1,079 research outputs found

    A numerical model of delamination in composite laminated beams using the LRZ beam element based on the refined zigzag theory

    Get PDF
    A method based on the Refined Zigzag Theory (RZT) to model delamination in composite laminated beam structures is presented. The novelty of this method is the use of one-dimensional finite elements to discretize the geometry of the beam. The key property of this beam element, named LRZ, is the possibility to capture the relative displacement between consecutive layers which occurs during delamination. The fracture mode that the LRZ element is capable to predict is mode II. In order to capture the relative displacement using the LRZ element it is necessary to adapt the RZT theory as presented in this paper. The mechanical properties of the layers are modeled using a continuum isotropic damage model. The modified Newton–Raphson method is used for solving the non-linear problem. The RZT theory, the LRZ finite element and the isotropic damage model are described in the paper. Also, the implicit integrations algorithm is presented. The performance of the LRZ element is analyzed by studying the delamination in a beam for two different laminates, using the plane stress solution as a reference

    Simulated trajectories error analysis program. Volume 1 - User's manual Final report

    Get PDF
    Input/output routines and computerized simulation for error analysi

    The rhetoric of Americanisation: social construction and the British computer industry in the Post-World War II period

    Get PDF
    This research seeks to understand the process of technological development in the UK and the specific role of a ‘rhetoric of Americanisation’ in that process. The concept of a ‘rhetoric of Americanisation’ will be developed throughout the thesis through a study into the computer industry in the UK in the post-war period. Specifically, the thesis discusses the threat of America, or how actors in the network of innovation within the British computer industry perceived it as a threat and the effect that this perception had on actors operating in the networks of construction in the British computer industry. However, the reaction to this threat was not a simple one. Rather this story is marked by sectional interests and technopolitical machination attempting to capture this rhetoric of ‘threat’ and ‘falling behind’. In this thesis the concept of ‘threat’ and ‘falling behind’, or more simply the ‘rhetoric of Americanisation’, will be explored in detail and the effect this had on the development of the British computer industry. What form did the process of capture and modification by sectional interests within government and industry take and what impact did this have on the British computer industry? In answering these questions, the thesis will first develop a concept of a British culture of computing which acts as the surface of emergence for various ideologies of innovation within the social networks that made up the computer industry in the UK. In developing this understanding of a culture of computing, the fundamental distinction between the US and UK culture of computing will be explored. This in turn allows us to develop a concept of how Americanisation emerged as rhetorical construct. With the influence of a ‘rhetoric of Americanisation’, the culture of computing in the UK began to change and the process through which government and industry interacted in the development of computing technologies also began to change. In this second half of the thesis a more nuanced and complete view of the nature of innovation in computing in the UK in the sixties will be developed. This will be achieved through an understanding of the networks of interaction between government and industry and how these networks were reconfigured through a ‘rhetoric of Americanisation’. As a result of this, the thesis will arrive at a more complete view of change and development within the British computer industry and how interaction with government influences that change

    Healthcare Design: Designing Healthier and Happier Environments for Patient Care

    Get PDF
    This paper will discuss research regarding the best practices in developing a healthy environment in a medical facility in order to better aid the recovery of patients and help facilitate a more efficient work environment for the nursing staff. Medical facility design will be discussed in terms of safety and infection control; the psychological effects of certain design elements on patients; and appropriate accommodations for patients, staff, and family. The research discussed has been used to develop an updated and healthy environment for the Olivet Nazarene University Virtual Learning Center (VLC) housed in Wisner Hall of Nursing Education. This paper will discuss the design for the VLC as it pertains to the aesthetics including color, artwork, and space planning. Limitations to the project including budget and time will also be addressed

    Trusted execution: applications and verification

    Get PDF
    Useful security properties arise from sealing data to specific units of code. Modern processors featuring Intel’s TXT and AMD’s SVM achieve this by a process of measured and trusted execution. Only code which has the correct measurement can access the data, and this code runs in an environment trusted from observation and interference. We discuss the history of attempts to provide security for hardware platforms, and review the literature in the field. We propose some applications which would benefit from use of trusted execution, and discuss functionality enabled by trusted execution. We present in more detail a novel variation on Diffie-Hellman key exchange which removes some reliance on random number generation. We present a modelling language with primitives for trusted execution, along with its semantics. We characterise an attacker who has access to all the capabilities of the hardware. In order to achieve automatic analysis of systems using trusted execution without attempting to search a potentially infinite state space, we define transformations that reduce the number of times the attacker needs to use trusted execution to a pre-determined bound. Given reasonable assumptions we prove the soundness of the transformation: no secrecy attacks are lost by applying it. We then describe using the StatVerif extensions to ProVerif to model the bounded invocations of trusted execution. We show the analysis of realistic systems, for which we provide case studies

    Aspects of command language portability incorporating a machine-independent filestore concept

    Get PDF
    A brief summary of job control language development precedes a general discussion of possible improvements in command language practice. The user requirements of a command language are considered with special reference to a machine independent basis. "Primitive" functions are defined from this viewpoint. To meet the proposed objective of portability it is suggested that an appreciation of the user interaction with the computer operating system is necessary. This provides the definition of the user profile model based on the user requirements of a command language. A second model is then developed to represent the structure of the operating system. [Continues.
    corecore