22,284 research outputs found

    Surface crack growth in fiber composites

    Get PDF
    The results of an experimental study of damage extension and failure in glass and graphite/epoxy laminates containing partially through-thickness surface cracks are presented. The laminates studied are divided between those containing four plies, 90/0/0/90, 15/-15/-15/15, and 45/-45/-45/45, and those containing 12-16 plies of the general configurations 0/90, + or - 45, and 0/+ or - 60. Most of the results are for surface cracks of various lengths and several depths. Stable damage extension in laminates containing surface cracks is predominantly delamination between plies, and tends to be much more extensive prior to failure than is the case with through-thickness cracks, resulting in approximately notch-insensitive behavior in most cases. A greater tendency for notch-sensitive behavior is found for 0/90 graphite/epoxy laminates for which stable damage extension is more limited. The rate of damage extension with increasing applied stress depends upon the composite system and ply configuration as well as the crack length and depth. An approximate semiempirical method is presented for estimating the growth rate of large damage-regions

    Similarity between the primary and secondary air-assisted liquid jet breakup mechanism

    Full text link
    we report an ultrafast synchrotron x-ray phase contrast imaging study of the primary breakup mechanism of a coaxial air-assisted water jet. We demonstrate that there exist great similarities in the phenomenology of primary breakup with that of the secondary breakup. Especially, a membrane-mediated breakup mechanism dominates the breakup process for a wide range of air speeds. This finding reveals the intrinsic connections of these two breakup regimes and has deep implications on the unified theoretical approach in treating the breakup mechanism of high speed liquid jet.Comment: 15 pages, 4 figure

    Cyclic Permeability Evolution during Repose then Reactivation of Fractures and Faults

    Get PDF
    Cyclic growth and decay of permeability in fractures is explored during repeated reactivation and repose of saw‐cut fractures of Green River shale. These slide‐hold‐slide experiments are supported by measurements of fracture normal deformation and optical surface profilometry. Overall, we observe continuous permeability decay during repose (holds) and significant permeability enhancement during slow reactivation (slide). The permeability decay is accompanied by fault compaction. Both hydraulic aperture change (Δb_h) and measured compaction (Δb_s) are consistent with time‐dependent power law closure with a power exponent of ~0.2–0.4. These dual compaction magnitudes are positively correlated but Δb_h > Δb_s in late stage holds. Permeability enhancement during reactivation is typically also accompanied by fault dilation. However, we also observe some cases where hydraulic aperture change decouples from the measured deformation, conceivably driven by mobilization of wear products and influenced by the development of flow bottlenecks. Pretest and posttest surface profiles show that the surface topography of the fractures is planed down by shear removal. The shear removal is significant with initial laboratory prepared surface (~10 μm of aperture height) but less significant following consecutive reactivations (~2 μm). The flattened surfaces retain small‐scale, ~10–20 μm wavelength, roughness. Flow simulations, constrained by the surface topography and measured deformation, indicate that small‐scale roughness may control permeability at flow bottlenecks within a dominant flow channel. These results suggest cycles of permeability creation and destruction are an intrinsic component of the natural hydraulic system present in faults and fractures and provide an improved mechanistic understanding of the evolution of permeability during fault repose and reactivation

    Analysis of cybersecurity threats in Industry 4.0: the case of intrusion detection

    Get PDF
    Nowadays, industrial control systems are experiencing a new revolution with the interconnection of the operational equipment with the Internet, and the introduction of cutting-edge technologies such as Cloud Computing or Big data within the organization. These and other technologies are paving the way to the Industry 4.0. However, the advent of these technologies, and the innovative services that are enabled by them, will also bring novel threats whose impact needs to be understood. As a result, this paper provides an analysis of the evolution of these cyber-security issues and the requirements that must be satis ed by intrusion detection defense mechanisms in this context.Springer ; Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech

    Enhanced Osteogenesis of Adipose-Derived Stem Cells by Regulating Bone Morphogenetic Protein Signaling Antagonists and Agonists.

    Get PDF
    UnlabelledAlthough adipose-derived stem cells (ASCs) are an attractive cell source for bone tissue engineering, direct use of ASCs alone has had limited success in the treatment of large bone defects. Although bone morphogenetic proteins (BMPs) are believed to be the most potent osteoinductive factors to promote osteogenic differentiation of ASCs, their clinical applications require supraphysiological dosage, leading to high medical burden and adverse side effects. In the present study, we demonstrated an alternative approach that can effectively complement the BMP activity to maximize the osteogenesis of ASCs without exogenous application of BMPs by regulating levels of antagonists and agonists to BMP signaling. Treatment of ASCs with the amiloride derivative phenamil, a positive regulator of BMP signaling, combined with gene manipulation to suppress the BMP antagonist noggin, significantly enhanced osteogenic differentiation of ASCs through increased BMP-Smad signaling in vitro. Furthermore, the combination approach of noggin suppression and phenamil stimulation enhanced the BMP signaling and bone repair in a mouse calvarial defect model by adding noggin knockdown ASCs to apatite-coated poly(lactic-coglycolic acid) scaffolds loaded with phenamil. These results suggest novel complementary osteoinductive strategies that could maximize activity of the BMP pathway in ASC bone repair while reducing potential adverse effects of current BMP-based therapeutics.SignificanceAlthough stem cell-based tissue engineering strategy offers a promising alternative to repair damaged bone, direct use of stem cells alone is not adequate for challenging healing environments such as in large bone defects. This study demonstrates a novel strategy to maximize bone formation pathways in osteogenic differentiation of mesenchymal stem cells and functional bone formation by combining gene manipulation with a small molecule activator toward osteogenesis. The findings indicate promising stem cell-based therapy for treating bone defects that can effectively complement or replace current osteoinductive therapeutics

