Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 541 - 570 of 2936

Full-Text Articles in Social and Behavioral Sciences

Confining Concrete Cover Of Gfrp Tube Reinforced Concrete Columns With Polymer Grids, Weiqiang Wang, M Neaz Sheikh, Muhammad N. S Hadi Jan 2015

Confining Concrete Cover Of Gfrp Tube Reinforced Concrete Columns With Polymer Grids, Weiqiang Wang, M Neaz Sheikh, Muhammad N. S Hadi

Faculty of Engineering and Information Sciences - Papers: Part A

This study presents the results of an experimental investigation on the behaviour of glass fibre reinforced polymer (GFRP) tube reinforced concrete columns under axial compression. The polymer grids were embedded into the concrete cover of glass fibre reinforced polymer (GFRP) tube reinforced concrete columns to reduce the spalling of concrete cover. A total of four column specimens were prepared and tested under axial compression. The columns were 150 mm in diameter and 300 mm in height. The first column was the reference column without any reinforcement. The second column was reinforced with GFRP tube without cover confinement. For the third …


Tweeting Propaganda, Radicalization And Recruitment: Islamic State Supporters Multi-Sided Twitter Networks, Akemi Takeoka Chatfield, Christopher G. Reddick, Uuf Brajawidagda Jan 2015

Tweeting Propaganda, Radicalization And Recruitment: Islamic State Supporters Multi-Sided Twitter Networks, Akemi Takeoka Chatfield, Christopher G. Reddick, Uuf Brajawidagda

Faculty of Engineering and Information Sciences - Papers: Part A

Islamic State (IS) terrorist networks in Syria and Iraq pose threats to national security. IS' exploitation of social media and digital strategy plays a key role in its global dissemination of propaganda, radicalization, and recruitment. However, systematic research on Islamic terrorist communication via social media is limited. Our research investigates the question: How do IS members/supporters use Twitter for terrorism communication: propaganda, radicalization, and recruitment? Theoretically, we drew on microeconomic network theories to develop a theoretical framework for multi-sided Twitter networks in the global Islamic terrorist communication environment. Empirically, we collected 3,039 tweets posted by @shamiwitness who was identified in …


Quantum Oblivious Set-Member Decision Protocol, Run-Hua Shi, Yi Mu, Hong Zhong, Shun Zhang Jan 2015

Quantum Oblivious Set-Member Decision Protocol, Run-Hua Shi, Yi Mu, Hong Zhong, Shun Zhang

Faculty of Engineering and Information Sciences - Papers: Part A

We present and define a privacy-preserving problem called the oblivious set-member decision problem, which allows a server to decide whether a private secret of a user is a member of his private set in an oblivious manner. Namely, if the secret belongs to his private set, he does not know which member it is. We propose a quantum solution to the oblivious set-member decision problem. Compared to classical solutions, the proposed quantum protocol achieves an exponential reduction in communication complexity, since it only needs O(1) communication cost.


Two Quantum Protocols For Oblivious Set-Member Decision Problem, Run-Hua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang Jan 2015

Two Quantum Protocols For Oblivious Set-Member Decision Problem, Run-Hua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper, we defined a new secure multi-party computation problem, called Oblivious Set-member Decision problem, which allows one party to decide whether a secret of another party belongs to his private set in an oblivious manner. There are lots of important applications of Oblivious Set-member Decision problem in fields of the multi-party collaborative computation of protecting the privacy of the users, such as private set intersection and union, anonymous authentication, electronic voting and electronic auction. Furthermore, we presented two quantum protocols to solve the Oblivious Set-member Decision problem. Protocol I takes advantage of powerful quantum oracle operations so that …


Benefits Of Online Health Education: Perception From Consumers And Health Professionals, Khin Than Win, Naffisah Mohd Hassan, Andrew Bonney, Donald Iverson Jan 2015

Benefits Of Online Health Education: Perception From Consumers And Health Professionals, Khin Than Win, Naffisah Mohd Hassan, Andrew Bonney, Donald Iverson

Faculty of Engineering and Information Sciences - Papers: Part A

With the advancement in technology and availability of the Internet, online health education could become one of the media for health education. As health education is to persuade patients on health behavioural change, understanding perceived benefits of online health education is an important aspect to explore. The aim of this study is to explore consumers and health professionals opinion on online health education. Literature review was conducted and identified the benefits of online health education (OHE). Survey was conducted to health consumers and health professionals. Descriptive analyses were performed using SPSS Version 19.0. The analysis of the literature has identified …


