2,999 research outputs found

    On the Effect of Semantically Enriched Context Models on Software Modularization

    Full text link
    Many of the existing approaches for program comprehension rely on the linguistic information found in source code, such as identifier names and comments. Semantic clustering is one such technique for modularization of the system that relies on the informal semantics of the program, encoded in the vocabulary used in the source code. Treating the source code as a collection of tokens loses the semantic information embedded within the identifiers. We try to overcome this problem by introducing context models for source code identifiers to obtain a semantic kernel, which can be used for both deriving the topics that run through the system as well as their clustering. In the first model, we abstract an identifier to its type representation and build on this notion of context to construct contextual vector representation of the source code. The second notion of context is defined based on the flow of data between identifiers to represent a module as a dependency graph where the nodes correspond to identifiers and the edges represent the data dependencies between pairs of identifiers. We have applied our approach to 10 medium-sized open source Java projects, and show that by introducing contexts for identifiers, the quality of the modularization of the software systems is improved. Both of the context models give results that are superior to the plain vector representation of documents. In some cases, the authoritativeness of decompositions is improved by 67%. Furthermore, a more detailed evaluation of our approach on JEdit, an open source editor, demonstrates that inferred topics through performing topic analysis on the contextual representations are more meaningful compared to the plain representation of the documents. The proposed approach in introducing a context model for source code identifiers paves the way for building tools that support developers in program comprehension tasks such as application and domain concept location, software modularization and topic analysis

    Trust-Based Control of (Semi)Autonomous Mobile Robotic Systems

    Get PDF
    Despite great achievements made in (semi)autonomous robotic systems, human participa-tion is still an essential part, especially for decision-making about the autonomy allocation of robots in complex and uncertain environments. However, human decisions may not be optimal due to limited cognitive capacities and subjective human factors. In human-robot interaction (HRI), trust is a major factor that determines humans use of autonomy. Over/under trust may lead to dispro-portionate autonomy allocation, resulting in decreased task performance and/or increased human