Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 14
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

The NOMAD project was a survey to examine the noise-related content of instructions supplied with machinery offered for purchase in Europe. The project collected more than 1 500 instructions from machines covering 40 broad machine-families and from 800 different manufacturing companies. These instructions were analyzed to determine compliance with the requirements of the Machinery Directive, and assess the quality of information. The general state of compliance of machinery instructions with the noise-related requirements of the Machinery Directive was found to be very poor: 80% of instructions did not meet legal requirements. Some required numerical values relating to noise emissions were often missing. Where values were given, they were often not traceable to machine operating conditions or measurement methods, and not credible either against stated conditions/methods or as warnings of likely risk in real use. As a consequence, it is considered highly likely that, in making a machinery procurement decision, employers are prevented from taking noise emissions into account, and understanding what is necessary to manage the risks from noise relating to equipment that is procured. Recommendations are made for actions aimed at bringing about a global improvement to the current situation. Targeted actions are now proposed by “ADCO Machinery Group” aimed at raising awareness of the legal requirements, responsibilities and actions required among the various groups who have parts to play in the system - machine manufacturers, machine users, occupational safety and health professionals, and standards-makers. Recommendations are also made aimed at providing, or improving, tools and resources for all these actors.
Go to article

Authors and Affiliations

Jacques Châtillon
Marian Szyszko
Download PDF Download RIS Download Bibtex

Abstract

In the construction industry carbonate aggregates are commonly used in processes such as concrete production. Aggregates which contain (in their mineral composition) dolomite and an admixture of clay minerals and amorphous silica , can react with alkalis. These reactions can lead to a destructive expansion in concrete. This article explains the mechanisms and the essence of this phenomenon. What is more, some effective and fast methods of the estimation and evaluation of Polish aggregates consisting of carbonate rocks suggests effective methods to determine the usefulness of Polish carbonate aggregates in concrete production are discussed in the paper. Underneath the quality criteria to determine the reactivity of the aggregates will be given. It has been agreed that alkaline reaction and expansion are two separate phenomena related to each other genetically. The aggregates in which reactions caused by clay-siliceous admixtures occur are subjected to expansion. Mineral composition of expansive aggregates as well as their texture indicate that epigenetic dolomites with a distinctive texture are the most reactive. The phase transformations do not end with a complete disintegration of dolomite. They have a cyclical character. They consist of interchangeable reactions of dedolomitization and dolomitization of secondary calcite formed as a result of dolomite's disintegration. The secondary calcite can be effected by Mg+2 ions from pores' solutions and it can form a secondary dolomite. The Mg2+ ions originate from brucite [Mg(OH)2], created in dolomitization process. As a consequence of its reaction with silica, brucite can dissolve and enrich secondary calcite with magnesium. Therefore the reactions which take place in reactive carbonate aggregates and concrete that ismade of it are in fact ongoing processes which consist of dolomite's changes into calcite and vice versa. They are reactions between dedolomitization products (brucite, silica) and products from outside (water, alkalis). The described dedolomitization reactions are a phase of the process that enables expansion due to formation of pressure in inter-granular cracks, with pressure being a result of dry clay-minerals' expansion under the influence of water solutions. Loosening of the aggregate's structure as an effect of dedolomitization reaction makes it easier for water solutions to migrate far into the aggregate's grains followed by their contact with clay minerals.

Go to article

Authors and Affiliations

Stefan Góralczyk
Download PDF Download RIS Download Bibtex

Abstract

The paper describes the most important factors controlling the process of methanogenesis in the biomethanization technology. It discusses the operational regimes of temperature as well as pH, C/N ratio, the necessity for micronutrients and sensitivity to a number of toxic compounds. Components with an inhibitory effect are characterized as biostatic compounds (ammonia, VFAs, hydrogen sulfide and salinity-inducing substances) and biocidal substances (such as surfactants and pharmaceuticals). The threshold limits of the compounds in question securing the system against disturbances are introduced, as well as the measures counteracting inhibition. Some ways of overcoming the negative impact of environmental factors on the system are presented, including co-fermentation, supplementation of nutrients, removal of ammonia and hydrogen sulfide by different methods and acclimatization of methanogens to inhibitory substances.
Go to article

Authors and Affiliations

Agnieszka Montusiewicz
Download PDF Download RIS Download Bibtex

Abstract

The purpose of this paper is to generate cryptographically strong elliptic curves over prime fields Fp, where p is a Mersenne prime, one of the special primes or a random prime. We search for elliptic curves which orders are also prime numbers. The cryptographically strong elliptic curves are those for which the discrete logarithm problem is computationally hard. The required mathematical conditions are formulated in terms of parameters characterizing the elliptic curves.We present an algorithm to generate such curves. Examples of elliptic curves of prime order are generated with Magma.
Go to article