Bio-Inspired Cost-Aware Optimization For Data-Intensive Service Provision, Lijuan Wang, Jun Shen, Junzhou Luo Jan 2015

Bio-Inspired Cost-Aware Optimization For Data-Intensive Service Provision, Lijuan Wang, Jun Shen, Junzhou Luo

Faculty of Engineering and Information Sciences - Papers: Part A

The use of Big Data and the development of cloud computing have led to greater dependence on data-intensive services. Each service may actually request or create a large amount of data sets. The scope, number, and complexity of data-intensive services are all set to soar in the future. To compose these services will be more challenging. Issues of autonomy, scalability, adaptability, and robustness, become difficult to resolve. Bio-inspired algorithms can overcome the new challenging requirements of data-intensive service provision. It is useful for the provision of data-intensive services to explore key features and mechanisms of biological systems and accordingly to …


Adaptively Secure Identity-Based Broadcast Encryption With A Constant-Sized Ciphertext, Jongkil Kim, Willy Susilo, Man Ho Au, Jennifer Seberry Jan 2015

Adaptively Secure Identity-Based Broadcast Encryption With A Constant-Sized Ciphertext, Jongkil Kim, Willy Susilo, Man Ho Au, Jennifer Seberry

Faculty of Engineering and Information Sciences - Papers: Part A

In this work, we present an adaptively secure identity-based broadcast encryption system featuring constant sized ciphertext in the standard model. The size of the public key and the private keys of our system are both linear in the maximum number of receivers. Also, our system is fully collusion-resistant and has stateless receivers. Compared with the state-of-the-art, our scheme is well optimized for the broadcast encryption. The computational complexity of decryption of our scheme depends only on the number of receivers, not the maximum number of receivers of the system. Technically, we employ dual system encryption technique and our proposal offers …


A Phantom Assessment Of Achievable Contouring Concordance Across Multiple Treatment Planning Systems, Elise M. Pogson, Jarrad Begg, Michael Jameson, Claire Dempsey, Drew Latty, Vikneswary Batumalai, Andrew Lim, Kankean Kandasamy, Peter E. Metcalfe, Lois C. Holloway Jan 2015

A Phantom Assessment Of Achievable Contouring Concordance Across Multiple Treatment Planning Systems, Elise M. Pogson, Jarrad Begg, Michael Jameson, Claire Dempsey, Drew Latty, Vikneswary Batumalai, Andrew Lim, Kankean Kandasamy, Peter E. Metcalfe, Lois C. Holloway

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper, the highest level of inter- and intra-observer conformity achievable with different treatment planning systems (TPSs), contouring tools, shapes, and sites have been established for metrics including the Dice similarity coefficient (DICE) and Hausdorff Distance. High conformity values, e.g. DICEBreast_Shape = 0.99 ± 0.01, were achieved. Decreasing image resolution decreased contouring conformity.


Induced Molecular Dissociations As A Radiation Damage Descriptor (Nanodosimetry), A Traore, L Ellis-Gibbings, Alexey Verkhovtsev, K Krupa, A Munoz, Fernando Blanco, Gustavo Garcia Jan 2015

Induced Molecular Dissociations As A Radiation Damage Descriptor (Nanodosimetry), A Traore, L Ellis-Gibbings, Alexey Verkhovtsev, K Krupa, A Munoz, Fernando Blanco, Gustavo Garcia

Faculty of Engineering and Information Sciences - Papers: Part A

We present a nanodosimeter software based on Monte Carlo, termed: Low Energy Particle Track Simulation. For medical applications purposes, we propose bond breakings to describe the energy deposited taking water as an example. This tool aims to improve current treatment planning approach based on absorbed dose.