workload. In this work, we develop automated decision-making aids utilizing computational trust models to help human operators achieve a more e๏ฌ€ective and unbiased allocation. Our proposed decision aids resemble the way that humans make an autonomy allocation decision, however, are unbiased and aim to reduce human workload, improve the overall performance, and result in higher acceptance by a human. We consider two types of autonomy control schemes for (semi)autonomous mobile robotic systems. The ๏ฌrst type is a two-level control scheme which includes switches between either manual or autonomous control modes. For this type, we propose automated decision aids via a computational trust and self-con๏ฌdence model. We provide analytical tools to investigate the steady-state e๏ฌ€ects of the proposed autonomy allocation scheme on robot performance and human workload. We also develop an autonomous decision pattern correction algorithm using a nonlinear model predictive control to help the human gradually adapt to a better allocation pattern. The second type is a mixed-initiative bilateral teleoperation control scheme which requires mixing of autonomous and manual control. For this type, we utilize computational two-way trust models. Here, mixed-initiative is enabled by scaling the manual and autonomous control inputs with a function of computational human-to-robot trust. The haptic force feedback cue sent by the robot is dynamically scaled with a function of computational robot-to-human trust to reduce humans physical workload. Using the proposed control schemes, our human-in-the-loop tests show that the trust-based automated decision aids generally improve the overall robot performance and reduce the operator workload compared to a manual allocation scheme. The proposed decision aids are also generally preferred and trusted by the participants. Finally, the trust-based control schemes are extended to the single-operator-multi-robot applications. A theoretical control framework is developed for these applications and the stability and convergence issues under the switching scheme between di๏ฌ€erent robots are addressed via passivity based measures

    ์ธ์ฒด ์œ ๋ฐฉ์•”์—์„œ Peptidyl-prolyl cis-trans isomerase NIMA-interacting 1 (Pin1)๊ณผ์˜ ์ง์ ‘ ๊ฒฐํ•ฉ์„ ํ†ตํ•œ Nrf2์˜ ์•ˆ์ •ํ™” ์—ฐ๊ตฌ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์œตํ•ฉ๊ณผํ•™๊ธฐ์ˆ ๋Œ€ํ•™์› ๋ถ„์ž์˜ํ•™ ๋ฐ ๋ฐ”์ด์˜ค์ œ์•ฝํ•™๊ณผ, 2020. 