931 resultados para Bridges Design and construction Safety measures
Resumo:
The deliberate tailoring of hierarchical flowerlike gold microstructure (HFGMs) at the ultrathin level is an ongoing challenge and could introduce opportunities for new fabrication and application in many fields. In this paper. a templateless, surfactantless, electrochemical strategy for fabrication of ultrathin platinum-group metal coated HFGMs is proposed. HFGMs were prepared by simple electrodeposition on an indium tin oxide (ITO) substrate.
Resumo:
By using the bifunctional ligand, 8-hydroxyquinoline-functionalized organosilane (Q-Si), the new mesoporous material Q-MCM-41 covalently bonded with 8-hydroxyquinoline was synthesized. Through the ligand exchange reaction, the new near-infrared (NIR) luminescent mesoporous LnQ(3)-MCM-41 (Ln = Er, Nd, Yb) materials were prepared by linking the lanthanide quinolinate complexes to the ordered mesoporous Q-MCM-41 material. The LnQ(3)-MCM-41 materials were characterized by powder X-ray diffraction and N-2 adsorption/desorption, and they all show the characteristic mesoporous structure of MCM-41 with highly uniform pore size distributions.
Resumo:
During tunnel constriction the classification of rock mass is widely used in tunnel design and construction. Moreover it offers the base information about tunnel investment and security. The quick classification of rock mass is very important for not delaying tunnel construction. Nowadays the tunnel engineers usually use initial survey files which are obtained by probe drilling to design a tunnel. It brings the problem that initial surrounding rock classification is usually much different from the real condition during the tunnel construction. Because initial surrounding rock lack credibility, it need us to make real time surrounding rock classification during the tunnel construction, and feed back the result to designers and constructors. Therefore, to find a quick wall rock classification method is very important not only for the time limit for a project but also for not delaying tunnel construction. Not all but many tunnels and underground constructions do suffer form collapse during the period of construction. Although accidental collapse in a large project in civil and geotechnical engineering sometimes appears to be a local event, if it occurred, it can bring about casualties, disrupted,production, construction delay, environmental damage, capital cost etc,therefore, it has been a difficult problem ,both in theory and in practice, establishing how to prevent underground structures form collapse and how to handle such an event in case in occurs. It is important to develop effective solutions and technical measures to prevent and control the collapse. According to the tunnel collapse occurred in Cheng De this paper analyze the main collapse mechanism leading to tunnel collapse and summon up the disposal method when collapse happened. It may be useful for tunnel construction in Cheng De in future. This paper is base on tunnel surrounding rock classification and tunnel support tasks during the tunnel construction in Cheng De area. It aims at solving 4 important problems in tunnel design and construction. 1) The relationship between rock rebound strength and rock single axle compression strength. First we go to the face wall and do rebound test on the tunnel face, then we chose some pieces of rock and do point loading test. Form the tests record we try to find the relationship between rock rebound strength and rock single axle compression strength. 2) The relationship between the value [BQ] and the value Q. First in order to obtain the information of rock character, rock strength, degree of weathering, the structure of rock mass, the joint condition, underground water condition and so on, we go to the tunnel face to do field investigation. And then we use two kinds of rock classification method to make surrounding rock classification. Base on the works above, finally we analyze the relationship between the value [BQ] and the value Q. 3) Sum up the mechanism leading to tunnel collapse and it disposal method in Cheng De area According to the tunnel collapse occurred in Cheng De this paper analyze the main reasons leading to the tunnel collapse and sum up the disposal method when collapse happened. 4) Obtain the properties of steel frame grid by numerical simulation. First we establish the 3D numeral model of steel frame grid by ADINA, and then find the mechanics properties by numerical simulation in ADINA. Second Based on the rock mass geological structure model, we established steel frame grid numeral model which is installed in the tunnel by FLAC3D and simulated the progress of tunnel construction. We hope that the support effect in tunnel can be evaluated from the numerical simulation.