Thin Silicon Strip Detectors For Beam Monitoring In Micro-Beam Radiation Therapy, Marco Povoli, Enver Alagoz, Alberto Bravin, Iwan Cornelius, E Bräuer-Krisch, Pauline Fournier, Thor E. Hansen, Angela Kok, Michael L. F Lerch, E Monakhov, J Morse, Marco Petasecca, Herwig Requardt, Anatoly B. Rosenfeld, D Röhrich, H Sandaker, M Salome, B Stugu Jan 2015

Thin Silicon Strip Detectors For Beam Monitoring In Micro-Beam Radiation Therapy, Marco Povoli, Enver Alagoz, Alberto Bravin, Iwan Cornelius, E Bräuer-Krisch, Pauline Fournier, Thor E. Hansen, Angela Kok, Michael L. F Lerch, E Monakhov, J Morse, Marco Petasecca, Herwig Requardt, Anatoly B. Rosenfeld, D Röhrich, H Sandaker, M Salome, B Stugu

Faculty of Engineering and Information Sciences - Papers: Part A

Microbeam Radiation Therapy (MRT) is an emerging cancer treatment that is currently being developed at the European Synchrotron Radiation Facility (ESRF) in Grenoble, France. This technique uses a highly collimated and fractionated X-ray beam array with extremely high dose rate and very small divergence, to benefit from the dose-volume effect, thus sparing healthy tissue. In case of any beam anomalies and system malfunctions, special safety measures must be installed, such as an emergency safety shutter that requires continuous monitoring of the beam intensity profile. Within the 3DMiMic project, a novel silicon strip detector that can tackle the special features of …


Complex Internal Rearrangement Processes Triggered By Electron Transfer To Acetic Acid, Paulo Limao-Vieira, G Meneses, T Cunha, A. Gil, M Calhorda, Gustavo Garcia, F. Ferreira Da Silva Jan 2015

Complex Internal Rearrangement Processes Triggered By Electron Transfer To Acetic Acid, Paulo Limao-Vieira, G Meneses, T Cunha, A. Gil, M Calhorda, Gustavo Garcia, F. Ferreira Da Silva

Faculty of Engineering and Information Sciences - Papers: Part A

We present negative ion formation from collisions of 100 eV neutral potassium atoms with acetic acid (CH3COOH) and its deuterated analogue molecules (CH3COOD, CD3COOH). From the negative ion time-of-flight (TOF) mass spectra, OH- is the main fragment detected accounting on average for more than 25% of the total anion yield. The complex internal rearrangement processes triggered by electron transfer to acetic acid have been evaluated with the help of theoretical calculations at the DFT levels explaining the fragmentation channel yielding OH-.


Simulink Model For Examining Dynamic Interactions Involving Electro-Mechanical Oscillations In Distribution Systems, Dothinka Ranamuka Rallage, Ashish P. Agalgaonkar, Kashem M. Muttaqi Jan 2015

Simulink Model For Examining Dynamic Interactions Involving Electro-Mechanical Oscillations In Distribution Systems, Dothinka Ranamuka Rallage, Ashish P. Agalgaonkar, Kashem M. Muttaqi

Faculty of Engineering and Information Sciences - Papers: Part A

In Australian medium voltage (MV) distribution networks, the majority of embedded local generation (LG) uses synchronous machine based technology. LG units with a synchronous generator can easily be dispatched and controlled to provide or absorb reactive power and thereby locally supporting the system voltage and increasing the voltage stability margin. The fast response from a synchronous machine based LG unit exciter will ensure fast voltage recovery. This will significantly improve the transient voltage stability. Also, the synchronous machine based LG units can provide inertial support to the system. Furthermore, some of these LG technologies work as standby power supplies all …


Effect Of Heat Input On Stellite 6 Coatings On A Medium Carbon Steel Substrate By Laser Cladding, Alain Kusmoko, Druce P. Dunne, Huijun Li Jan 2015

Effect Of Heat Input On Stellite 6 Coatings On A Medium Carbon Steel Substrate By Laser Cladding, Alain Kusmoko, Druce P. Dunne, Huijun Li

Faculty of Engineering and Information Sciences - Papers: Part A

Stellite 6 was deposited by laser cladding on a medium carbon steel substrate (MS) with energy inputs of 1. kW (MS 1) and 1.8. kW (MS 1.8). The chemical compositions and microstructures of these coatings were characterized by atomic absorption spectroscopy, optical microscopy and scanning electron microscopy. The microhardness of the coatings was measured and the wear mechanism of the coatings was assessed using a pin-on-plate (reciprocating) wear testing machine. The results indicated less cracking and pore development for Stellite 6 coatings applied to the medium carbon steel substrate with the lower heat input (MS 1). Moreover, the Stellite coating …