8. Surh Young-Joon.Peptidyl-prolyl cis-trans isomerase NIMA-interacting 1 (Pin1) specifically recognizes phosphorylated serine or threonine of a target protein and isomerizes the adjacent proline residue. Overexpression of Pin1 has been found in many types of malignancies, suggesting its oncogenic function. Recent studies have revealed constitutive activation of Nrf2, a transcription factor that regulates cellular redox homeostasis, in some transformed or cancerous cells, conferring an advantage for their growth and survival. Silencing of Pin1 by using siRNA or pharmacologic inhibition blocked the accumulation of Nrf2, thereby suppressing proliferation and clonogenicity of MDA-MB-231 human breast cancer cells and xenograft tumor growth in nude mice. Since Nrf2 harbours pSer/Thr-Pro motifs, I investigated whether Pin1 could directly interact with Nrf2 in the context of its implications in breast cancer development and progression. I found that Pin1 binds to Nrf2 which stabilizes this transcription factor by hampering proteasomal degradation. Notably, the interaction between Pin1 and Nrf2 was dependent on the phosphorylation of Nrf2 at Ser 215, 408 and 577. In another study, Keap1, the main inhibitor of Nrf2, was found to be phosphorylated at Ser 104 and Thr 277. These amino acids are preceded by proline and hence can be the putative binding sites for Pin1. I found the direct interaction between Keap1 and Pin1, and this was abolished upon substation of Ser 104 and Thr 277 with Alanine. The interaction of Nrf2 with Keap1 was markedly increased when Pin1 was downregulated. On the other hand, Keap1 knockout embryonic fibroblasts exhibited the enhanced interaction between Nrf2 and Pin1. Therefore, it is likely that Pin1 and Nrf2 may compete with each other for Keap1 binding. In conclusion, Pin1 plays a role in stabilization and constitutive activation of Nrf2 interfering the interaction between Nrf2 and Keap1.๋‹จ๋ฐฑ์งˆ์˜ ์ธ์‚ฐํ™”๋Š” ์„ธํฌ๋‚ด ์‹ ํ˜ธ์ „๋‹ฌ ๋‹จ๋ฐฑ์งˆ๋“ค์˜ ํ™œ์„ฑ์— ์˜ํ–ฅ์„ ๋ฏธ์น˜๋ฉฐ, ์„ธํฌ๋‚ด ๊ธฐ๋Šฅ ์กฐ์ ˆ์„ ์œ„ํ•ด ๋งค์šฐ ์ค‘์š”ํ•œ ์—ญํ• ์„ ๋‹ด๋‹นํ•œ๋‹ค. ์ธ์‚ฐํ™” ๋ถ€์œ„ ์ค‘ ์„ธ๋ฆฐ/ํŠธ๋ ˆ์˜ค๋‹Œ ๋‹ค์Œ์— ํŠน์ด์ ์œผ๋กœ ํ”„๋กค๋ฆฐ (pSer/Thr-Pro)์ด ์œ„์น˜ํ•  ๊ฒฝ์šฐ CDKs, MAPKs, and GSK-3ฮฒ๋“ฑ๊ณผ ๊ฐ™์€ proline directed kinase๋“ค (์— ์˜ํ•ด ์ธ์‚ฐํ™”๋œ๋‹ค. ํ”„๋กค๋ฆฐ์€ cis๋‚˜ trans์˜ conformation์„ ๋ชจ๋‘ ์ฑ„ํƒํ•  ์ˆ˜ ์žˆ์–ด ๋‹จ๋ฐฑ์งˆ์˜ ์ ‘ํž˜์ด๋‚˜ ๊ธฐ๋Šฅ ํ™œ์„ฑ์„ ์กฐ์ ˆํ•œ๋‹ค. Pin1 (peptidyl-prolyl isomerase family of proteins)์€ ํ”„๋กค๋ฆฐ ์ž”๊ธฐ์˜ cis/trans์˜ ์ด์„ฑํ™”๋ฐ˜์‘์„ ์ด‰๋งคํ•˜๋Š” ํšจ์†Œ๋กœ์„œ ์ธ์‚ฐํ™”๋œ ์„ธ๋ฆฐ/ํŠธ๋ ˆ์˜ค๋‹Œ ๋‹ค์Œ์— ํ”„๋กค๋ฆฐ์ด ์˜ค๋Š” motif์— ์œ ์ผํ•˜๊ฒŒ ๊ฒฐํ•ฉํ•˜์—ฌ cis/trans ์ด์„ฑ์งˆํ™”๋ฅผ ์ด‰์ง„ํ•œ๋‹ค. Pin1์˜ ๊ตฌ์กฐ๋Š” N-๋ง๋‹จ์— ์žˆ๋Š” WW ๋„๋ฉ”์ธ๊ณผ C-๋ง๋‹จ์— ์žˆ๋Š” PPIase ๋„๋ฉ”์ธ์œผ๋กœ ์ด๋ฃจ์–ด์ ธ ์žˆ์œผ๋ฉฐ, WW ๋„๋ฉ”์ธ์€ ๊ธฐ์งˆ ๋‹จ๋ฐฑ์งˆ๊ณผ ๊ฒฐํ•ฉํ•˜๊ณ  PPIase ๋„๋ฉ”์ธ์€ ์ธ์‚ฐํ™”๋œ ์„ธ๋ฆฐ/ํŠธ๋ ˆ์˜ค๋‹Œ-ํ”„๋กค๋ฆฐ (pSer/Thr-Pro) ๋ชจํ‹ฐํ”„์˜ ํ”„๋กค๋ฆฐ ์ด์„ฑ์งˆํ™”๋ฅผ ํ†ตํ•œ ๊ตฌ์กฐ ๋ณ€ํ™”์— ๊ด€์—ฌํ•œ๋‹ค. Pin1์— ์˜ํ•œ ๊ธฐ์งˆ ๋‹จ๋ฐฑ์งˆ์˜ ๊ตฌ์กฐ ๋ณ€ํ™”๋Š” ๋‹จ๋ฐฑ์งˆ์˜ ํ™œ์„ฑ, ๋‹จ๋ฐฑ์งˆ ์ƒํ˜ธ๊ฒฐํ•ฉ ๋ฐ ์„ธํฌ๋‚ด ๋ถ„ํฌ์™€ ์•ˆ์ •์„ฑ์— ์˜ํ–ฅ์„ ๋ฏธ์นœ๋‹ค. Pin1์€ ์„ธํฌ ์ฃผ๊ธฐ ๋ฐœ๋‹ฌ์—์„œ ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•˜๋Š” ๋‹จ๋ฐฑ์งˆ๋“ค์„ ์กฐ์ ˆํ•˜๋Š” ๊ฒƒ์œผ๋กœ ์•Œ๋ ค์ ธ ์„ธํฌ๋‚ด์˜ Pin1 ๋‹จ๋ฐฑ์งˆ ๋ฐœํ˜„ ์ˆ˜์ค€์˜ ๋ณ€ํ™”๋Š” ์„ธํฌ์˜ ๊ณผ๋„ํ•œ ์ฆ์‹๊ณผ ๊ด€๋ จ๋œ ์งˆ๋ณ‘์ธ ์•”์˜ ๋ฐœ์ƒ ๋ฐ ์ง„ํ–‰์— ์˜ํ–ฅ์„ ์ค„ ์ˆ˜ ์žˆ๋‹ค Nrf2๋Š” ์‚ฐํ™”์  ์ŠคํŠธ๋ ˆ์Šค์— ์˜ํ•ด ์œ ๋ฐœ๋˜๋Š” ์—ผ์ฆ, ์•” ๋ฐœ์ƒ, ์‹ฌํ˜ˆ๊ด€๊ณ„ ์งˆํ™˜, ๋ฐ ๋‹น๋‡จ๋“ฑ์˜ ๋ณ‘๋ฆฌํ•™์  ๊ณผ์ •์— ๊ด€์—ฌํ•˜์—ฌ ์„ธํฌ๋ฅผ ๋ณดํ˜ธํ•ด ์ค€๋‹ค. ์ •์ƒ์ ์ธ ์ƒํƒœ์—์„œ Nrf2๋Š” ์ €ํ•ด๋‹จ๋ฐฑ์งˆ์ธ kelch-like ECH-associated protein 1 (Keap1)์— ๊ฒฐํ•ฉ๋œ ๋น„ํ™œ์„ฑ ์ƒํƒœ๋กœ ์„ธํฌ์งˆ๋‚ด์— ์กด์žฌํ•œ๋‹ค. ํ•˜์ง€๋งŒ ์„ธํฌ๊ฐ€ ํ™œ์„ฑ์‚ฐ์†Œ์ข… ๋˜๋Š” ์นœ์ „์ž์„ฑ ๋ฌผ์งˆ์— ์˜ํ•ด ์ž๊ทน๋˜๋ฉด Nrf2์˜ ์ธ์‚ฐํ™” ๋˜๋Š” Keap1์ด thiol modification์„ ํ†ตํ•ด Keap1์œผ๋กœ๋ถ€ํ„ฐ Nrf2๊ฐ€ ๋ถ„๋ฆฌ๋œ๋‹ค. ์ดํ›„ Nrf2๋Š” ํ•ต๋‚ด๋กœ ์ด๋™ํ•˜๊ณ , ํ•ต๋‚ด์— ์กด์žฌํ•˜๋Š” small Maf ๋‹จ๋ฐฑ์งˆ๊ณผ ๋ณตํ•ฉ์ฒด๋ฅผ ์ด๋ฃฌํ›„ ํ•ญ์‚ฐํ™” ํšจ์†Œ์˜ ํ”„๋กœ๋ชจํ„ฐ ์ง€์—ญ์— ๊ฒฐํ•ฉํ•จ์œผ๋กœ์จ phase II ํ•ญ์‚ฐํ™”/ํ•ด๋…ํ™” ํšจ์†Œ์˜ ๋ฐœํ˜„์„ ์กฐ์ ˆํ•œ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ŠคํŠธ๋ ˆ์Šค์— ๋ฐ˜์‘ํ•˜์—ฌ ์ผ์‹œ์ ์œผ๋กœ ํ™œ์„ฑํ™”๋˜๋Š” ์ •์ƒ์„ธํฌ์˜ ๊ฒฝ์šฐ์™€ ๋‹ฌ๋ฆฌ ์•…์„ฑ ์ข…์–‘ ์„ธํฌ์—์„œ Nrf2์˜ ๊ณผ๋„ํ•œ ์ง€์†์ ์ธ ๋ฐœํ˜„์€ ์•”์„ธํฌ์˜ ์„ฑ์žฅ์„ ์ด‰์ง„์‹œํ‚ค๊ณ  ํ•ญ์•”์น˜๋ฃŒ์˜ ํšจ๊ณผ๋ฅผ ๊ฐ์†Œ์‹œํ‚จ๋‹ค. Nrf2 ๋‹จ๋ฐฑ์งˆ์—๋„ ๋‹ค์ˆ˜์˜ Pin1 ๊ฒฐํ•ฉ๋ถ€์œ„ (pSer/Thr-Pro motifs)๊ฐ€ ์กด์žฌํ•˜๋ฏ€๋กœ, Pin1๊ณผ Nrf2๊ณผ์˜ ์ƒํ˜ธ์ž‘์šฉ๊ณผ ์ด๋ฅผ ํ†ตํ•œ ์œ ๋ฐฉ์•” ์ฆ์‹ ๋ฐ ์ง„ํ–‰์— ๋ฏธ์น˜๋Š” ์˜ํ–ฅ์— ๊ด€ํ•˜์—ฌ ์—ฐ๊ตฌํ•˜์˜€๋‹ค. ํŠนํžˆ, Nrf2 ๋‹จ๋ฐฑ์งˆ์˜ ์„ธ๋ฆฐ 215, 408 and 577์˜ ์ธ์‚ฐํ™” ์ž”๊ธฐ๊ฐ€ Pin1 ๊ณผ์˜ ๊ฒฐํ•ฉ ๋ถ€์œ„์ž„์„ ํ™•์ธํ•˜์˜€๊ณ , Pin1๊ณผ Nrf2์˜ ๊ฒฐํ•ฉ์€ Nrf2์˜ ํ”„๋กœํ…Œ์•„์ข€์— ์˜ํ•œ ๋ถ„ํ•ด๋ฅผ ์–ต์ œํ•จ์œผ๋กœ์จ Nrf2์˜ ์•ˆ์ •ํ™”์— ๊ด€์—ฌํ•จ์„ ์•Œ ์ˆ˜ ์žˆ์—ˆ๋‹ค. ํ•œํŽธ, Nrf2์˜ ์ฃผ์š” ์–ต์ œ ๋‹จ๋ฐฑ์งˆ์ธ Keap1์€ ์œ ๋ฐฉ์•” ์„ธํฌ๋‚ด์—์„œ ์„ธ๋ฆฐ 104๋ฒˆ ์ž”๊ธฐ์™€ ํŠธ๋ ˆ์˜ค๋‹Œ 277๋ฒˆ ์ž”๊ธฐ์—์„œ์˜ ์ธ์‚ฐํ™”๊ฐ€ ์ด๋ฃจ์–ด์ง์„ ESI-LC-MS ๋ถ„์„์„ ํ†ตํ•˜์—ฌ ํ™•์ธํ•˜์˜€๊ณ , ์„ธ๋ฆฐ 104๋ฒˆ ์ž”๊ธฐ์™€ ํŠธ๋ ˆ์˜ค๋‹Œ 277๋ฒˆ ์ž”๊ธฐ์˜ ์ธ์‚ฐํ™”๊ฐ€ ์ฐจ๋‹จ๋œ ๋Œ์—ฐ๋ณ€์ด ์„ธํฌ๋Š” Pin1๊ณผ์˜ ์ง์ ‘์  ๊ฒฐํ•ฉ์ด Keap1 wild type ์„ธํฌ์— ๋น„ํ•ด ํ˜„์ €ํžˆ ๊ฐ์†Œํ•จ์„ ํ™•์ธ ํ•  ์ˆ˜ ์žˆ์—ˆ๋‹ค. ๋˜ํ•œ Pin1 siRNA๋ฅผ ์ฒ˜๋ฆฌํ•œ MDA-MB-231 ์„ธํฌ์—์„œ๋Š” control siRNA ๊ทธ๋ฃน์— ๋น„ํ•ด Nrf2์™€ Keap1์˜ ๊ฒฐํ•ฉ์ด ์ฆ๊ฐ€ํ•˜์˜€์œผ๋ฉฐ, Keap1 knockout ๋งˆ์šฐ์Šค ๋ฐฐ์•„์—์„œ ๋ถ„๋ฆฌํ•œ ์„ฌ์œ ์•„์„ธํฌ(embryonic fibroblasts)์—์„œ๋Š” Nrf2์™€ Pin1์˜ ๊ฒฐํ•ฉ์ด ์ฆ๊ฐ€๋˜์—ˆ๋‹ค. ์ด๋ฅผ ํ†ตํ•˜์—ฌ Pin1๊ณผ Nrf2๋Š” Keap1๊ณผ์˜ ๊ฒฐํ•ฉ์— ์žˆ์–ด์„œ ์„œ๋กœ ๊ฒฝ์Ÿ์  ์—ญํ• ์„ ํ•จ์„ ํ™•์ธํ•˜์˜€๋‹ค. ๊ทธ๋Ÿฌ๋ฏ€๋กœ Pin1์€ Nrf2์™€ Keap1์‚ฌ์ด์˜ ๊ฒฐํ•ฉ์„ ๋ฐฉํ•ดํ•˜๋ฉฐ Nrf2 ๋‹จ๋ฐฑ์งˆ์˜ ํ™œ์„ฑํ™”์™€ ์•ˆ์ •ํ™”์— ๊ด€์—ฌํ•  ๊ฒƒ์œผ๋กœ ์‚ฌ๋ฃŒ๋œ๋‹ค.CHAPTER I General verview 1 1. Peptidyl-prolyl cis-trans isomerase NIMA-interacting 1 (Pin1) in cancer 2 1.1. Pin1 has critical roles in breast cancer development and progression 2 1.2. Regulation of Pin1 gene expression in human breast cancer 3 1.3. Expression, post-translational modifications and subcellular localization of Pin1 4 1.4. The significance of Pin1 phosphorylation 8 1.5. Pin1 regulates signaling molecules associated with cancer and cancer stem cells. 