8,007 research outputs found

    Characterisation of the Etching Quality in Micro-Electro-Mechanical Systems by Thermal Transient Methodology

    Get PDF
    Our paper presents a non-destructive thermal transient measurement method that is able to reveal differences even in the micron size range of MEMS structures. Devices of the same design can have differences in their sacrificial layers as consequence of the differences in their manufacturing processes e.g. different etching times. We have made simulations examining how the etching quality reflects in the thermal behaviour of devices. These simulations predicted change in the thermal behaviour of MEMS structures having differences in their sacrificial layers. The theory was tested with measurements of similar MEMS devices prepared with different etching times. In the measurements we used the T3Ster thermal transient tester equipment. The results show that deviations in the devices, as consequence of the different etching times, result in different temperature elevations and manifest also as shift in time in the relevant temperature transient curves.Comment: Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions

    Predicting operator workload during system design

    Get PDF
    A workload prediction methodology was developed in response to the need to measure workloads associated with operation of advanced aircraft. The application of the methodology will involve: (1) conducting mission/task analyses of critical mission segments and assigning estimates of workload for the sensory, cognitive, and psychomotor workload components of each task identified; (2) developing computer-based workload prediction models using the task analysis data; and (3) exercising the computer models to produce predictions of crew workload under varying automation and/or crew configurations. Critical issues include reliability and validity of workload predictors and selection of appropriate criterion measures

    Adaptive finite element analysis based on p-convergence

    Get PDF
    The results of numerical experiments are presented in which a posteriori estimators of error in strain energy were examined on the basis of a typical problem in linear elastic fracture mechanics. Two estimators were found to give close upper and lower bounds for the strain energy error. The potential significance of this is that the same estimators may provide a suitable basis for adaptive redistribution of the degrees of freedom in finite element models

    The Problem of Solving Fracture of the Denture Base in Preedentulous States

    Get PDF
    The mechanical fatigue resistance of the denture base seems to be a neglected part of treatment planning. Extreme overload can occur, which is only evaluated in the case of fracture. In full or partial edentia the dental base can be exposed to an extreme stress concentration which may be coupled with the incidental source of failure during processing of the denture. The aim of this lecture is to report cases, where we were able to overcome dental base fracture, which had not been foreseen earlier. In the first case a history of several fractures of an upper complete denture is presented. Metal net, framework and incorporation of glass fibres and reline were stages of the instructive problem solving process. In the second case a man wearing an overdenture with ball attachments under implant fixtures is presented. After multiple fractures of the dental base we used glass fibre reinforcement for repair. After this procedure there was an eventless period, which proves the mechanical resistance of the denture base. In the third case presented both the denture base and the acrylic tooth were damaged. The multiple fracture could also be treated with glass fibre reinforcement, which was successful. From these cases we concluded: 1. Careful case history and treatment plan could have helped to overcome the subsequent problems. 2. The clinical implication is that the glass fibre reinforcement can provide effective strength for the denture base. We could not neglect evaluation of the mucosa and bone support. In the following period we reinforced new dentures preventively with fibres in 15 cases. At the same time we also continued the repair the broken dentures of 10 patients. The outcome exceeded our greatest expectations: no fracture was seen. However, further study is needed to extend the observation period

    The effect of quantization on the FCIQMC sign problem

    No full text
    The sign problem in Full Configuration Interaction Quantum Monte Carlo (FCIQMC) without annihilation can be understood as an instability of the psi-particle population to the ground state of the matrix obtained by making all off-diagonal elements of the Hamiltonian negative. Such a matrix, and hence the sign problem, is basis dependent. In this paper we discuss the properties of a physically important basis choice: first versus second quantization. For a given choice of single-particle orbitals, we identify the conditions under which the fermion sign problem in the second quantized basis of antisymmetric Slater determinants is identical to the sign problem in the first quantized basis of unsymmetrized Hartree products. We also show that, when the two differ, the fermion sign problem is always less severe in the second quantized basis. This supports the idea that FCIQMC, even in the absence of annihilation, improves the sign problem relative to first quantized methods. Finally, we point out some theoretically interesting classes of Hamiltonians where first and second quantized sign problems differ, and others where they do not.Comment: 4 pages w/ 2 page appendix, 2 figures, 1 tabl

    Majority is not Needed: A Counterstrategy to Selfish Mining

    Full text link
    In the last few years several papers investigated selfish mine attacks, most of which assumed that every miner that is not part of the selfish mine pool will continue to mine honestly. However, in reality, remaining honest is not always incentivized, particularly when another pool is employing selfish mining or other deviant strategies. In this work we explore the scenario in which a large enough pool capitalises on another selfish pool to gain 100\% of the profit and commit double spending attacks. We show that this counterstrategy can effectively counter any deviant strategy, and that even the possibility of it discourages other pools from implementing deviant strategies
    corecore