Dynamic Stall Simulation Of Wind Turbine Airfoils, Xiong Liu, Shi Liang, Yan Chen, Shi Qiang Zhang, Chun Chen Jan 2015

Dynamic Stall Simulation Of Wind Turbine Airfoils, Xiong Liu, Shi Liang, Yan Chen, Shi Qiang Zhang, Chun Chen

Faculty of Engineering and Information Sciences - Papers: Part A

Based on the Beddoes-Leishman (B-L) semi-empirical dynamic stall model, the dynamic stall characteristics of wind turbine airfoils were studied through the analysis of attached flows, separated flows and dynamic vortices. According to the operating conditions of wind turbine airfoils, the method for evaluating dynamic stall coefficients associated with the separated flows and dynamic vortices in the B-L model was amended. The amended model was also extended to produce transient aerodynamic force coefficients over the entire range of possible angles of attack. The lift, drag and pitch moment coefficients of wind turbine airfoils S809 and NACA 4415 during dynamic stall were …


Hybrid Model Predictive Control Of A Residential Hvac System With Pvt Energy Generation And Pcm Thermal Storage, Massimo Fiorentini, Paul Cooper, Zhenjun Ma, Duane A. Robinson Jan 2015

Hybrid Model Predictive Control Of A Residential Hvac System With Pvt Energy Generation And Pcm Thermal Storage, Massimo Fiorentini, Paul Cooper, Zhenjun Ma, Duane A. Robinson

Faculty of Engineering and Information Sciences - Papers: Part A

This paper describes an experimental investigation into the performance of a Hybrid Model Predictive Control (HMPC) system implemented to control a novel solar-assisted HVAC system servicing the Team UOW Solar Decathlon house, the overall winner of the Solar Decathlon China 2013 competition. This HVAC system consists of an air-based photovoltaic thermal (PVT) collector and a phase change material (PCM) thermal store integrated with a conventional ducted reverse-cycle heat pump system. The system was designed for operation during both winter and summer, using daytime solar radiation and night sky radiative cooling to increase the energy efficiency of the air-conditioning system. The …


Understanding Phase Transformations In Steels Using Modern Electron Microscopy Techniques, Elena V. Pereloma, Ahmed A. Saleh, Hendrik T. Spanke, Fayez Al-Harbi, Azdiar A. Gazder Jan 2015

Understanding Phase Transformations In Steels Using Modern Electron Microscopy Techniques, Elena V. Pereloma, Ahmed A. Saleh, Hendrik T. Spanke, Fayez Al-Harbi, Azdiar A. Gazder

Faculty of Engineering and Information Sciences - Papers: Part A

The advantages and limitations of electron back-scattering diffraction coupled with energy dispersive X-ray spectroscopy and of transmission Kikuchi diffraction in relation to the in-depth characterisation of steel microstructures containing phases with similar lattice parameters and/or precipitates are discussed. An in-house developed EBSD map post-processing methodology provided insights into the mechanisms of bainite formation.


Investigation Of Oxide Scale On Ferritic Stainless Steel B445j1m And Its Tribological Effect In Hot Rolling, Xiawei Cheng, Zhengyi Jiang, Jingwei Zhao, Dongbin Wei, Liang Hao, Jianguo Peng, Ming Luo, Li Ma, Suzhen Luo, Laizhu Jiang Jan 2015

Investigation Of Oxide Scale On Ferritic Stainless Steel B445j1m And Its Tribological Effect In Hot Rolling, Xiawei Cheng, Zhengyi Jiang, Jingwei Zhao, Dongbin Wei, Liang Hao, Jianguo Peng, Ming Luo, Li Ma, Suzhen Luo, Laizhu Jiang

Faculty of Engineering and Information Sciences - Papers: Part A

Severe sticking occurs in the hot rolling of ferritic stainless steel B445J1M. The characteristics of the oxide scale on the steel in hot rolling are associated with this phenomenon. The tensile failure of the oxide scale formed on the steel B445J1M was investigated by using a Gleeble 3500 thermo-mechanical simulator over temperature range from 1000 to 1150°C in humid air. Two passes hot rolling were carried out on a 2-high Hille 100 experimental rolling mill. The results show that the temperature is a significant factor for the formed thickness of the oxide scale and its failure in tensile stress. On …


Explosive Breaching Of Walls With Contact Charges: Theory And Applications, Alex Remennikov, Igor Mentus, Brian Uy Jan 2015