8 1.6. Pin1 mediates drug resistance of breast cancer 9 1.7. Pin1 inhibitors 9 2. Nrf2 in cancer 12 2.1. Nrf2 promotes tissue invasion and metastasis 12 2.2. Role of Nrf2 in resistance to chemotherapy 13 2.3. Keap1 as an inhibitor of Nrf2 13 2.4. Keap1-independent regulation of Nrf2 14 2.5. Post-translational modifications of Nrf2 15 2.6. Protein stabilization of Nrf2. 17 REFERENCES 19 STATEMENT OF PURPOSE 36 CHAPTER II 37 Pin1 stabilizes Nrf2 in a Keap1 independent manner in breast cancer . 37 ABSTRACT 38 1. INTRODUCTION. 40 2. MATERIALS AND METHODS 43 3. RESULTS. 55 4. DISCUSSION. 99 REFERENCES. 104 CHAPTER III 111 H-Ras induces Nrf2-Pin1 interaction: Implications for breast cancer progression. 111 ABSTRACT. 112 1. INTRODUCTION. 113 2. MATERIALS AND METHODS 116 3. RESULTS. 124 4. DISCUSSION. 144 REFERENCES. 149 ABSTRACT IN KOREAN.. 160 CURRIULUM VITAE 165Docto

    Menโ€™s Jeans Fit Based on Body Shape Categorization

    Get PDF
    The purpose of this study was to categorize lower body shape in men and to investigate the interplay between body shape and fitting issues appearing in menโ€™s jeans. More specifically, the goal of the study was to improve apparel fit based on body shape. The detailed objectives of the study were to: (1) Categorize male body shapes using statistical analysis; (2) use 3D virtual fitting technology to assess fit and develop a shape-driven pants block pattern for each body shape. This quantitative study was conducted in three stages: (1) categorizing the body shape of 1420 male scans, aged 18-35, from the SizeUSA dataset, (2) develop a shape-driven pants block pattern for each identified body shape, and (3) validate the developed blocks by virtually trying the shape-driven block pattern on fit testers from different body shape groups. Exploratory Factor Analysis (EFA) and cluster analysis were used for body shape categorization, which resulted in three different body shapes: (1) Flat-Straight, (2) Moderate Curvy-Straight, and (3) Curvy. Three fit models were selected from each identified body shape group and then patterns were developed using Armstrongโ€™s (2005) jeans foundation method. Patterns were modified and fitted to the selected representative fit models of each body shape group. The developed shape-driven block patterns were simulated on the fit testers to further explore the relationship between body shape and fit issues. This study suggests that two individuals with identical body measurements may experience very different fit problems tailored to their