Resumo:
Evaluating the mechanical properties of rock masses is the base of rock engineering design and construction. It has great influence on the safety and cost of rock project. The recognition is inevitable consequence of new engineering activities in rock, including high-rise building, super bridge, complex underground installations, hydraulic project and etc. During the constructions, lots of engineering accidents happened, which bring great damage to people. According to the investigation, many failures are due to choosing improper mechanical properties. ‘Can’t give the proper properties’ becomes one of big problems for theoretic analysis and numerical simulation. Selecting the properties reasonably and effectively is very significant for the planning, design and construction of rock engineering works. A multiple method based on site investigation, theoretic analysis, model test, numerical test and back analysis by artificial neural network is conducted to determine and optimize the mechanical properties for engineering design. The following outcomes are obtained: (1) Mapping of the rock mass structure Detailed geological investigation is the soul of the fine structure description. Based on statistical window,geological sketch and digital photography,a new method for rock mass fine structure in-situ mapping is developed. It has already been taken into practice and received good comments in Baihetan Hydropower Station. (2) Theoretic analysis of rock mass containing intermittent joints The shear strength mechanisms of joint and rock bridge are analyzed respectively. And the multiple modes of failure on different stress condition are summarized and supplied. Then, through introducing deformation compatibility equation in normal direction, the direct shear strength formulation and compression shear strength formulation for coplanar intermittent joints, as well as compression shear strength formulation for ladderlike intermittent joints are deducted respectively. In order to apply the deducted formulation conveniently in the real projects, a relationship between these formulations and Mohr-Coulomb hypothesis is built up. (3) Model test of rock mass containing intermittent joints Model tests are adopted to study the mechanical mechanism of joints to rock masses. The failure modes of rock mass containing intermittent joints are summarized from the model test. Six typical failure modes are found in the test, and brittle failures are the main failure mode. The evolvement processes of shear stress, shear displacement, normal stress and normal displacement are monitored by using rigid servo test machine. And the deformation and failure character during the loading process is analyzed. According to the model test, the failure modes quite depend on the joint distribution, connectivity and stress states. According to the contrastive analysis of complete stress strain curve, different failure developing stages are found in the intact rock, across jointed rock mass and intermittent jointed rock mass. There are four typical stages in the stress strain curve of intact rock, namely shear contraction stage, linear elastic stage, failure stage and residual strength stage. There are three typical stages in the across jointed rock mass, namely linear elastic stage, transition zone and sliding failure stage. Correspondingly, five typical stages are found in the intermittent jointed rock mass, namely linear elastic stage, sliding of joint, steady growth of post-crack, joint coalescence failure, and residual strength. According to strength analysis, the failure envelopes of intact rock and across jointed rock mass are the upper bound and lower bound separately. The strength of intermittent jointed rock mass can be evaluated by reducing the bandwidth of the failure envelope with geo-mechanics analysis. (4) Numerical test of rock mass Two sets of methods, i.e. the distinct element method (DEC) based on in-situ geology mapping and the realistic failure process analysis (RFPA) based on high-definition digital imaging, are developed and introduced. The operation process and analysis results are demonstrated detailedly from the research on parameters of rock mass based on numerical test in the Jinping First Stage Hydropower Station and Baihetan Hydropower Station. By comparison,the advantages and disadvantages are discussed. Then the applicable fields are figured out respectively. (5) Intelligent evaluation based on artificial neural network (ANN) The characters of both ANN and parameter evaluation of rock mass are discussed and summarized. According to the investigations, ANN has a bright application future in the field of parameter evaluation of rock mass. Intelligent evaluation of mechanical parameters in the Jinping First Stage Hydropower Station is taken as an example to demonstrate the analysis process. The problems in five aspects, i. e. sample selection, network design, initial value selection, learning rate and expected error, are discussed detailedly.
Resumo:
Seepage control in karstic rock masses is one of the most important problems in domestic hydroelectric engineering and mining engineering as well as traffic engineering. At present permeability assessment and leakage analysis of multi-layer karstic rock masses are mainly qualitative, while seldom quantitative. Quantitative analyses of the permeability coefficient and seepage amount are conducted in this report, which will provide a theoretical basis for the study of seepage law and seepage control treatment of karstic rocks. Based on the field measurements in the horizontal grouting galleries of seepage control curtains on the left bank of the Shuibuya Hydropower Project on the Qingjiang river, a hydraulic model is established in this report, and the computation results will provide a scientific basis for optimization of grouting curtain engineering. Following issues are addressed in the report. (1) Based on the in-situ measurements of fissures and karstic cavities in grouting galleries, the characteristics of karstic rock mass is analyzed, and a stochastic structural model of karstic rock masses is set up, which will provide the basis for calculation of the permeability and leakage amount of karstic rock mass. (2) According to the distribution of the measured joints in the grouting galleries and the stochastic results obtained from the stochastic structural model of karstic rock mass between grouting galleries, a formula for computation of permeability tensor of fracturing system is set up, and a computation program is made with Visual Basic language. The computation results will be helpful for zoning of fissured rock masses and calculation of seepage amount as well as optimization of seepage control curtains. (3) Fractal theory is used to describe quantitatively the roughness of conduit walls of karstic systems and the sinuosity of karstic conduits. It is proposed that the roughness coefficient of kastic caves can be expressed by both fractal dimension Ds and Dr that represent respectively the extension sinuosity of karstic caves and the roughness of the conduit walls. The existing formula for calculating the seepage amount of karstic conduits is revised and programmed. The seepage amount of rock masses in the measured grouting galleries is estimated under the condition that no seepage control measures are taken before reservoir impoundment, and the results will be helpful for design and construction optimization of seepage curtains of the Shuibuya hydropower project. This report is one part of the subject "Karstic hydrogeology and the structural model and seepage hydraulics of karstic rock masses", a sub-program of "Study on seepage hydraulics of multi-layer karstic rock masses and its application in seepage control curtain engineering", which is financially supported by the Hubei Provincial key science and technology programme.
