• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 9
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 20
  • 20
  • 5
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Tools for the formation of optimised X-80 steel blast tolerant transverse bulkheads

Raymond, Ian K., Mechanical & Manufacturing Engineering, Faculty of Engineering, UNSW January 2001 (has links)
The Australian Maritime Engineering Cooperative Research Centre, and its partner organisation initiated this research effort. In particular, BHP and the Defence Science and Technology Organisation held the principal interest, as this research effort was a part of the investigation into the utilisation of X-80 steel in naval platforms. After some initial considerations, this research effort focussed on the development of X-80 steel blast tolerant transverse bulkheads. Unfortunately, due to the Australian Maritime Engineering Cooperative Research Centre not being re-funded after June 2000 and other project factors, the planned blast tests were not conducted, hence this research effort focussed on the tools needed for the formation of optimised blast tolerant transverse bulkheads rather than on the development of a single structural arrangement. Design criteria were formed from the worst case operational requirements for a transverse bulkhead, which would experience a 150 kg equivalent blast load at 8 m from the source. Since the development of any optimised blast tolerant structure had to be carried out using finite element analysis, material constants for X-80 steel under high strain rates were obtained. These material constants were implemented in the finite element analysis and the appropriate solid element size was evolved. The behaviour and effects of stress waves and high strain rates were considered and the literature reviewed, in particular consideration was given to joint structures and weld areas effects on the entire structural response to a blast load. Furthermore, to support the design criteria, rupture prediction and determination methodologies have been investigated and recommendations developed about their relevance. Since the response of transverse bulkheads is significantly affected by their joint and stiffener arrangements, separate investigations of these structures were undertaken. The outcomes of these investigations led to improvements in the blast tolerance behaviour of joints and stiffeners, which also improved the overall response of the transverse bulkhead to air blast loads. Finally, an optimisation procedure was developed that met all the design criteria and its relevant requirements. This optimisation procedure was implemented with the available data, to show the potential to develop optimised X-80 steel blast tolerant transverse bulkheads. Due to the constraints mentioned above the optimisation procedure was restricted, but did show progression towards more effective blast tolerant transverse bulkhead designs. Factors, such as double skin bulkheads, maximising plate separation, and the use of higher yield steel all showed to be beneficial in the development of optimal X-80 steel blast tolerant transverse bulkheads, when compared to the ANZACclass D-36 steel transverse bulkheads.
12

Tools for the formation of optimised X-80 steel blast tolerant transverse bulkheads /

Raymond, Ian K. January 2001 (has links)
Thesis (M.E. (Res.))--University of New South Wales, 2001. / Optical disc inserted in pocket on p. [3] of cover. Includes bibliographical references. Also available online.
13

A Survey of Employees of the United States Department of Agriculture's Animal Damage Control Program

Schroeder, Susan A. 01 May 1996 (has links)
This study examined the attitudes of employees of the United States Department of Agriculture's Animal Damage Control (ADC) Program. This research examined ADC employees' attitudes about wildlife, the ADC program and ADC employment, wildlife damage management methods, euthanasia and the killing process, and the role of various public and private groups on ADC policy. This study also applied the theory of organizational capture to the ADC program to test its utility in explaining the attitudes and behaviors of employees. Results were based on a survey of ADC employees conducted in January 1995. Survey responses were analyzed to explore associations between employee attitudes and job type or time of service at ADC. Job type was found to be a better indicator of employee attitudes than time of service. Field and management employees tended to have more positive views of ADC and ADC employment compared with research employees. Respondents with different job types perceived different levels of effectiveness and humaneness for wildlife control methods. In general, field employees viewed lethal techniques as more effective and humane than research employees. Similarly, research employees reported nonlethal techniques to be more effective and humane than field employees. Finally, research employees felt that outside interest groups should have more influence on ADC practices than field and management employees felt they should. ADC employees were found to have some characteristics indicative of organizational capture. They had a homogeneous client base, and were resistant to reaching out to nontraditional clients in the face of opposition from traditional clients. However, they were not deflected from the ADC mission. Because respondents indicated conformity to the ADC mission, ADC was found to be at most variably captured by its traditional farming and ranching clientele.
14

