16,565 research outputs found

    On the symbolic manipulation and code generation for elasto-plastic material matrices

    Get PDF
    A computerized procedure for symbolic manipulations and FORTRAN code generation of an elasto-plastic material matrix for finite element applications is presented. Special emphasis is placed on expression simplifications during intermediate derivations, optimal code generation, and interface with the main program. A systematic procedure is outlined to avoid redundant algebraic manipulations. Symbolic expressions of the derived material stiffness matrix are automatically converted to RATFOR code which is then translated into FORTRAN statements through a preprocessor. To minimize the interface problem with the main program, a template file is prepared so that the translated FORTRAN statements can be merged into the file to form a subroutine (or a submodule). Three constitutive models; namely, von Mises plasticity, Drucker-Prager model, and a concrete plasticity model, are used as illustrative examples

    Optical properties of MgCNi3MgCNi_3 in the normal state

    Full text link
    We present the optical reflectance and conductivity spectra for non-oxide antiperovskite superconductor MgCNi3MgCNi_{3} at different temperatures. The reflectance drops gradually over a large energy scale up to 33,000 cm−1^{-1}, with the presence of several wiggles. The reflectance has slight temperature dependence at low frequency but becomes temperature independent at high frequency. The optical conductivity shows a Drude response at low frequencies and four broad absorption features in the frequency range from 600 cm−1cm^{-1} to 33,000 cm−1cm^{-1}. We illustrate that those features can be well understood from the intra- and interband transitions between different components of Ni 3d bands which are hybridized with C 2p bands. There is a good agreement between our experimental data and the first-principle band structure calculations.Comment: 4 pages, to be published in Phys. Rev.

    Rateless codes-based secure communication employing transmit antenna selection and harvest-to-jam under joint effect of interference and hardware impairments

    Get PDF
    In this paper, we propose a rateless codes-based communication protocol to provide security for wireless systems. In the proposed protocol, a source uses the transmit antenna selection (TAS) technique to transmit Fountain-encoded packets to a destination in presence of an eavesdropper. Moreover, a cooperative jammer node harvests energy from radio frequency (RF) signals of the source and the interference sources to generate jamming noises on the eavesdropper. The data transmission terminates as soon as the destination can receive a sufficient number of the encoded packets for decoding the original data of the source. To obtain secure communication, the destination must receive sufficient encoded packets before the eavesdropper. The combination of the TAS and harvest-to-jam techniques obtains the security and efficient energy via reducing the number of the data transmission, increasing the quality of the data channel, decreasing the quality of the eavesdropping channel, and supporting the energy for the jammer. The main contribution of this paper is to derive exact closed-form expressions of outage probability (OP), probability of successful and secure communication (SS), intercept probability (IP) and average number of time slots used by the source over Rayleigh fading channel under the joint impact of co-channel interference and hardware impairments. Then, Monte Carlo simulations are presented to verify the theoretical results.Web of Science217art. no. 70

    Design for manufacture and assembly (DfMA) enablers for offsite interior design and construction

    Get PDF
    Interior design and construction (IDC) is a sophisticated and often prolonged process that delivers a building to occupation. Traditional practice is rather unproductive, involving the work of several different trades crowded in situ and delivered sequentially one after another. To enhance productivity in IDC, offsite practice is receiving increasing attention as a process innovation along with Design for Manufacture and Assembly (DfMA), an emerging concept in the industry. This paper aims to investigate offsite IDC practice and develop a set of DfMA enablers for better achieving this building process. It undertakes a literature review, case study, and 18 semi-structured interviews. To support the offsite IDC and its production line, standardized procedure, automated machinery, and supply chain, 10 DfMA enablers are adopted, such as early collaboration, design standardization and simplification, and light material selection. These findings indicate a paradigm shift not only in interior design methodology but also in IDC professional practice process. This research enriches the literature on DfMA and IDC, in particular their synergy, and offers a new model for interior designers and offsite IDC practitioners

    Performance of concrete-filled stainless steel tubular (CFSST) columns after exposure to fire