Resumo:
This thesis presents SodaBot, a general-purpose software agent user-environment and construction system. Its primary component is the basic software agent --- a computational framework for building agents which is essentially an agent operating system. We also present a new language for programming the basic software agent whose primitives are designed around human-level descriptions of agent activity. Via this programming language, users can easily implement a wide-range of typical software agent applications, e.g. personal on-line assistants and meeting scheduling agents. The SodaBot system has been implemented and tested, and its description comprises the bulk of this thesis.
Resumo:
Parallel shared-memory machines with hundreds or thousands of processor-memory nodes have been built; in the future we will see machines with millions or even billions of nodes. Associated with such large systems is a new set of design challenges. Many problems must be addressed by an architecture in order for it to be successful; of these, we focus on three in particular. First, a scalable memory system is required. Second, the network messaging protocol must be fault-tolerant. Third, the overheads of thread creation, thread management and synchronization must be extremely low. This thesis presents the complete system design for Hamal, a shared-memory architecture which addresses these concerns and is directly scalable to one million nodes. Virtual memory and distributed objects are implemented in a manner that requires neither inter-node synchronization nor the storage of globally coherent translations at each node. We develop a lightweight fault-tolerant messaging protocol that guarantees message delivery and idempotence across a discarding network. A number of hardware mechanisms provide efficient support for massive multithreading and fine-grained synchronization. Experiments are conducted in simulation, using a trace-driven network simulator to investigate the messaging protocol and a cycle-accurate simulator to evaluate the Hamal architecture. We determine implementation parameters for the messaging protocol which optimize performance. A discarding network is easier to design and can be clocked at a higher rate, and we find that with this protocol its performance can approach that of a non-discarding network. Our simulations of Hamal demonstrate the effectiveness of its thread management and synchronization primitives. In particular, we find register-based synchronization to be an extremely efficient mechanism which can be used to implement a software barrier with a latency of only 523 cycles on a 512 node machine.
Resumo:
Previous research in force control has focused on the choice of appropriate servo implementation without corresponding regard to the choice of mechanical hardware. This report analyzes the effect of mechanical properties such as contact compliance, actuator-to-joint compliance, torque ripple, and highly nonlinear dry friction in the transmission mechanisms of a manipulator. A set of requisites for high performance then guides the development of mechanical-design and servo strategies for improved performance. A single-degree-of-freedom transmission testbed was constructed that confirms the predicted effect of Coulomb friction on robustness; design and construction of a cable-driven, four-degree-of- freedom, "whole-arm" manipulator illustrates the recommended design strategies.
Resumo:
Act2 is a highly concurrent programming language designed to exploit the processing power available from parallel computer architectures. The language supports advanced concepts in software engineering, providing high-level constructs suitable for implementing artificially-intelligent applications. Act2 is based on the Actor model of computation, consisting of virtual computational agents which communicate by message-passing. Act2 serves as a framework in which to integrate an actor language, a description and reasoning system, and a problem-solving and resource management system. This document describes issues in Act2's design and the implementation of an interpreter for the language.
Resumo:
Transport and its energetic and environmental impacts affect our daily lives. The transport sector is the backbone of the United Kingdom’s economy with 2.3 million people being employed in this sector. With a high dependency on transport for passengers and freight and with the knowledge that oil reserves are rapidly decreasing a solution has to be identified for conserving fuel. Passenger vehicles account for 61% of the transport fuel consumed in the U.K. and should be seen as a key area to tackle. Despite the introduction and development of electric powered cars, the widespread infrastructure that is required is not in place and has attributed to their slow uptake, as well as the fact that the electric car’s performance is not yet comparable with the conventional internal combustion engine. The benefits of the introduction of kinetic energy recovery systems to be used in conjunction with internal combustion engines and designed such that the system could easily be fitted into future passenger vehicles are examined. In this article, a review of automobile kinetic energy recovery system is presented. It has been argued that the ultracapacitor technology offers a sustainable solution. An optimum design for the urban driving cycle experienced in the city of Edinburgh has been introduced. The potential for fuel savings is also presented
Resumo:
Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.
Resumo:
The Activity in GEriatric acute CARe (AGECAR) is a randomised control trial to assess the effectiveness of an intrahospital strength and walk program during short hospital stays for improving functional capacity of patients aged 75 years or older. Patien
Resumo:
http://www.archive.org/details/japanesewomenspe032256mbp