285 research outputs found

    Innovative approaches fot tyre characterization aimed at road contact modelling for automotive applications

    Get PDF
    In Automotive the role of the tyre mechanics and physics is crucial for the optimization of vehicle stability, performance and safety. Most engineers usually face the analysis of tyres' mechanical and viscoelastic properties with the aim to comprehend the interaction phenomena between the tread and the road. In the last decades, compound-substrate modelling has been discussed a lot in the scientific literature. Many theories have been developed to determine the frictional behaviour of rubber sliding on a texture in a wide working range in terms of temperature, contact pressure, profile roughness, etc. The most common and recent theories, such as Klüppel's and Persson's [1, 2], are widely employed because they try to explain the contact modelling problem following different approaches and hypothesis. However, the analysis of the contact problem requires full knowledge of the roughness profile and the rubber viscoelastic properties. The identification of the macro-roughness scales and especially of the micro-scales is an enigma yet to be unequivocally solved for the optimization of the multiscale theories [3]. On the other side, the properties of the rubber compound are complex to determine, unless the tyre tread can be destroyed to obtain a specimen and then perform the Dynamic Mechanical Analysis (DMA), which usually requires expensive machines and a long time for a full time-temperature characterization of the material according to William-Landel-Ferry theory [4, 5]. Nonetheless, in most applications, as well as Motorsport ones, the tyres are linked to restrictions and they cannot be analysed by the standard and laboratory procedures. In this scenario, the main activities described in the present PhD thesis deal with the tyre tread compound characterization through innovative methodologies and devices in order to overcome the limits that Motorsport racing teams or tyre manufacturers are used to face with. The non-destructive viscoelastic analysis through the device developed thanks to the precious support of the skilled and motivating research team of the Industrial Engineering Department of the University of Naples Federico II, which is called VESevo (Viscoelasticity Evaluation System evolved), is an advantageous testing procedure proving indication of the tyre viscoelastic properties variations with respect to the temperature, wear phenomena, ageing, etc. Ergonomics, portability and smart analysis are key features of this device, allowing it to be widely used by engineers of racing teams on tracks during Motorsport races and events and further by operators in tyre 26 manufacturers facilities, that also need a fast and reliable analysis of the trustworthiness of their final product series. Once introduced the innovative approaches for tyres characterization, the contact mechanics models have been analysed in-depth highlighting their features and limits for automotive applications. Particularly, the GrETA (Grip Estimation for Tyre Analyses) tool, developed by the Applied Mechanics group of the Industrial Engineering Department of the University of Naples Federico II and improved during the PhD research period, is proposed as a multi-contact simplified physical model for the analysis of adhesive and hysteretic contributions to the overall friction between the rubber and the substrate macro and micro asperities. The main parameters of the GrETA have been identified thanks to specific experimental friction benches, which have involved the last part of the PhD program. The results achieved can be considered as a baseline for innovative approaches in terms of tyre characterization and contact modelling for friction prediction. Actually, some limits concerning the experimental friction analysis have been faced during the research program, which will be overcome thanks to the realization of the new proposed friction test bench allowing to strengthen the identification of the contact mechanics models and focus on new research scenarios, as well as the analysis of rubber wear phenomena