Explosive Breaching Of Walls With Contact Charges: Theory And Applications, Alex Remennikov, Igor Mentus, Brian Uy

Faculty of Engineering and Information Sciences - Papers: Part A

Breaching activities are required for military operations in urban environment and for firefighters in emergency situations for saving lives. Explosive wall breaching is a key capability in military operations in urban terrain environments where the close proximity of urban structures significantly restricts the use of large demolition charges. Explosive breaching is also used by special operations groups as a means to gain entry into a structure where conventional breaching methods are not sufficient or the emergency situation requires immediate entry to save lives. This paper develops an analytical model for the explosive breaching of protective targets such as concrete and …


Modelling The Performance Of A Permeable Reactive Barrier Utilised To Reduce The Risk Of Acidic Groundwater In The Shoalhaven Floodplain, U Pathirage, B Indraratna Jan 2015

Modelling The Performance Of A Permeable Reactive Barrier Utilised To Reduce The Risk Of Acidic Groundwater In The Shoalhaven Floodplain, U Pathirage, B Indraratna

Faculty of Engineering and Information Sciences - Papers: Part A

Acidic groundwater generated from acid sulfate soil (ASS) usually carries high concentrations of aluminium (Al) and iron (Fe), which create unfavourable conditions to living habitat. The ASS research team at the University of Wollongong, Australia implemented an innovative geotechnical engineering technique for the remediation of acidic groundwater through a permeable reactive barrier (PRB) using recycled concrete aggregates as the reactive material. This PRB was installed at the Shoalhaven Floodplain, southeast New South Wales (NSW), Australia in October 2006 and has proved effective in neutralisation of groundwater by increasing the pH from 3.6 to 7 and removing 99% of Al and …


2d Versus 3d Collaborative Online Spaces For Student Team Meetings: Comparing A Web Conferencing Environment And A Video-Augmented Virtual World, Sasha Nikolic, Mark Jw Lee, Peter J. Vial Jan 2015

2d Versus 3d Collaborative Online Spaces For Student Team Meetings: Comparing A Web Conferencing Environment And A Video-Augmented Virtual World, Sasha Nikolic, Mark Jw Lee, Peter J. Vial

Faculty of Engineering and Information Sciences - Papers: Part A

BACKGROUND OR CONTEXT Teamwork is an integral component of any engineering degree, but students often have difficulty organising team meetings outside of class times due to discrepancies in their individual study timetables as well as their family and work commitments. Rich-media synchronous online technologies such as video/web conferencing and virtual worlds can be used to help address this problem by enabling anyplace, anytime interaction, while at the same time mirroring the communication modes students will encounter in their future workplaces. However, not much is known about how these technologies compare with one another for facilitating different types of collaborative learning …


Babai Round-Off Cvp Method In Rns: Application To Latice Based Cryptographic Protocols, Jean-Claude Bajard, Julien Eynard, Nabil Merkiche, Thomas Plantard Jan 2015

Babai Round-Off Cvp Method In Rns: Application To Latice Based Cryptographic Protocols, Jean-Claude Bajard, Julien Eynard, Nabil Merkiche, Thomas Plantard

Faculty of Engineering and Information Sciences - Papers: Part A

Lattice based cryptography is claimed as a serious candidate for post quantum cryptography, it recently became an essential tool of modern cryptography. Nevertheless, if lattice based cryptography has made theoretical progresses, its chances to be adopted in practice are still low due to the cost of the computation. If some approaches like RSA and ECC have been strongly optimized - in particular their core arithmetic operations, the modular multiplication and/or the modular exponentiation - lattice based cryptography has not been arithmetically improved. This paper proposes to fill the gap with a new approach using Residue Number Systems, RNS, for one …


Efficient Dynamic Provable Data Possession With Public Verifiability And Data Privacy, Clementine Gritti, Willy Susilo, Thomas Plantard Jan 2015

Efficient Dynamic Provable Data Possession With Public Verifiability And Data Privacy, Clementine Gritti, Willy Susilo, Thomas Plantard

Faculty of Engineering and Information Sciences - Papers: Part A

We present a Dynamic Provable Data Possession (PDP) system with Public Verifiability and Data Privacy. Three entities are involved: a client who is the owner of the data to be stored, a server that stores the data and a Third Party Auditor (TPA) who may be required when the client wants to check the integrity of its data stored on the server. The system is publicly verifiable with the possible help of the TPA who acts on behalf of the client. The system exhibits data dynamicity at block level allowing data insertion, deletion and modification to be performed. Finally, the …