Model-Centric Interdependent Critical Infrastructure System Recovery Analysis and Metrics

Russell, Kevin Joseph 29 June 2016 (has links)
This dissertation defines and evaluates new operations management modeling concepts for use with interdependent critical infrastructure system reconfiguration and recovery analysis. The work combines concepts from Graph Trace Analysis (GTA), Object Oriented Analysis and Design (OOAandD), the Unified Modeling Language (UML) and Physical Network Modeling; and applies them to naval ship reduced manned Hull, Mechanical, Electrical and Damage Control (HMEandDC) system design and operation management. OOAandD problem decomposition is used to derive a natural solution structure that simplifies integration and uses mission priority and mission time constraint relationships to reduce the number of system states that must be evaluated to produce a practical solution. New concepts presented include the use of dependency components and automated system model traces to structure mission priority based recovery analysis and mission readiness measures that can be used for automating operations management analysis. New concepts for developing power and fluid system GTA loop flow analysis convergence measures and acceleration factors are also presented. / Ph. D.
15

Oberschenkelfraktur beim Polytrauma / Eine retrospektive Studie auf der Grundlage des Göttinger Polytraumaregisters / Femoral fractur at polytrauma / A retrospective studie based on

Böhmert, Alexandra 17 November 2010 (has links)
No description available.
16

Intérêts et limites du clampage endovasculaire de l'aorte thoracique en situation de choc hémorragique non contrôlé lié à un traumatisme abdominal sur un modèle animal

Avaro, Jean-Philippe 18 April 2011 (has links)
La traumatologie est la première cause de mortalité chez les sujets de moins de 40 ans dans les pays industrialisés. Le choc hypovolémique lié à une hémorragie du tronc est une cause fréquente de décès, à la fois sur les lieux de l’accident mais également pendant la prise en charge pré-hospitalière et intra-hospitalière. L’existence d’un hémopéritoine est un facteur de sous estimation du traumatisé grave.Le contrôle lésionnel, mieux connu sous les anglicismes « damage control ressucitation » et « damage control surgery », est le paradigme moderne de la prise en charge du choc hémorragique d’origine traumatique. Il comprend une mise en condition minimaliste privilégiant la réalisation d’une hémostase chirurgicale précoce et rapide, suivie d’une réanimation intensive associant transfusion massive, réchauffement et optimisation de la coagulation. Le traitement chirurgical exhaustif des lésions traumatiques est différé au delà de la période d’instabilité.Chez le blessé hémorragique agonique, la thoracotomie de ressuscitation avec clampage de l’aorte thoracique est une pratique courante mais dont les bases factuelles ne sont pas bien établies. En revanche en pathologie artérielle, la voie d’abord endovasculaire a très largement fait preuve de son efficacité.Nous avons émis l’hypothèse qu’un clampage aortique endovasculaire de l’aorte thoracique par voie rétrograde est possible et que cette technique améliore le profil hémodynamique dans le territoire myocardique et cérébral tout en augmentant la survie en cas de choc hémorragique lié à un traumatisme abdominal.Nos résultats suggèrent que cette technique de sauvetage est efficace, même s’il semble exister des limites corrélées à la durée de l’ischémie/reperfusion viscérale et médullaire. / Trauma is the leading cause of mortality in industrialized countries for people aged below 40 years. Fifty percent of the pre hospital and in hospital mortality from severe blunt and penetrating abdominal traumas is due to an hemorrhagic shock. Peritoneal bloody effusion is the main reason to under estimate the seriousness of trauma.Damage control resuscitation (DCR) and damage control surgery (DCS) typify the current paradigm of hemorrhagic torso trauma management. Damage control includes a basic pre operative management before a short surgical control of bleeding followed by intensive resuscitation care based on massive blood transfusion, palliation of hypothermia and correction of biological coagulation disorders. According to this strategy, the curative surgical treatment is postponed until the patient has been stabilized.Some authors have reported on the efficacy of resuscitation thoracotomy with aortic crossclamping in the emergency room in patients with severe abdominal trauma . However, the end results of such a procedure are contrasted and its use is still debated. More recently, endovascular approach has emerged in the management algorithm of some vascular emergencies. We hypothesized that an endovascular retrograde occlusion of the thoracic aorta would be a safe and efficient to preserve hemodynamic profile in cardiac and cerebral area, and to improve survival in case of uncontrolled hemorrhagic shock caused by an abdominal trauma.Our results sustain this hypothesis, even if its benefits seem time-limited, according to the medullar and visceral side-effects of ischemia/reperfusion.
17