    Promotion of embryonic cortico-cerebral neuronogenesis by miR-124

    Get PDF
    Glutamatergic neurons of the murine cerebral cortex are generated within periventricular proliferative layers of the embryonic pallium, directly from apical precursors or indirectly, via their basal progenies. Cortical neuronogenesis is the result of different morphogenetic subroutines, including precursors proliferation, death, changes of histogenetic potencies, postmitotic neuronal differentiation. Control of these processes is extremely complex and numerous polypeptide-encoding genes are involved in it. Moreover, a large number of so-called \u201cnoncoding genes\u201d are expressed in the developing cortex too. At the moment, their implication in corticogenesis is subject of intensive functional studies. A subset of them encodes for miRNAs, a class of small RNAs with complex biogenesis, regulating gene expression at multiple levels, modulating histogenetic progression and implicated in refinement of positional information. Among cortical miRNAs, there is miR-124. It has been consistently shown to promote neuronogenesis progression, in a variety of experimental contexts. Some aspects of its activity - however - are still controversial, some have to be clarified. An in depth in vivo characterization of its function in the embryonic mammalian cortex is still missing. In this study, by integrating LNA-oligo in situ hybridization, electroporation of stagespecific reporters and immunofluorescence, we reconstructed the cortico-cerebral miR-124 expression pattern, during direct neuronogenesis from apical precursors and indirect neuronogenesis, via basal progenitors. We found that miR-124 expression profile in the developing embryonic cortex includes an abrupt upregulation in apical precursors undergoing direct neuronogenesis as well as a two-steps upregulation in basal progenitors, during indirect neuronogenesis. Differential post-transcriptional processing seems to contribute to this pattern. Moreover, we investigated the role of miR-124 in embryonic corticogenesis by gain-of-function approaches, both in vitro, by lentivirus-based gene transfer, and in vivo, by in utero electroporation. Following overexpression of miR-124, both direct neuronogenesis and progression of neural precursors from the apical to the basal compartment were stimulated. Two are the main conclusions of this study. First, miR-124 expression is progressively upregulated in the mouse embryonic neocortex, during the apical to basal transition of neural precursor cells and upon their exit from cell cycle. Second, miR-124 is involved in fine regulation of these processes

    Distribution of the brown bear (Ursus arctos marsicanus) in the Central Apennines, Italy, 2005-2014

    Get PDF
    Despite its critical conservation status, no formal estimate of the Apennine brown bear (Ursus arctos marsicanus) distribution has ever been attempted, nor a coordinated effort to compile and verify all recent occurrences has ever been ensured. We used 48331 verified bear location data collected by qualified personnel from 20052014 in the central Apennines, Italy, to estimate the current distribution of Apennine brown bears. Data sources included telemetry relocations, scats and DNA-verified hair samples, sightings, indirect signs of presence, photos from camera traps, and damage to properties. Using a grid-based zonal analysis to transform raw data density, we applied ordinary kriging and estimated a 4923 km2 main bear distribution, encompassing the historical stronghold of the bear population, and including a smaller (1460 km2) area of stable occupancy of reproducing female bears. National and Regional Parks cover 38.8% of the main bear distribution, plus an additional 19.5% encompassed by the Natura 2000 network alone. Despite some methodological and sampling problems related to spatial and temporal variation in sampling effort at the landscape scale, our approach provides an approximation of the current bear distribution that is suited to frequently update the distribution map. Future monitoring of this bear population would benefit from estimating detectability across a range on environmental and sampling variables, and from intensifying the collection of bear presence data in the peripheral portions of the distribution

    Study on the generalized formulations with the aim to reproduce the viscoelastic dynamic behavior of polymers

    Get PDF
    Appropriate modelling of the real behavior of viscoelastic materials is of fundamental importance for correct studies and analyses of structures and components where such materials are employed. In this paper, the potential to employ a generalized Maxwell model and the relative fraction derivative model is studied with the aim to reproduce the experimental behavior of viscoelastic materials. For both models, the advantage of using the pole-zero formulation is demonstrated and a specifically constrained identification procedure to obtain the optimum parameters set is illustrated. Particular emphasis is given on the ability of the models to adequately fit the experimental data with a minimum number of parameters, addressing the possible computational issues. The question arises about the minimum number of experimental data necessary to estimate the material behavior in a wide frequency range, demonstrating that accurate results can be obtained by knowing only the data of the upper and low frequency plateaus plus the ones at the loss tangent peak