different body shapes. It was found that each body shape would exclusively experience unique fit issues. Furthermore, the shape driven block patterns were found to be highly correlated with their host body shape category. This research implies that if the mass customization process starts with block patterns that are engineered for specific body shape categories significantly less fit issues would appear and the desired fit would be achieved in fewer fitting sessions

    Mine schedule optimization with geotechnical constraints

    Get PDF
    If a mining project consists of n stoping activities these can be scheduled in n! ways according to the duration between the activities and their precedence. Mine schedule optimization manipulates the precedence relationships and the duration of the mining activities in order to maximize the Net Present Value (NPV). However, unexpected instabilities may impede or disrupt the schedule and thus reduce the profitability and so geotechnical aspects of the operation need to be taken into account. The mine schedule optimization software considered in this work is the so-called Schedule Optimization Tool (SOT). This thesis reports the work for development of new geomechanical constraints for any mine scheduling tool to find the safest and the most profitable schedule, exemplified within the SOT framework. The core hypothesis of this research is that there is a time-dependent aspect of the rock behaviour that leads to instability, a consequence of dependence of geotechnical instability upon the sequence and duration between stoping activities. There is evidence presented in this work that supports this hypothesis. An automated procedure for timely and computationally efficient calculations of the instability metrics is presented. This can be applied to evaluate the geomechanical stability of any of the n! schedules for excavating n stopes or applied to evaluate geomechanical stability of schedules arising in the schedule optimization process. However, in practice, the number of feasible schedules is much less than n! due to the precedence constraints. The approach starts with computing n elastic stress fields induced after excavating each individual stope independently within an identical computational domain using Compute3D. The stress-time series of each iv and/or every sequence of stoping are generated through superimposition of these pre-computed stress fields, and the time stamps of blasting for excavation are allocated corresponding to the stoping timetable. Different blasts are allowed to be timetabled at the same time. By means of Hookeโ€™s law and the 3D Kelvin-Voigt creep model the elastic strain time series and the viscoelastic strain time series are produced for the stress-time series. Based on the