895 resultados para Realistic threat


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Global Invasive Species Database, GISD, comprises 27 species of the most significant invasive alien insects in the world (through November, 2005), 6 of which are originally native to China, 11 are established in China, and 10 have a potential invasion

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We hypothesize that the impact of PCB desorption from resuspended sediments depends upon the intensity of the resuspension (which scales to bottom stress in the absence of organisms), the rate at which each congener desorbs (which depends on the size and hydrophobicity of the chemical, the relative amount of 'labile' and 'resistant' forms, and the size distribution of the suspended particles), and the residence time of the particles in the water column (which depends on the time-variable water column turbulence regime and the particle settling velocities). In order to accurately quantify the impact of PCB desorption from Hudson River sediments, we are conducting experiments that realistically mimic bottom shear stress and water column turbulence and rapidly measure PCB congener release. The objectives of this study are to measure the kinetics of PCB congener desorption from Hudson River sediments under realistic bottom shear and water column turbulence conditions and to quantify the impact of shear stress and contaminant aging on PCB desorption kinetics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The interaction between unsteady heat release and acoustic pressure oscillations in gas turbines results in self-excited combustion oscillations which can potentially be strong enough to cause significant structural damage to the combustor. Correctly predicting the interaction of these processes, and anticipating the onset of these oscillations can be difficult. In recent years much research effort has focused on the response of premixed flames to velocity and equivalence ratio perturbations. In this paper, we develop a flame model based on the socalled G-Equation, which captures the kinematic evolution of the flame surfaces, under the assumptions of axisymmetry, and ignoring vorticity and compressibility. This builds on previous work by Dowling [1], Schuller et al. [2], Cho & Lieuwen [3], among many others, and extends the model to a realistic geometry, with two intersecting flame surfaces within a non-uniform velocity field. The inputs to the model are the free-stream velocity perturbations, and the associated equivalence ratio perturbations. The model also proposes a time-delay calculation wherein the time delay for the fuel convection varies both spatially and temporally. The flame response from this model was compared with experiments conducted by Balachandran [4, 5], and found to show promising agreement with experimental forced case. To address the primary industrial interest of predicting self-excited limit cycles, the model has then been linked with an acoustic network model to simulate the closed-loop interaction between the combustion and acoustic processes. This has been done both linearly and nonlinearly. The nonlinear analysis is achieved by applying a describing function analysis in the frequency domain to predict the limit cycle, and also through a time domain simulation. In the latter case, the acoustic field is assumed to remain linear, with the nonlinearity in the response of the combustion to flow and equivalence ratio perturbations. A transfer function from unsteady heat release to unsteady pressure is obtained from a linear acoustic network model, and the corresponding Green function is used to provide the input to the flame model as it evolves in the time domain. The predicted unstable frequency and limit cycle are in good agreement with experiment, demonstrating the potential of this approach to predict instabilities, and as a test bench for developing control strategies. Copyright © 2011 by ASME.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several equations of state (EOS) have been incorporated into a novel algorithm to solve a system of multi-phase equations in which all phases are assumed to be compressible to varying degrees. The EOSs are used to both supply functional relationships to couple the conservative variables to the primitive variables and to calculate accurately thermodynamic quantities of interest, such as the speed of sound. Each EOS has a defined balance of accuracy, robustness and computational speed; selection of an appropriate EOS is generally problem-dependent. This work employs an AUSM+-up method for accurate discretisation of the convective flux terms with modified low-Mach number dissipation for added robustness of the solver. In this paper we show a newly-developed time-marching formulation for temporal discretisation of the governing equations with incorporated time-dependent source terms, as well as considering the system of eigenvalues that render the governing equations hyperbolic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Humans, like other animals, alter their behavior depending on whether a threat is close or distant. We investigated spatial imminence of threat by developing an active avoidance paradigm in which volunteers were pursued through a maze by a virtual predator endowed with an ability to chase, capture, and inflict pain. Using functional magnetic resonance imaging, we found that as the virtual predator grew closer, brain activity shifted from the ventromedial prefrontal cortex to the periaqueductal gray. This shift showed maximal expression when a high degree of pain was anticipated. Moreover, imminence-driven periaqueductal gray activity correlated with increased subjective degree of dread and decreased confidence of escape. Our findings cast light on the neural dynamics of threat anticipation and have implications for the neurobiology of human anxiety-related disorders.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We investigate the dependency of electrostatic interaction forces on applied potentials in electrostatic force microscopy (EFM) as well as in related local potentiometry techniques such as Kelvin probe microscopy (KPM). The approximated expression of electrostatic interaction between two conductors, usually employed in EFM and KPM, may loose its validity when probe-sample distance is not very small, as often realized when realistic nanostructured systems with complex topography are investigated. In such conditions, electrostatic interaction does not depend solely on the potential difference between probe and sample, but instead it may depend on the bias applied to each conductor. For instance, electrostatic force can change from repulsive to attractive for certain ranges of applied potentials and probe-sample distances, and this fact cannot be accounted for by approximated models. We propose a general capacitance model, even applicable to more than two conductors, considering values of potentials applied to each of the conductors to determine the resulting forces and force gradients, being able to account for the above phenomenon as well as to describe interactions at larger distances. Results from numerical simulations and experiments on metal stripe electrodes and semiconductor nanowires supporting such scenario in typical regimes of EFM investigations are presented, evidencing the importance of a more rigorous modeling for EFM data interpretation. Furthermore, physical meaning of Kelvin potential as used in KPM applications can also be clarified by means of the reported formalism. © 2009 American Institute of Physics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An approach of rapid hologram generation for the realistic three-dimensional (3-D) image reconstruction based on the angular tiling concept is proposed, using a new graphic rendering approach integrated with a previously developed layer-based method for hologram calculation. A 3-D object is simplified as layered cross-sectional images perpendicular to a chosen viewing direction, and our graphics rendering approach allows the incorporation of clear depth cues, occlusion, and shading in the generated holograms for angular tiling. The combination of these techniques together with parallel computing reduces the computation time of a single-view hologram for a 3-D image of extended graphics array resolution to 176 ms using a single consumer graphics processing unit card. © 2014 SPIE and IS and T.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A transfer matrix method is presented for the study of electron conduction in a quantum waveguide with soft wall lateral confinement. By transforming the two-dimensional Schrodinger equation into a set of second order ordinary differential equations, the total transfer matrix is obtained and the scattering probability amplitudes are calculated. The proposed method is applied to the evaluation of the electron transmission in two types of cavity structure with finite-height square-well confinement. The results obtained by our method, which are found to be in excellent agreement with those from another transfer matrix method, suggest that the infinite square-well potential is a good approximation to finite-height square-well confinement for electrons propagating in the ground transverse mode, but softening of the walls has an obvious effect on the electron transmission and mode-mixing for propagating in the excited transverse mode. (C) 1996 American Institute of Physics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Scott, Len, The Cuban Missile Crisis And The Threat Of Nuclear War: Lessons From History (London: Continuum, 2007), pp.xii+222 RAE2008

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The insider threat is a security problem that is well-known and has a long history, yet it still remains an invisible enemy. Insiders know the security processes and have accesses that allow them to easily cover their tracks. In recent years the idea of monitoring separately for these threats has come into its own. However, the tools currently in use have disadvantages and one of the most effective techniques of human review is costly. This paper explores the development of an intelligent agent that uses already in-place computing material for inference as an inexpensive monitoring tool for insider threats. Design Science Research (DSR) is a methodology used to explore and develop an IT artifact, such as for this intelligent agent research. This methodology allows for a structure that can guide a deep search method for problems that may not be possible to solve or could add to a phenomenological instantiation.