16,921 research outputs found

    Slicing of silicon into sheet material. Silicon sheet growth development for the large area silicon sheet task of the low cost silicon solar array project

    Get PDF
    Fabrication of a prototype large capacity multiple blade slurry saw is considered. Design of the bladehead which will tension up to 1000 blades, and cut a 45 cm long silicon ingot as large as 12 cm in diameter is given. The large blade tensioning force of 270,000 kg is applied through two bolts acting on a pair of scissor toggles, significantly reducing operator set-up time. Tests with an upside-down cutting technique resulted in 100% wafering yields and the highest wafer accuracy yet experienced with MS slicing. Variations in oil and abrasives resulted only in degraded slicing results. A technique of continuous abrasive slurry separation to remove silicon debris is described

    Case studies to enhance online student evaluation: Bond University – Surveying students online to improve learning and teaching

    Get PDF
    One of the most sensible ways of improving learning and teaching is to ask the students for feedback. At the end of each teaching period (i.e. semester or term) all universities and many schools survey their students. Usually these surveys are managed online. Questions ask for student perceptions about teaching, assessment and workload. The survey administrators report four common problems

    An improved perturbation approach to the 2D Edwards polymer -- corrections to scaling

    Full text link
    We present the results of a new perturbation calculation in polymer statistics which starts from a ground state that already correctly predicts the long chain length behaviour of the mean square end--to--end distance ⟨RN2⟩ \langle R_N^2 \rangle\ , namely the solution to the 2~dimensional~(2D) Edwards model. The ⟨RN2⟩\langle R_N^2 \rangle thus calculated is shown to be convergent in NN, the number of steps in the chain, in contrast to previous methods which start from the free random walk solution. This allows us to calculate a new value for the leading correction--to--scaling exponent~Δ\Delta. Writing ⟨RN2⟩=AN2ν(1+BN−Δ+CN−1+...)\langle R_N^2 \rangle = AN^{2\nu}(1+BN^{-\Delta} + CN^{-1}+...), where ν=3/4\nu = 3/4 in 2D, our result shows that Δ=1/2\Delta = 1/2. This value is also supported by an analysis of 2D self--avoiding walks on the {\em continuum}.Comment: 17 Pages of Revtex. No figures. Submitted to J. Phys.

    Seawater capacitance – a promising proxy for mapping and characterizing drifting hydrocarbon plumes in the deep ocean

    Get PDF
    Hydrocarbons released into the deep ocean are an inevitable consequence of natural seep, seafloor drilling, and leaking wellhead-to-collection-point pipelines. The Macondo 252 (Deepwater Horizon) well blowout of 2010 was even larger than the Ixtoc event in the Gulf of Campeche in 1979. History suggests it will not be the last accidental release, as deepwater drilling expands to meet an ever-growing demand. For those who must respond to this kind of disaster, the first line of action should be to know what is going on. This includes knowing where an oil plume is at any given time, where and how fast it is moving, and how it is evolving or degrading. We have experimented in the laboratory with induced polarization as a method to track hydrocarbons in the seawater column and find that finely dispersed oil in seawater gives rise to a large distributed capacitance. From previous sea trials, we infer this could potentially be used to both map and characterize oil plumes, down to a ratio of less than 0.001 oil-to-seawater, drifting and evolving in the deep ocean. A side benefit demonstrated in some earlier sea trials is that this same approach in modified form can also map certain heavy placer minerals, as well as communication cables, pipelines, and wrecks buried beneath the seafloor

    A controlled experiment for the empirical evaluation of safety analysis techniques for safety-critical software

    Get PDF
    Context: Today's safety critical systems are increasingly reliant on software. Software becomes responsible for most of the critical functions of systems. Many different safety analysis techniques have been developed to identify hazards of systems. FTA and FMEA are most commonly used by safety analysts. Recently, STPA has been proposed with the goal to better cope with complex systems including software. Objective: This research aimed at comparing quantitatively these three safety analysis techniques with regard to their effectiveness, applicability, understandability, ease of use and efficiency in identifying software safety requirements at the system level. Method: We conducted a controlled experiment with 21 master and bachelor students applying these three techniques to three safety-critical systems: train door control, anti-lock braking and traffic collision and avoidance. Results: The results showed that there is no statistically significant difference between these techniques in terms of applicability, understandability and ease of use, but a significant difference in terms of effectiveness and efficiency is obtained. Conclusion: We conclude that STPA seems to be an effective method to identify software safety requirements at the system level. In particular, STPA addresses more different software safety requirements than the traditional techniques FTA and FMEA, but STPA needs more time to carry out by safety analysts with little or no prior experience.Comment: 10 pages, 1 figure in Proceedings of the 19th International Conference on Evaluation and Assessment in Software Engineering (EASE '15). ACM, 201
    • …
    corecore