Genetic Algorithm Based Damage Control For Shipboard Power Systems

Amba, Tushar 2009 May 1900 (has links)
The work presented in this thesis was concerned with the implementation of a damage control method for U.S. Navy shipboard power systems (SPS). In recent years, the Navy has been seeking an automated damage control and power system management approach for future reconfigurable shipboard power systems. The methodology should be capable of representing the dynamic performance (differential algebraic description), the steady state performance (algebraic description), and the system reconfiguration routines (discrete events) in one comprehensive tool. The damage control approach should also be able to improve survivability, reliability, and security, as well as reduce manning through the automation of the reconfiguration of the SPS network. To this end, this work implemented a damage control method for a notional Next Generation Integrated Power System. This thesis presents a static implementation of a dynamic formulation of a new damage control method at the DC zonal Integrated Flight Through Power system level. The proposed method used a constrained binary genetic algorithm to find an optimal network configuration. An optimal network configuration is a configuration which restores all of the de-energized loads that are possible to be restored based on the priority of the load without violating the system operating constraints. System operating limits act as constraints in the static damage control implementation. Off-line studies were conducted using an example power system modeled in PSCAD, an electromagnetic time domain transient simulation environment and study tool, to evaluate the effectiveness of the damage control method in restoring the power system. The simulation results for case studies showed that, in approximately 93% of the cases, the proposed damage algorithm was able to find the optimal network configuration that restores the power system network without violating the power system operating constraints.
18

Game publishers and their constant need for damage control : A Content Analysis of Activision Blizzard's communication during their public-relations crises / Game publishers and their constant need for damage control : A Content Analysis of Activision Blizzard's communication during their public-relations crises

Moberg, Albin January 2024 (has links)
Big organisations and companies in game development and distribution have in recent years become involved in public-relations crises. In the past you could see that dissatisfied consumers have an impact on the image for organisations. To find out how an organisation can stop or mitigate a bad image, an analysis was conducted of Activision Blizzard’s communication to the public during their Public-relations crises, with a connection to strategic communications theories. The method used in the study was a Content analysis with a deductive approach to critically analyse the messages that was communicated during the public-relations crises the organisation had. The results of the analysis gave information for both Successful communication and communication that could have been improved with the strategic communications theories. With this information there is another source for crisis managers to construct messages during a crisis to either stop or mitigate a bad image. The study also gives an example on how to analyse an organisations crisis communication critically.
19

Low Cycle Fatigue Effects In The Damage Caused By The Marmara Earthquake Of August 17, 1999

Acar, Fikri 01 October 2004 (has links) (PDF)
This study mainly addresses the problem of estimating the prior earthquake damage on the response of reinforced concrete structures to future earthquakes. The motivation has arisen from the heavy damages or collapses that occurred in many reinforced concrete structures following two major earthquakes that recently occurred in the Marmara Region, Turkey. The analysis tool employed for this purpose is the package named IDARC2D. Deterioration parameters of IDARC&#039 / s hysteretic model have been calibrated using a search method. In the calibration process experimental data of a total of twenty-two beam and column specimens, tested under constant and variable amplitude displacement histories, has been used. Fine-tuning of deterioration parameters is essential for more realistic predictions about inelastic behavior and structural damage. In order to provide more realistic damage prediction, three ranges of parameters are proposed. Some damage controlling structural parameters have been assessed via a large number of two-dimensional section analyses, inelastic time history and damage analyses of SDOF systems and seismic vulnerability analyses of reinforced concrete buildings. Inelastic time history and damage analyses of numerous SDOF systems have been carried out to determine whether the loading history has an effect on damage and dissipated hysteretic energy. Then this emphasis is directed to the analyses of MDOF systems. In the analyses of the SDOF systems, various forms of constant and variable amplitude inelastic displacement reversals and synthetic ground motions composed of one of the four earthquake records preceded or followed by its modified records acted as a prior or successive earthquake, have been used. The analyses of two five-story R/C buildings have been caried out using synthetic accelerograms comprised of base input provided by the two recorded ground motions. It is shown that both damage progression and cumulative hysteretic energy dissipated along a path seem to depend on the number and amplitude of cycles constituting the path. However, final damage and accumulated hysteretic energy dissipated along a loading path are independent of the ordering of the same number and amplitude cycles along the path. There is a nonlinear relationship between the earthquake excitation intensity and final damage attained in the end. Increase in the acceleration amplitude leads to exponential increase in damage. As the prior earthquake intensity increases the damage from the succeding main earthquake decreases. A definite ground motion acting as prior and successive earthquake causes substantially different amount of damage. Prior earthquake damage does not substantially affect the maximum drift response in future larger earthquakes. A MDOF frame type structure with aprior damage suffers less overall damage in an earthquake in comparison with the one without a prior damage.
20