    Oligomeric states in sodium ion-dependent regulation of cyanobacterial histidine kinase-2

    Get PDF
    Two-component signal transduction systems (TCSs) consist of sensor histidine kinases and response regulators. TCSs mediate adaptation to environmental changes in bacteria, plants, fungi and protists. Histidine kinase 2 (Hik2) is a sensor histidine kinase found in all known cyanobacteria and as chloroplast sensor kinase in eukaryotic algae and plants. Sodium ions have been shown to inhibit the autophosphorylation activity of Hik2 with precedes phosphoryl transfer to response regulators, but the mechanism of inhibition has not been determined. We report on the mechanism of Hik2 activation and inactivation probed by chemical cross-linking and size exclusion chromatography together with direct visualisation of the kinase using negative-stain transmission electron microscopy of single particles. We show that the functional form of Hik2 is a higher-order oligomer such as a hexamer or octamer. Increased NaCl concentration converts the active hexamer into an inactive tetramer. The action of NaCl appears to be confined to the Hik2 kinase domain

    ChIP-BIT: Bayesian inference of target genes using a novel joint probabilistic model of ChIP-seq profiles.

    Get PDF
    Chromatin immunoprecipitation with massively parallel DNA sequencing (ChIP-seq) has greatly improved the reliability with which transcription factor binding sites (TFBSs) can be identified from genome-wide profiling studies. Many computational tools are developed to detect binding events or peaks, however the robust detection of weak binding events remains a challenge for current peak calling tools. We have developed a novel Bayesian approach (ChIP-BIT) to reliably detect TFBSs and their target genes by jointly modeling binding signal intensities and binding locations of TFBSs. Specifically, a Gaussian mixture model is used to capture both binding and background signals in sample data. As a unique feature of ChIP-BIT, background signals are modeled by a local Gaussian distribution that is accurately estimated from the input data. Extensive simulation studies showed a significantly improved performance of ChIP-BIT in target gene prediction, particularly for detecting weak binding signals at gene promoter regions. We applied ChIP-BIT to find target genes from NOTCH3 and PBX1 ChIP-seq data acquired from MCF-7 breast cancer cells. TF knockdown experiments have initially validated about 30% of co-regulated target genes identified by ChIP-BIT as being differentially expressed in MCF-7 cells. Functional analysis on these genes further revealed the existence of crosstalk between Notch and Wnt signaling pathways

    Multi-Attribute SCADA-Specific Intrusion Detection System for Power Networks

    Get PDF
    The increased interconnectivity and complexity of supervisory control and data acquisition (SCADA) systems in power system networks has exposed the systems to a multitude of potential vulnerabilities. In this paper, we present a novel approach for a next-generation SCADA-specific intrusion detection system (IDS). The proposed system analyzes multiple attributes in order to provide a comprehensive solution that is able to mitigate varied cyber-attack threats. The multiattribute IDS comprises a heterogeneous white list and behavior-based concept in order to make SCADA cybersystems more secure. This paper also proposes a multilayer cyber-security framework based on IDS for protecting SCADA cybersecurity in smart grids without compromising the availability of normal data. In addition, this paper presents a SCADA-specific cybersecurity testbed to investigate simulated attacks, which has been used in this paper to validate the proposed approach

    Pricing and Hedging Asian Basket Options with Quasi-Monte Carlo Simulations

    Get PDF
    In this article we consider the problem of pricing and hedging high-dimensional Asian basket options by Quasi-Monte Carlo simulation. We assume a Black-Scholes market with time-dependent volatilities and show how to compute the deltas by the aid of the Malliavin Calculus, extending the procedure employed by Montero and Kohatsu-Higa (2003). Efficient path-generation algorithms, such as Linear Transformation and Principal Component Analysis, exhibit a high computational cost in a market with time-dependent volatilities. We present a new and fast Cholesky algorithm for block matrices that makes the Linear Transformation even more convenient. Moreover, we propose a new-path generation technique based on a Kronecker Product Approximation. This construction returns the same accuracy of the Linear Transformation used for the computation of the deltas and the prices in the case of correlated asset returns while requiring a lower computational time. All these techniques can be easily employed for stochastic volatility models based on the mixture of multi-dimensional dynamics introduced by Brigo et al. (2004).Comment: 16 page
    corecore