324 research outputs found

    Piped water cooling of concrete dams

    Get PDF
    Piped water is used to remove hydration heat from concrete dams during construction. By examining simple models we obtain an estimate for the temperature rise along the pipe network and within the concrete. To leading order, for practically useful networks, the temperature distribution is quasi-steady, so that exact analytic solutions are obtained. The temperature in the water increases linearly with distance along the pipe and varies logarithmically with radial distance from the pipe in the concrete. Using these results we obtained estimates for the optimal spacing of pipes and pipe length. Some preliminary work on optimal network design has been done. This is work in progress

    Pebble bed: reflector treatment and pressure\ud velocity coupling

    Get PDF
    In this report, we describe some models and numerical methods used to simulate the flow and temperature in a pebble bed modular nuclear reactor. The reactor core is filled with around 450000 spheres containing low enriched uranium and helium is forced through these hot pebbles to cool the system down. The group first investigated the flow model in the pebbles. Numerical aspects were then considered to tackle difficulties encountered with the flow simulation and the temperature inside the pebbles. Numerical schemes are presented that can significantly improve the accuracy of the computed results

    c-Met overexpression in inflammatory breast carcinomas: automated quantification on tissue microarrays

    Get PDF
    Inflammatory breast carcinoma (IBC) is a rare but aggressive tumour associated with poor outcome owing to early metastases. Increased expression of c-Met protein correlates with reduced survival and high metastatic risk in human cancers including breast carcinomas and is targetable by specific drugs, that could potentially improve the prognosis. In the present study, we compared c-Met expression in IBC (n=41) and non-IBC (n=480) immunohistochemically (Ventana Benchmark autostainer) in two tissue microarrays (TMA) along with PI3K and E-cadherin. The results were quantified through an automated image analysis device (SAMBA Technologies). We observed that (i) c-Met was significantly overexpressed in IBC as compared with non-IBC (P<0.001), (ii) PI3K was overexpressed (P<0.001) in IBC, suggesting that the overexpressed c-Met is functionally active at least through the PI3K signal transduction pathway; and (iii) E-cadherin was paradoxically also overexpressed in IBC. We concluded that overexpressed c-Met in IBC constitutes a potential target for specific therapy for the management of patients with poor-outcome tumours such as IBC. Automated image analysis of TMA proved to be a valuable tool for high-throughput immunohistochemical quantification of the expression of intratumorous protein markers

    Evaluation of the Water Film Weber Number in Glaze Icing Scaling

    Get PDF
    Icing scaling tests were performed in the NASA Glenn Icing Research Tunnel to evaluate a new scaling method, developed and proposed by Feo for glaze icing, in which the scale liquid water content and velocity were found by matching reference and scale values of the nondimensional water-film thickness expression and the film Weber number. For comparison purpose, tests were also conducted using the constant We(sub L) method for velocity scaling. The reference tests used a full-span, fiberglass, 91.4-cm-chord NACA 0012 model with velocities of 76 and 100 knot and MVD sizes of 150 and 195 microns. Scale-to-reference model size ratio was 1:2.6. All tests were made at 0deg AOA. Results will be presented for stagnation point freezing fractions of 0.3 and 0.5

    Systematic Construction of Nonlinear Product Attacks on Block Ciphers

    Get PDF
    A major open problem in block cipher cryptanalysis is discovery of new invariant properties of complex type. Recent papers show that this can be achieved for SCREAM, Midori64, MANTIS-4, T-310 or for DES with modified S-boxes. Until now such attacks are hard to find and seem to happen by some sort of incredible coincidence. In this paper we abstract the attack from any particular block cipher. We study these attacks in terms of transformations on multivariate polynomials. We shall demonstrate how numerous variables including key variables may sometimes be eliminated and at the end two very complex Boolean polynomials will become equal. We present a general construction of an attack where multiply all the polynomials lying on one or several cycles. Then under suitable conditions the non-linear functions involved will be eliminated totally. We obtain a periodic invariant property holding for any number of rounds. A major difficulty with invariant attacks is that they typically work only for some keys. In T-310 our attack works for any key and also in spite of the presence of round constants
    • …
    corecore