    Get PDF
    The post-fire performance of concrete-filled stainless steel tubular (CFSST) columns subjected to an entire loading–fire history, including four characteristic phases: (i) ambient temperature loading, (ii) heating, (iii) cooling with constant external loads, and (iv) post-fire loading, is investigated in this paper. Sequentially coupled thermal-stress analyses are performed using ABAQUS to establish the temperature field and structural response of CFSST columns. To improve the precision of the finite element analysis (FEA) models, the influence of moisture on the thermal conductivity and specific heat of the concrete in the heating and cooling phases is considered by using subroutines. Existing fire and post-fire test data on CFSST columns are used to validate the FEA modelling. Comparisons between FEA and test results indicate that the accuracy of the model is acceptable; the FEA model is then extended to simulate CFSST columns subjected to the four characteristic phases. The behaviour of the CFSST columns during the four characteristic phases is explained by analysis of the temperature distribution, load versus axial deformation relations, failure modes and internal force redistribution. The excellent post-fire performance of CFSST columns is examined in comparison with traditional concrete-filled carbon steel tubular (CFST) columns with the same total cross-sectional area. The residual strength index is studied with respect to a series of parametric analyses. It is found that the residual strength of CFSST columns is higher than that of CFST columns after the same fire exposure, and that the diameter of the stainless steel tube, slenderness, heating time ratio and load ratio have a significant influence on the residual strength index

    Zika Virus Attenuation by Codon Pair Deoptimization Induces Sterilizing Immunity in Mouse Models.

    Get PDF
    Zika virus (ZIKV) infection during the large epidemics in the Americas is related to congenital abnormities or fetal demise. To date, there is no vaccine, antiviral drug, or other modality available to prevent or treat Zika virus infection. Here we designed novel live attenuated ZIKV vaccine candidates using a codon pair deoptimization strategy. Three codon pair-deoptimized ZIKVs (Min E, Min NS1, and Min E+NS1) were de novo synthesized and recovered by reverse genetics and contained large amounts of underrepresented codon pairs in the E gene and/or NS1 gene. The amino acid sequence was 100% unchanged. The codon pair-deoptimized variants had decreased replication fitness in Vero cells (Min NS1 ≫ Min E > Min E+NS1), replicated more efficiently in insect cells than in mammalian cells, and demonstrated diminished virulence in a mouse model. In particular, Min E+NS1, the most restrictive variant, induced sterilizing immunity with a robust neutralizing antibody titer, and a single immunization achieved complete protection against lethal challenge and vertical ZIKV transmission during pregnancy. More importantly, due to the numerous synonymous substitutions in the codon pair-deoptimized strains, reversion to wild-type virulence through gradual nucleotide sequence mutations is unlikely. Our results collectively demonstrate that ZIKV can be effectively attenuated by codon pair deoptimization, highlighting the potential of Min E+NS1 as a safe vaccine candidate to prevent ZIKV infections.IMPORTANCE Due to unprecedented epidemics of Zika virus (ZIKV) across the Americas and the unexpected clinical symptoms, including Guillain-Barré syndrome, microcephaly, and other birth defects in humans, there is an urgent need for ZIKV vaccine development. Here we provided the first attenuated versions of ZIKV with two important genes (E and/or NS1) that were subjected to codon pair deoptimization. Compared to parental ZIKV, the codon pair-deoptimized ZIKVs were mammal attenuated and preferred insect to mammalian cells. Min E+NS1, the most restrictive variant, induced sterilizing immunity with a robust neutralizing antibody titer and achieved complete protection against lethal challenge and vertical virus transmission during pregnancy. More importantly, the massive synonymous mutational approach made it impossible for the variant to revert to wild-type virulence. Our results have proven the feasibility of codon pair deoptimization as a strategy to develop live attenuated vaccine candidates against flaviviruses such as ZIKV, Japanese encephalitis virus, and West Nile virus

    Effects of ac-field amplitude on the dielectric susceptibility of relaxors

    Full text link
    The thermally activated flips of the local spontaneous polarization in relaxors were simulated to investigate the effects of the applied-ac-field amplitude on the dielectric susceptibility. It was observed that the susceptibility increases with increasing the amplitude at low temperatures. At high temperatures, the susceptibility experiences a plateau and then drops. The maximum in the temperature dependence of susceptibility shifts to lower temperatures when the amplitude increases. A similarity was found between the effects of the amplitude and frequency on the susceptibility.Comment: 8 pages, 7 figures, Phys. Rev. B (in July 1st
    • …
    corecore