Mohr- Coulomb Failure criterion three (in)stability indicators are defined: i. โ€˜Strength Factorโ€™ to evaluate state of stress at each stage of each schedule as a proportion of is strength ii. โ€˜Strainth Factorโ€™ to evaluate state of elastic strain at each stage of each schedule as a proportion of a limiting โ€˜ruptureโ€™ strain iii. โ€˜Viscoelastic-strainth Factorโ€™ to evaluate state of viscoelastic strain at each stage of each schedule as a proportion of a limiting โ€˜ruptureโ€™ strain. To provide a perspective of the (in)stability condition in the computational domain for all the feasible sequences of stoping, 12 (in)stability metrics were defined and the results of each are illustrated in the form of โ€˜(in)stability indicator diagramsโ€™. The overall methodology is applied to an example of excavating 6 open stopes. Additionally, a methodology is theorized to evaluate the stability condition in the rock mass surrounding the stopes for a series of stoping and backfilling schedules. The methodology is based on pre-computing one additional stress field element for each stope, which represents the effect of the fill loading on the rock mass. The calculations for this approach are consistent with the time and computational efficiency of the original methodology. The computational effort v increases to โ€˜2nโ€™ pre-computed stress fields rather than โ€˜nโ€™: as problem sizes double, computational time doubles, rather than increases in polynomial or exponential time.Master of Applied Science (M.Sc.) in Natural Resources Engineerin

    The Powerful Woman

    Get PDF
    The Powerful Woman is the continuation of exploration of Transformational Reconstruction, an innovative draping and pattern-making technique (Sato, 2011). I have been working with TR for past few years. With this piece I continue to expand my knowledge of creating pattern pieces in combination with knitting and felting techniques. Iranian men\u27s clothing of Bakhtiari tribe, Chogha, inspired this design. Chogha is a white upper-bodice garment with black stripes, which represent the victory of goodness over evilness (Dashtaki, 2013). The goals of creating this dress were to (a) combine cultural approach with modern origami look and (b) combine TR method with felting techniques to emulate men\u27s clothing to design a garment for powerful woman. The feeling of the power derived by Chogha was transferred into modern and wearable dress for powerful woman by accentuating the shoulder. Felting textile technique was started with knitting the skirt piece with black and white wool yarns then felted in a hot cycle of washing machine. Pattern pieces were attached together with needle felting technique, agitation and compression caused the wool fibers to capture each other
    • โ€ฆ
    corecore