Using network resources to mitigate volumetric DDoS / Utiliser les ressources réseaux pour atténuer les attaques DDoS volumétriques

Fabre, Pierre-Edouard 13 December 2018 (has links)
Les attaques massives par déni de service représentent une menace pour les services Internet. Ils impactent aussi les fournisseurs de service réseau et menace même la stabilité de l’Internet. Il y a donc un besoin pressant de contrôler les dommages causés par ces attaques. De nombreuses recherches ont été menées, mais aucune n’a été capable de combiner le besoin d’atténuation de l’attaque, avec l’obligation de continuité de service et les contraintes réseau. Les contre mesures proposées portent sur l’authentification des clients légitimes, le filtrage du trafic malicieux, une utilisation efficace des interconnections entre les équipements réseaux, ou l’absorption de l’attaque par les ressources disponibles. Dans cette thèse, nous proposons un mécanisme de contrôle de dommages. Basé sur une nouvelle signature d’attaque et les fonctions réseaux du standard Multiprotocol Label Switching (MPLS), nous isolons le trafic malicieux du trafic légitime et appliquons des contraintes sur la transmission du trafic malicieux. Le but est de rejeter suffisamment de trafic d’attaque pour maintenir la stabilité du réseau tout en préservant le trafic légitime. La solution prend en compte des informations sur l’attaque, mais aussi les ressources réseaux. Considérant que les opérateurs réseaux n’ont pas une même visibilité sur leur réseau, nous étudions l’impact de contraintes opérationnelles sur l’efficacité d’une contre mesure régulièrement recommandée, le filtrage par liste noire. Les critères d’évaluation sont le niveau d’information sur l’attaque ainsi que sur le trafic réseau. Nous formulons des scénarios auxquels chaque opérateur peut s’identifier. Nous démontrons que la l’algorithme de génération des listes noires doit être choisi avec précaution afin de maximiser l’efficacité du filtrage / Massive Denial of Service attacks represent a genuine threat for Internet service, but also significantly impact network service providers and even threat the Internet stability. There is a pressing need to control damages caused by such attacks. Numerous works have been carried out, but were unable to combine the need for mitigation, the obligation to provide continuity of service and network constraints. Proposed countermeasures focus on authenticating legitimate traffic, filtering malicious traffic, making better use of interconnection between network equipment or absorbing attack with the help of available resources. In this thesis, we propose a damage control mechanism against volumetric Denial of Services. Based on a novel attack signature and with the help of Multiprotocol Label Switching (MPLS) network functions, we isolate malicious from legitimate traffic. We apply a constraint-based forwarding to malicious traffic. The goal is to discard enough attack traffic to sustain network stability while preserving legitimate traffic. It is not only aware of attack details but also network resource, especially available bandwidth. Following that network operators do not have equal visibility on their network, we also study the impact of operational constraints on the efficiency of a commonly recommended countermeasure, namely blacklist filtering. The operational criteria are the level of information about the attack and about the traffic inside the network. We then formulate scenario which operators can identify with. We demonstrate that the blacklist generation algorithm should be carefully chosen to fit the operator context while maximizing the filtering efficiency

Page generated in 0.0752 seconds