485 research outputs found

    Seismic capacity evaluation of unreinforced masonry residential buildings in Albania

    Get PDF
    This study evaluates seismic capacity of the unreinforced masonry buildings with the selected template designs constructed per pre-modern code in Albania considering nonlinear behaviour of masonry. Three residential buildings with template designs were selected to represent an important percentage of residential buildings in medium-size cities located in seismic regions of Albania. Selection of template designed buildings and material properties were based on archive and site survey in several cities of Albania. Capacity curves of investigated buildings were determined by pushover analyses conducted in two principal directions. The seismic performances of these buildings have been determined for various earthquake levels. Seismic capacity evaluation was carried out in accordance with FEMA (Federal Emergency Management Agency) 440 guidelines. Reasons for building damages in past earthquakes are examined using the results of capacity assessment of investigated buildings. It is concluded that of the residential buildings with the template design, with the exception of one, are far from satisfying required performance criteria. Furthermore, deficiencies and possible solutions to improve the capacity of investigated buildings are discussed

    Interictal rhythmical midline theta differentiates frontal from temporal lobe epilepsies

    Get PDF
    PURPOSE: We evaluated the role of interictal rhythmical midline theta (RMT) in the identification of frontal lobe epilepsy (FLE) and its differentiation from temporal lobe epilepsy (TLE) and nonepileptic controls. METHODS: We included 162 individuals in the study: 54 FLE patients, 54 TLE patients, and 54 nonepileptic controls. Continuous electroencephalographic (EEG)-video monitoring was performed in all individuals. Interictal RMT was included only if it occurred during definite awake states. RMT associated with drowsiness or mental activation and ictal RMT was excluded. RESULTS: We identified RMT significantly more frequently in FLE patients (48.1%, 26 of 54) than in TLE patients (3.7%, 2 of 54) (p < 0.01), and not in the control group. The average frequency was 6 Hz (range 5-7 Hz), and the average RMT bursts lasted 8 s (3-12 s). Interestingly, all mesial FLE patients (n = 4) (as established by invasive EEG recordings) showed RMT, whereas this was less frequently the case in the other FLE patients (44%, 22 of 50) (p = 0.03). Thirteen of our 54 patients with FLE (24%) did not have any interictal epileptiform discharges (IEDs), but RMT was observed in the majority of these patients (62%, 8 of 13). CONCLUSION: Interictal RMT is common and has a localizing value in patients with FLE, provided that conditions such as drowsiness and mental activation as confounding factors for RMT are excluded. RMT should be included in the evaluation of patients considered for resective epilepsy surgery

    A comparison of epidemic algorithms in wireless sensor networks

    Get PDF
    Cataloged from PDF version of article.We consider the problem of reliable data dissemination in the context of wireless sensor networks. For some application scenarios, reliable data dissemination to all nodes is necessary for propagating code updates, queries, and other sensitive information in wireless sensor networks. Epidemic algorithms are a natural approach for reliable distribution of information in such ad hoc, decentralized, and dynamic environments. In this paper we show the applicability of epidemic algorithms in the context of wireless sensor environments, and provide a comparative performance analysis of the three variants of epidemic algorithms in terms of message delivery rate, average message latency, and messaging overhead on the network. © 2006 Elsevier B.V. All rights reserved

    An Investigation on the Bearing Design and Friction Characteristics of a Hermetic Reciprocating Compressor

    Get PDF
    The most important design parameters for hermetically sealed compressors used in domestic refrigerators are the Coefficient of Performance (COP); low manufacturing and operating costs; long operating life, low noise and vibration levels and to achieve environmentally friendly constructions. Positive displacement piston type compressors are used in refrigerators today due to their high capacity/volume ratios. Hence, the bearings of the hermetic compressors must also satisfy these design conditions. Investigation and optimization of crank shaft bearings in hermetic compressor applications are the main objectives of this study . The effect of crank shaft geometry, bearing clearance, lubricant viscosity, surface roughness and bearing location along the shaft on the friction losses were investigated and the new journal bearing designs were developed. Detailed parametric numerical simulations were performed using commercial software. According to the results of the simulations number of compressors were assembled with the selected design parameters and performance measurements were carried out. The results of the numerical analysis have shown that the numerically calculated mechanical loss level is similar to the performance results measured in a calorimeter test system. Results of the simulations and experiments were evaluated with six sigma (6?) techniques. Measurement of the efficiency of the compressor with the improved bearing design showed 1.3 % increase in the coefficient of performance (COP) with respect to the compressor with previous bearing design. This study shows that the mechanical loss characteristics are significantly influenced by the length of the bearings, clearance between the crankshaft journal and its bearing, kinematic viscosity and operating conditions. Bearing analysis results help to characterize the optimum journal bearing parameters which lead to improved mechanical efficiency of the compressor

