on their utility and coherence for place recognition during a navigation task, without knowledge as to the type of sensor. We demonstrate the system on a Pioneer robot in indoor and outdoor environments with abrupt lighting changes. Through dynamic weighting of the sensors, the system is able to perform correct place recognition and mapping where the static sensor weighting approach fails.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile devices give opportunity to new threats. Android is one of the newer operating systems targeting smartphones. While being based on a Linux kernel, Android has unique properties and specific limitations due to its mobile nature. This makes it harder to detect and react upon malware attacks if using conventional techniques. In this paper, we propose an Android Application Sandbox (AASandbox) which is able to perform both static and dynamic analysis on Android programs to automatically detect suspicious applications. Static analysis scans the software for malicious patterns without installing it. Dynamic analysis executes the application in a fully isolated environment, i.e. sandbox, which intervenes and logs low-level interactions with the system for further analysis. Both the sandbox and the detection algorithms can be deployed in the cloud, providing a fast and distributed detection of suspicious software in a mobile software store akin to Google's Android Market. Additionally, AASandbox might be used to improve the efficiency of classical anti-virus applications available for the Android operating system.