    Trivium vs. Trivium Toy

    Get PDF
    We present the characteristic and minimal polynomials of the linear algorithms Trivium and Trivium Toy. We show the different cycles and mini-mum lengths obtained. The existence of initial states determining short cycles is verified. Finally, linear Trivium Toy is shown to be as cryptologically secure as the linear Trivium algorithm.III Workshop de Seguridad Informática (WSI)Red de Universidades con Carreras de Informática (RedUNCI

    Trivium vs. Trivium Toy

    Get PDF
    We present the characteristic and minimal polynomials of the linear algorithms Trivium and Trivium Toy. We show the different cycles and mini-mum lengths obtained. The existence of initial states determining short cycles is verified. Finally, linear Trivium Toy is shown to be as cryptologically secure as the linear Trivium algorithm.III Workshop de Seguridad Informática (WSI)Red de Universidades con Carreras de Informática (RedUNCI

    Toxicity of citrate-capped AuNPs: an in vitro and in vivo assessment

    Get PDF
    In this study, we show that 15 nm citrate-capped AuNPs exert a remarkable toxicity in living systems. The assessment was performed by using well-characterized AuNPs, the combination of in vitro and in vivo models (namely two different cell lines and Drosophila melanogaster), exposure to low dosages of nanoparticles (in the sub-nanomolar concentration range), along with the application of several biological assays to monitor different aspects of the toxic effects, such as viability, genotoxicity, and molecular biomarkers

    Automated Analysis of Source Code Patches using Machine Learning Algorithms

    Get PDF
    An updated version of a tool for automated analysis of source code patches and branch differences is presented. The upgrade involves the use of machine learning techniques on source code, comments, and messages. It aims to help analysts, code reviewers, or auditors perform repetitive tasks continuously. The environment designed encourages collaborative work. It systematizes certain tasks pertaining to reviewing or auditing processes. Currently, the scope of the automated test is limited. Current work aims to increase the volume of source code analyzed per time unit, letting users focus on alerts automatically generated. The tool is distributed as open source software. This work also aims to provide arguments in support of the use of this type of tool. A brief overview of security problems in open source software is presented. It is argued that these problems were or may have been discovered reviewing patches and branch differences, released before the vulnerability was disclosed.IV Workshop de Seguridad Informática (WSI)Red de Universidades con Carreras en Informática (RedUNCI

    Otros problemas potenciales en Qlink.it

    Get PDF
    In previous work we presented preliminary results obtained by reviewing the source code of Qlink.it web application. In this article, after summarizing previous findings, results of the source code review of Qlink.it Android application will be described. This analysis focused on the implementation of cryptographic functionalities. The aim of this publication is also to invite other researchers to analyze the application in order to determine if Qlink.it could be considered secure.En un trabajo previo presentamos los resultados preliminares obtenidos al revisar el código fuente de la aplicación web de Qlink.it. En este artículo, después de resumir los hallazgos anteriores, se describirán los resultados de la revisión del código fuente de la aplicación Android de Qlink.it. Este análisis se centró en la implementación de funcionalidades criptográficas. El objetivo de esta publicación es invitar a otros investigadores a analizar la aplicación para determinar si Qlink.it podría considerarse seguro.Facultad de Informátic

    Automated Analysis of Source Code Patches using Machine Learning Algorithms

    Get PDF
    An updated version of a tool for automated analysis of source code patches and branch differences is presented. The upgrade involves the use of machine learning techniques on source code, comments, and messages. It aims to help analysts, code reviewers, or auditors perform repetitive tasks continuously. The environment designed encourages collaborative work. It systematizes certain tasks pertaining to reviewing or auditing processes. Currently, the scope of the automated test is limited. Current work aims to increase the volume of source code analyzed per time unit, letting users focus on alerts automatically generated. The tool is distributed as open source software. This work also aims to provide arguments in support of the use of this type of tool. A brief overview of security problems in open source software is presented. It is argued that these problems were or may have been discovered reviewing patches and branch differences, released before the vulnerability was disclosed.IV Workshop de Seguridad Informática (WSI)Red de Universidades con Carreras en Informática (RedUNCI
    corecore