    Ictal SPECT in Sturge-Weber syndrome

    Get PDF
    We report on a patient with right-sided Sturge-Weber syndrome (SWS), in whom earlier functional hemispherectomy failed. Subtraction of ictal and interictal single-photon-emission-computed-tomography (SPECT) superimposed on individual MRI showed a right fronto-orbital hyperperfusion, with a left-sided EEG seizure pattern. Ictal SPECT supported our assumption that right frontal originated seizure pattern propagated to left hemisphere via the remaining right frontal bridge. Right orbito-frontal resection and disconnection from corpus callosum resulted in seizure freedom

    Testing robustness of relative complexity measure method constructing robust phylogenetic trees for \u3ci\u3eGalanthus\u3c/i\u3e L. Using the relative complexity measure

    Get PDF
    Background: Most phylogeny analysis methods based on molecular sequences use multiple alignment where the quality of the alignment, which is dependent on the alignment parameters, determines the accuracy of the resulting trees. Different parameter combinations chosen for the multiple alignment may result in different phylogenies. A new non-alignment based approach, Relative Complexity Measure (RCM), has been introduced to tackle this problem and proven to work in fungi and mitochondrial DNA. Result: In this work, we present an application of the RCM method to reconstruct robust phylogenetic trees using sequence data for genus Galanthus obtained from different regions in Turkey. Phylogenies have been analyzed using nuclear and chloroplast DNA sequences. Results showed that, the tree obtained from nuclear ribosomal RNA gene sequences was more robust, while the tree obtained from the chloroplast DNA showed a higher degree of variation. Conclusions: Phylogenies generated by Relative Complexity Measure were found to be robust and results of RCM were more reliable than the compared techniques. Particularly, to overcome MSA-based problems, RCM seems to be a reasonable way and a good alternative to MSA-based phylogenetic analysis. We believe our method will become a mainstream phylogeny construction method especially for the highly variable sequence families where the accuracy of the MSA heavily depends on the alignment parameters

    Reclaiming the political : emancipation and critique in security studies

    Get PDF
    The critical security studies literature has been marked by a shared commitment towards the politicization of security – that is, the analysis of its assumptions, implications and the practices through which it is (re)produced. In recent years, however, politicization has been accompanied by a tendency to conceive security as connected with a logic of exclusion, totalization and even violence. This has resulted in an imbalanced politicization that weakens critique. Seeking to tackle this situation, the present article engages with contributions that have advanced emancipatory versions of security. Starting with, but going beyond, the so-called Aberystwyth School of security studies, the argument reconsiders the meaning of security as emancipation by making the case for a systematic engagement with the notions of reality and power. This revised version of security as emancipation strengthens critique by addressing political dimensions that have been underplayed in the critical security literature

    EPIDEMIOLOGICAL CHARACTERISTICS OF VIRAL HEPATITIS IN PATIENTS WITH RHEUMATIC DISEASES - IMPLICATIONS FROM TREASURE DATABASE

    Get PDF
    EULAR European Congress of Rheumatology (EULAR) -- JUN 01-04, 2022 -- Copenhagen, DENMARK[Abstract Not Available]European Alliance Assoc Rheumato

    A comparison of epidemic algorithms in wireless sensor networks

    Get PDF
    We consider the problem of reliable data dissemination in the context of wireless sensor networks. For some application scenarios, reliable data dissemination to all nodes is necessary for propagating code updates, queries, and other sensitive information in wireless sensor networks. Epidemic algorithms are a natural approach for reliable distribution of information in such ad hoc, decentralized, and dynamic environments. In this paper we show the applicability of epidemic algorithms in the context of wireless sensor environments, and provide a comparative performance analysis of the three variants of epidemic algorithms in terms of message delivery rate, average message latency, and messaging overhead on the network. © 2006 Elsevier B.V. All rights reserved

    Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing

    Get PDF
    Since they were first proposed as a countermeasure against differential power analysis (DPA) in 2006, threshold schemes have attracted a lot of attention from the community concentrating on cryptographic implementations. What makes threshold schemes so attractive from an academic point of view is that they come with an information-theoretic proof of resistance against a specific subset of side-channel attacks: first-order DPA. From an industrial point of view they are attractive as a careful threshold implementation forces adversaries to DPA of higher order, with all its problems such a noise amplification. A threshold scheme that offers the mentioned provable security must exhibit three properties: correctness, incompleteness and uniformity. A threshold scheme becomes more expensive with the number of shares that must be implemented and the required number of shares is lower bound by the algebraic degree of the function being shared plus 1. Defining a correct and incomplete sharing of a function of degree d in d+1 shares is straightforward. However, up to now there is no generic method to achieve uniformity and finding uniform sharings of degree-d functions with d+1 shares is an active research area. In this paper we present a simple and relatively cheap method to find a correct, incomplete and uniform d+1-share threshold scheme for any S-box layer consisting of degree-d invertible S-boxes. The uniformity is not implemented in the sharings of the individual S-boxes but rather at the S-box layer level by the use of feed-forward and some expansion of shares. When applied to the Keccak-p nonlinear step Chi, its cost is very small
    corecore