8 research outputs found

    Development of a compact air-regulated siphon for use in storm sewage overflows.

    Get PDF
    An air regulated siphon has been developed to operate as a storm water overflow. One of the main requirements has been that a siphon of compact design can accommodate high discharges for relatively small increases in upstream level thereby preventing the possibility of surcharges in the sewer upstream of the overflow.The s-shaped siphon was chosen for development as it has, by virtue of its natural shape, an efficient priming system. The downstream leg of the s-shaped siphon is returned beneath the crest so that a vertical wall of water formed shortly after first spill thereby effecting a seal which ensures priming.A sectional perspex model was used to determine the effects of inlet lip length, inlet lip elevation, tailwater level, siphon width, upstream channel width, vortices at inlet and revised outlet configurations.Results were compared using a dimensionless plot of the ratio of priming head and throat depth (hi/d) against co-efficient of discharge (CD). The curves obtained for all the differenct configurations are useful as design aids for the design of a compact air regulated siphon for use in storm sewage overflows

    Solar thermal plant impact analysis and requirements definition study

    Get PDF
    The technology and economics of solar thermal electric systems (STES) for electric power production is discussed. The impacts of and requirements for solar thermal electric power systems were evaluated

    A method for system of systems definition and modeling using patterns of collective behavior

    Get PDF
    The Department of Defense ship and aircraft acquisition process, with its capability-based assessments and fleet synthesis studies, relies heavily on the assumption that a functional decomposition of higher-level system of systems (SoS) capabilities into lower-level system and subsystem behaviors is both possible and practical. However, SoS typically exhibit “non-decomposable” behaviors (also known as emergent behaviors) for which no widely-accepted representation exists. The presence of unforeseen emergent behaviors, particularly undesirable ones, can make systems vulnerable to attacks, hacks, or other exploitation, or can cause delays in acquisition program schedules and cost overruns in order to mitigate them. The International Council on Systems Engineering has identified the development of methods for predicting and managing emergent behaviors as one of the top research priorities for the Systems Engineering profession. Therefore, this thesis develops a method for rendering quantifiable SoS emergent properties and behaviors traceable to patterns of interaction of their constitutive systems, so that exploitable patterns identified during the early stages of design can be accounted for. This method is designed to fill two gaps in the literature. First, the lack of an approach for mining data to derive a model (i.e. an equation) of the non-decomposable behavior. Second, the lack of an approach for qualitatively and quantitatively associating emergent behaviors with the components that cause the behavior. A definition for emergent behavior is synthesized from the literature, as well as necessary conditions for its identification. An ontology of emergence that enables studying the emergent behaviors exhibited by self-organized systems via numerical simulations is adapted for this thesis in order to develop the mathematical approach needed to satisfy the research objective. Within the confines of two carefully qualified assumptions (that the model is valid, and that the model is efficient), it is argued that simulated emergence is bona-fide emergence, and that simulations can be used for experimentation without sacrificing rigor. This thesis then puts forward three hypotheses: The first hypothesis is that self-organized structures imply the presence of a form of data compression, and this compression can be used to explicitly calculate an upper bound on the number of emergent behaviors that a system can possess. The second hypothesis is that the set of numerical criteria for detecting emergent behavior derived in this research constitutes sufficient conditions for identifying weak and functional emergent behaviors. The third hypothesis states that affecting the emergent properties of these systems will have a bigger impact on the system’s performance than affecting any single component of that system. Using the method developed in this thesis, exploitable properties are identified and component behaviors are modified to attempt the exploit. Changes in performance are evaluated using problem-specific measures of merit. The experiments find that Hypothesis 2 is false (the numerical criteria are not sufficient conditions) by identifying instances where the numerical criteria produce a false-positive. As a result, a set of sufficient conditions for emergent behavior identification remains to be found. Hypothesis 1 was also falsified based on a worst-case scenario where the largest possible number of obtainable emergent behaviors was compared against the upper bound computed from the smallest possible data compression of a self-organized system. Hypothesis 3, on the other hand, was supported, as it was found that new behavior rules based on component-level properties provided less improvement to performance against an adversary than rules based on system-level properties. Overall, the method is shown to be an effective, systematic approach to non-decomposable behavior exploitation, and an improvement over the modern, largely ad hoc approach.Ph.D

    LIPIcs, Volume 251, ITCS 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 251, ITCS 2023, Complete Volum

    University of San Diego News Print Media Coverage 2009.02

    Get PDF
    Printed clippings housed in folders with a table of contents arranged by topic.https://digital.sandiego.edu/print-media/1073/thumbnail.jp

    University of San Diego News Print Media Coverage 2008.06

    Get PDF
    Printed clippings housed in folders with a table of contents arranged by topic.https://digital.sandiego.edu/print-media/1065/thumbnail.jp
    corecore