Using Neural Networks To Forecast Available System Resources: An Approach And Empirical Investigation, Yun-Fei Jia, Zhi Quan Zhou, Ke-Xian Xue, Lei Zhao, Kai-Yuan Cai Jan 2015

Using Neural Networks To Forecast Available System Resources: An Approach And Empirical Investigation, Yun-Fei Jia, Zhi Quan Zhou, Ke-Xian Xue, Lei Zhao, Kai-Yuan Cai

Faculty of Engineering and Information Sciences - Papers: Part A

Software aging refers to the phenomenon that software systems show progressive performance degradation or a sudden crash after longtime execution. It has been reported that this phenomenon is closely related to the exhaustion of system resources. This paper quantitatively studies available system resources under the real-world situation where workload changes dynamically over time. We propose a neural network approach to first investigate the relationship between available system resources and system workload and then to forecast future available system resources. Experimental results on data sets collected from real-world computer systems demonstrate that the proposed approach is effective.


Experimental Investigation Of An Innovative Hvac System With Integrated Pvt And Pcm Thermal Storage For A Net-Zero Energy Retrofitted House, Massimo Fiorentini, Paul Cooper, Zhenjun Ma, Josh Wall Jan 2015

Experimental Investigation Of An Innovative Hvac System With Integrated Pvt And Pcm Thermal Storage For A Net-Zero Energy Retrofitted House, Massimo Fiorentini, Paul Cooper, Zhenjun Ma, Josh Wall

Faculty of Engineering and Information Sciences - Papers: Part A

This paper presents the experimental investigation of a novel solar assisted HVAC system developed for the Team UOW Solar Decathlon house, the overall winner of the Solar Decathlon China 2013 competition. This novel HVAC system consists of an air based photovoltaic-thermal (PVT) system and a phase change material (PCM) thermal storage unit integrated with a ducted system with a reverse-cycle heat pump. The system has been designed for operation during both winter and summer, using daytime solar radiation and night sky radiative cooling to increase the energy efficiency of the air-conditioning system. The PVT system can exchange heat with the …


In Vitro Mechanical Fatigue Behavior Of Poly-Ɛ-Caprolactone Macroporous Scaffolds For Cartilage Tissue Engineering: Influence Of Pore Filling By A Poly(Vinyl Alcohol) Gel, J A. Panadero, L Vikingsson, J L. Gomez Ribelles, Senentxu Lanceros-Méndez, Vitor Sencadas Jan 2015

In Vitro Mechanical Fatigue Behavior Of Poly-Ɛ-Caprolactone Macroporous Scaffolds For Cartilage Tissue Engineering: Influence Of Pore Filling By A Poly(Vinyl Alcohol) Gel, J A. Panadero, L Vikingsson, J L. Gomez Ribelles, Senentxu Lanceros-Méndez, Vitor Sencadas

Faculty of Engineering and Information Sciences - Papers: Part A

Polymeric scaffolds used in regenerative therapies are implanted in the damaged tissue and submitted to repeated loading cycles. In the case of articular cartilage engineering, an implanted scaffold is typically subjected to long-term dynamic compression. The evolution of the mechanical properties of the scaffold during bioresorption has been deeply studied in the past, but the possibility of failure due to mechanical fatigue has not been properly addressed. Nevertheless, the macroporous scaffold is susceptible to failure after repeated loading-unloading cycles. In this work fatigue studies of polycaprolactone scaffolds were carried by subjecting the scaffold to repeated compression cycles in conditions simulating …


Development Of Magnetoelectric Cofe2o4 /Poly(Vinylidene Fluoride) Microspheres, R Goncalves, P M. Martins, Daniela M. Correia, Vitor Sencadas, J L. Vilas, L M. Leon, Gabriela Botelho, Senentxu Lanceros-Méndez Jan 2015

Development Of Magnetoelectric Cofe2o4 /Poly(Vinylidene Fluoride) Microspheres, R Goncalves, P M. Martins, Daniela M. Correia, Vitor Sencadas, J L. Vilas, L M. Leon, Gabriela Botelho, Senentxu Lanceros-Méndez

