11,220 research outputs found

    A three dimensional limit load solution for highly undermatched single edge cracked specimens in pure bending

    Get PDF
    The accuracy of defect assessment methods for cracked structures depends on the accuracy of limit load solutions. The present paper focuses on a new method to construct simple three-dimensional kinematically admissible velocity fields for highly undermatched welded joints with edge cracks and its application to single edge cracked specimens in pure bending. The objective is to take into account specific features of flow pattern in highly undermatched joints to propose three-dimensional kinematically admissible velocity fields whose level of complexity as well as accuracy of limit load predictions are comparable with plane strain fields. The three-dimensional solution found for single edge cracked specimens in pure bending is compared to available semi-analytical plane strain solutions. Several feasible ways to improve the solution found are proposed

    Classical and quantum quasi-free position dependent mass; P\"oschl-Teller and ordering-ambiguity

    Full text link
    We argue that the classical and quantum mechanical correspondence may play a basic role in the fixation of the ordering-ambiguity parameters. We use quasi-free position-dependent masses in the classical and quantum frameworks. The effective P\"oschl-Teller model is used as a manifested reference potential to elaborate on the reliability of the ordering-ambiguity parameters available in the literature.Comment: 10 page

    Political Endowments and Electricity Market Regulation in Turkey: An Institutional Analysis

    Get PDF
    Turkey has been going through a liberalization process in its electricity market over the last decade. So far, the regulatory content of the market reforms has been in the center of attention in the literature, to the negligence of regulatory governance. However, recent studies, which applied the theoretical insights of new institutional economics to utilities regulation, have demonstrated that political endowments of the country draw the boundaries to which extent such regulatory content can be effectively implemented. In line with these studies, this paper adopts an institutional approach and attempts to identify the political endowments of Turkey in order to further analyze whether the market reforms succeeded in bringing about sufficient checks to cure the institutional problems. In other words, the paper takes a picture of the overall regulatory arena. The results show that the current regulatory structure, especially government-regulator relations, fails to meet good regulatory governance criteria. The paper also provides some policy suggestions.electricity regulation; regulatory governance; institutions

    Use of enriched live prey in promoting growth and maturation of tiger shrimp (Penaeus monodon)

    Get PDF
    This study was undertaken to determine the effect of nutritional management of broodstock of Penaeus monodon on growth and maturation. Test specimens were obtained from a grow-out pond before attainment of maturity and were reared in hatchery tanks. Four types of dietary treatments (M1–M4) were given to separate batches that were run in duplicate. Feeding trials continued for five months. A diet with live bloodworm, bioencapsulated to contain tricalcic phosphate as its major component, was found to be the most efficient. Specimens of this particular batch assimilated food more efficiently, grew at a faster rate and attained maturity earlier than other groups. Bloodworm provided the lipid fractions for which there is no de novo synthesis in shrimp. The enrichment product acted by promoting somatic growth and increasing transfer of biochemical constituents needed by the ovary for develo

    Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones

    Get PDF
    This paper studies the secrecy performance of a wireless network (primary network) overlaid with an ambient RF energy harvesting IoT network (secondary network). The nodes in the secondary network are assumed to be solely powered by ambient RF energy harvested from the transmissions of the primary network. We assume that the secondary nodes can eavesdrop on the primary transmissions due to which the primary network uses secrecy guard zones. The primary transmitter goes silent if any secondary receiver is detected within its guard zone. Using tools from stochastic geometry, we derive the probability of successful connection of the primary network as well as the probability of secure communication. Two conditions must be jointly satisfied in order to ensure successful connection: (i) the SINR at the primary receiver is above a predefined threshold, and (ii) the primary transmitter is not silent. In order to ensure secure communication, the SINR value at each of the secondary nodes should be less than a predefined threshold. Clearly, when more secondary nodes are deployed, more primary transmitters will remain silent for a given guard zone radius, thus impacting the amount of energy harvested by the secondary network. Our results concretely show the existence of an optimal deployment density for the secondary network that maximizes the density of nodes that are able to harvest sufficient amount of energy. Furthermore, we show the dependence of this optimal deployment density on the guard zone radius of the primary network. In addition, we show that the optimal guard zone radius selected by the primary network is a function of the deployment density of the secondary network. This interesting coupling between the two networks is studied using tools from game theory. Overall, this work is one of the few concrete works that symbiotically merge tools from stochastic geometry and game theory

    New Results and Matrix Representation for Daehee and Bernoulli Numbers and Polynomials

    Full text link
    In this paper, we derive new matrix representation for Daehee numbers and polynomials, the lambda-Daehee numbers and polynomials and the twisted Daehee numbers and polynomials. This helps us to obtain simple and short proofs of many previous results on Daehee numbers and polynomials. Moreover, we obtained some new results for Daehee and Bernoulli numbers and polynomials
    corecore