223 research outputs found

    Compromise: An Effective Approach for Designing Composite Conical Shell Structures

    Get PDF
    The layout of fiber composite structures compared to that of structures made from conventional homogeneous isotropic materials is far more difficult, because a fiber composite (laminate) is built up of several unidirectional layers (UD-layers) with fibers set at different angles. A contribution to the structural analysis and preliminary design of a fiber-reinforced conical shell is made in this paper Design of Composite Material Shells In modern lightweight structures, shells of revolution fabricated of fiber composite materials, e.g., fuel tanks, are becoming increasingly important. These shell structures can mostly be built up from different well known shell types, e.g., spherical, cylindrical and conical shells, simplifying the stress and deformation calculations. A more difficult problem is calculating the stress concentrations which appear at the connections of the different shell types. The reason being that the deformations of the different shell types under similar loading are not the same and so bending and shear effects appear. The high stresses at the connection decrease rapidly away from it, so that for the most part of the shell the membrane stresses are important. Thus, to design a shell structure one must use both the membrane theory and bending theory. The bending theory for composite material structures is much more complicated than for structures made of homogeneous and isotropic materials. Therefore, we have to find a way to design shell structures using only the membrane theory. This is possible if the stiffnesses of the different shell types can be changed in a way that the strains (or the deformations) at the connections are the same. By using composite materials, instead of isotropic materials, the stiffness can be changed by using different layer orientations in a laminate and increasing or decreasing the layer thickness. To find the appropriate layer orientation and thickness optimization methods can be applied. Before one can build up a whole shell structure out of spherical, cylindrical and/or conical shells the deformation behavior of the different shell types has to be studied in detail. In references [1] and [2] several parametric studies and the "optimum" design of spherical and cylindrical shells under pressure and temperature loads are given. Battermann and Pavicic [3] published a paper about weight minimization of laminated shells of revolution where the laminate is built up as a symmetrical angle-ply laminate. They found the optimal results by doing a lot of calculations with different laminate parameters, e.g., fiber angles and laminate thicknesses. Most of the publications in the field of optimum design of composite shells have dealt with weight minimization including stability and/or vibration constraints, see Our paper deals with the structural analysis and preliminary design of a thin conical shell subjected to a pressure load and a temperature distribution along the meridian direction, as shown in A comprehensive approach called the Decision Support Problem (DSP) Techniqu

    Weak percolation on multiplex networks

    Get PDF
    peer-reviewedBootstrap percolation is a simple but nontrivial model. It has applications in many areas of science and has been explored on random networks for several decades. In single-layer (simplex) networks, it has been recently observed that bootstrap percolation, which is defined as an incremental process, can be seen as the opposite of pruning percolation, where nodes are removed according to a connectivity rule. Here we propose models of both bootstrap and pruning percolation for multiplex networks. We collectively refer to these two models with the concept of "weak" percolation, to distinguish them from the somewhat classical concept of ordinary ("strong") percolation. While the two models coincide in simplex networks, we show that they decouple when considering multiplexes, giving rise to a wealth of critical phenomena. Our bootstrap model constitutes the simplest example of a contagion process on a multiplex network and has potential applications in critical infrastructure recovery and information security. Moreover, we show that our pruning percolation model may provide a way to diagnose missing layers in a multiplex network. Finally, our analytical approach allows us to calculate critical behavior and characterize critical clusters.PUBLISHEDpeer-reviewe

    Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors

    Get PDF
    Specific features of Wireless Sensor Networks (WSNs) like the open accessibility to nodes, or the easy observability of radio communications, lead to severe security challenges. The application of traditional security schemes on sensor nodes is limited due to the restricted computation capability, low-power availability, and the inherent low data rate. In order to avoid dependencies on a compromised level of security, a WSN node with a microcontroller and a Field Programmable Gate Array (FPGA) is used along this work to implement a state-of-the art solution based on ECC (Elliptic Curve Cryptography). In this paper it is described how the reconfiguration possibilities of the system can be used to adapt ECC parameters in order to increase or reduce the security level depending on the application scenario or the energy budget. Two setups have been created to compare the software- and hardware-supported approaches. According to the results, the FPGA-based ECC implementation requires three orders of magnitude less energy, compared with a low power microcontroller implementation, even considering the power consumption overhead introduced by the hardware reconfiguratio

    On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks

    Get PDF
    Providing security for a wireless sensor network composed of small sensor nodes with limited battery power and memory can be a non-trivial task. A variety of key predistribution schemes have been proposed which allocate symmetric keys to the sensor nodes before deployment. In this paper we examine the role of expander graphs in key predistribution schemes for wireless sensor networks. Roughly speaking, a graph has good expansion if every `small\u27 subset of vertices has a `large\u27 neighbourhood, and intuitively, expansion is a desirable property for graphs of networks. It has been claimed that good expansion in the product graph is necessary for `optimal\u27 networks. We demonstrate flaws in this claim, argue instead that good expansion is desirable in the intersection graph, and discuss how this can be achieved. We then consider key predistribution schemes based on expander graph constructions and compare them to other schemes in the literature. Finally, we propose the use of expansion and other graph-theoretical techniques as metrics for assessing key predistribution schemes and their resulting wireless sensor networks

    Poly[ethyl­enediammonium [tris­[μ3-hydrogenphosphato(2−)]dicadmium] monohydrate]

    Get PDF
    The title compound, {(C2H10N2)[Cd2(HPO4)3]·H2O}n, was synthesized under hydro­thermal conditions. The structure of this hybrid compound consists of CdO6, CdO5 and PO4 polyhedra arranged so as to build an anionic inorganic layer, namely [Cd2(HPO4)3]2−, parallel to the ab plane. The edge-sharing CdO6 octa­hedra form infinite chains running along the a axis and are linked by CdO5 and PO4 polyhedra. The ethyl­ene­diammonium cation and the water mol­ecule are located between two adjacent inorganic layers and ensure the cohesion of the structure via N—H⋯O and O—H⋯O hydrogen bonds
    corecore