Faculty of Engineering and Information Sciences - Papers: Part A

Magnetoelectric microspheres based on piezoelectric poly(vinylidene fluoride) (PVDF) and magnetostrictive CoFe2O4 (CFO), a novel morphology for polymer-based ME materials, have been developed by an electrospray process. The CFO nanoparticle content in the (3-7 mm diameter) microspheres reaches values up to 27 wt%, despite their concentration in the starting solution reaching values up to 70 wt%. Additionally, the inclusion of magnetostrictive nanoparticles into the polymer spheres has no relevant effect on the piezoelectric b-phase content (z60%), crystallinity (40%) and the onset degradation temperature (460-465 C) of the polymer matrix. The multiferroic microspheres show a maximum piezoelectric response |d33| …


Design Of Holes And Web Openings In Railway Prestressed Concrete Sleepers, Erosha Kahawatta Gamage, Sakdirat Kaewunruen, Alex M. Remennikov Jan 2015

Design Of Holes And Web Openings In Railway Prestressed Concrete Sleepers, Erosha Kahawatta Gamage, Sakdirat Kaewunruen, Alex M. Remennikov

Faculty of Engineering and Information Sciences - Papers: Part A

As the crosstie beam in railway track systems, the prestressed concrete sleepers (or railroad ties) are principally designed in order to carry wheel loads from the rails to the ground. Their design takes into account static and dynamic loading conditions. It is evident that prestressed concrete has played a significant role as to maintain the high endurance of the sleepers under low to moderate repeated impact loads. In spite of the most common use of the prestressed concrete sleepers in railway tracks, there have always been many demands from rail engineers to improve serviceability and functionality of concrete sleepers. For …


Application Of The Theory Of Constraints To The Pillar Development Cycle Of An Underground Coal Mine, Ernest Baafi, Dalin Cai, Ian Porter Jan 2015

Application Of The Theory Of Constraints To The Pillar Development Cycle Of An Underground Coal Mine, Ernest Baafi, Dalin Cai, Ian Porter

Faculty of Engineering and Information Sciences - Papers: Part A

The underground coal mine pillar development cycle consists primarily of three sets of interdependent and synchronised cycles, i.e., the coal cutting cycle by a continuous miner (CM), the support cycle by a roof bolter and the coal transport cycle to the boot end by a shuttle car. Coal cutting by a CM is generally not seen as a constraint as, in almost all cases, the capacity of the CM far exceeds the demand placed on it. Therefore, in essence, the pillar development process can be either transport constrained or support constrained. Using a discrete simulation model, it was shown that …


Investigating The Shear Behaviour Of Fouled Ballast Using Discrete Element Modelling, Ngoc Trung Ngo, Buddhima Indraratna, Cholachat Rujikiatkamjorn Jan 2015

Investigating The Shear Behaviour Of Fouled Ballast Using Discrete Element Modelling, Ngoc Trung Ngo, Buddhima Indraratna, Cholachat Rujikiatkamjorn

Faculty of Engineering and Information Sciences - Papers: Part A

For several hundred years, the design of railway tracks has practically remained unchanged. Traditionally, rail tracks are placed on a ballast layer due to several reasons, including economy, rapid drainage, and high load bearing capacity. The primary function of ballast is to distributing dynamic track loads to sub-ballast and subgrade layers, while also providing lateral resistance and allowing for rapid drainage. Upon repeated trainloads, the ballast becomes fouled due to ballast degradation and the intrusion of fines which adversely affects the strength and deformation behaviour of ballast. This paper presents the use of three-dimensional discrete element method (DEM) in studying …


Global Analysis Of The Generalised Helfrich Flow Of Closed Curves Immersed In Rn, Glen Wheeler Jan 2015

Global Analysis Of The Generalised Helfrich Flow Of Closed Curves Immersed In Rn, Glen Wheeler

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper we consider the evolution of regular closed elastic curves γ immersed in Rn. Equipping the ambient Euclidean space with a vector field : Rn → Rn and a function f : Rn → R, we assume the energy of γ is smallest when the curvature κ of γ is parallel to c0 = ( ◦ γ)+(f ◦ γ)τ, where τ is the unit vector field spanning the tangent bundle of γ. This leads us to consider a generalisation of the Helfrich functional Hc0 λ , defined as the sum of the integral of |κ − c0| 2 …