Bibliography

[1] Daniel J. Bernstein and Tanja Lange. SafeCurves: choosing safe curves for elliptic curve cryptography, 2015. http://safecurves.cr.yp.to (accessed 27 September 2015).
[2] I. Blake, G. Serroussi, N. Smart. Elliptic curves in cryptography. Cambridge University Press, 1999.
[3] H. Cohen. A course in computational number theory. Springer 1983.
[4] H. Cohen, G. Frey. Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman and Hall CRC, 1994.
[5] P. Da˛browski, R. Gliwa, J. Szmidt, R. Wicik. Generation and Implementation of Cryptographically Strong Elliptic Curves. Number-Theoretical Methods in Cryptology. First International Conference, NuTMiC 2017. Warsaw, Poland, 11-13, 2017. Lecture Notes in Computer Sciences, (Eds), Jerzy Kaczorowski, Josef Piprzyk, Jacek Pomykała. Volume 10737, pages 25-36. 2017.
[6] W. Diffie, M. E. Hellman. New Directions in Cryptography. IEEE Trans. Information Theory, IT 22(6), pp. 644-654, 1976.
[7] Jean-Pierre Flori, Jerome Plut, Jean-Rene Reinhard. Diversity and transparency for ECC. NIST Workshop on ECC Standards, June 11-12, 2015.
[8] Gerhard Frey, private communication, 2015.
[9] G. Frey, H. Rück. A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Mathematics of Computations, 62 91994), 865-874.
[10] S. D. Galbraith, P. Gaudry. Recent progress on the elliptic curve discrete logarithm problem. Cryptology ePrint Archive, 2015/1022.
[11] Steven D. Galbraith and James McKee. The probability that the number of points on an elliptic curve over a finite field is prime. J. London Math. Soc. (2), 62(3):671–684, 2000.
[12] R. Gliwa, J. Szmidt, R. Wicik Searching for cryptographically secure elliptic curves over prime fields. Science and Military, 2016, nr 1, volume 11, pages 10-13, ISSN 1336-8885 (print), ISSN 2453-7632 (on-line).
[13] R. Granger, M. Scott. Faster ECC over F2521��1. In: Katz, J. ed., PKC 2015. LNCS, vol. 9020, pp. 539–553.[14] D. Johnson, A. Menezes. The Elliptic Curve Digital Signature Algorithm (ECDSA). Technical Report CORR 99-34, University of Waterloo, Canada. http://www.math.uwaterloo.ca
[15] Manfred Lochter and Andreas Wiemers. Twist insecurity, 2015. iacr. ePrint Archive 577 (2015).
[16] A. Menezes, T. Okamoto, S. Vanstone. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE. Transactions on Information Theory, 39 (1993), 1639-1646.
[17] N. Koblitz. Elliptic curve cryptosystems. Math. Comp., 48(177), pp. 203- 209, 1987.
[18] V. S. Miller. Use of elliptic curves in cryptography. In Advances in Cryptology - CRYPTO’85, LNCS vol 218, pp. 417-426, 1985.
[19] P. Pohlig, M. Hellman. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transaction on Information Theory, 24 (1979), 106-110.
[20] J. Pollard. Monte Carlo methods for index computations mod pn: Mathematics of Computations, 32 (1978), 918-924.
[21] R. L. Rivest, A. Shamir, L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM, 21(2), pp. 120- 126, 1978.
[22] T. Satoh, K. Araki. Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves, Commentarii Mathematici Universitatis Sancti Pauli, 47 (1998), 81-92.
[23] I. Semaev. Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p. Mathematics of Computations, 67 (1998), 353-356.
[24] N. Smart. The discrete logarithm problem on elliptic curves uf trace one. Journal of Cryptology, 12 (1999), 193-196.
[25] J. H. Silverman. The arithmetic of elliptic curves. Springer 1986.
[26] Elliptic Curve Cryptography (ECC) Brainpool Standard. Curves and Curve Generation, v. 1.0. 2005. Request for Comments: 5639, 2010. 7027, 2013. http://www.bsi.bund.de
[27] Technical and Implementation Guidance on Generation and Application of Elliptic Curves for NATO classified, 2010.
[28] US Department of Commerce. N.I.S.T. 2000. Federal Information Processing Standards Publication 186-2. FIPS 186-2. Digital Signature Standard.
[29] Standards for Efficient Cryptography Group. Recommended elliptic curve domain parameters, 2000. www.secg.org/collateral/sec2.pdf
[30] Mersenne prime. en.wikipedia.org
[31] Magma Computational Algebra System. School of Mathematics and Statistics. University of Sydney.
Go to article

Authors and Affiliations

Marcin Barański
1
Rafał Gliwa
1
Janusz Szmidt
1

  1. Military Communication Institute, National Research Institute, Warszawska 22A, 05-130 Zegrze
Download PDF Download RIS Download Bibtex

Abstract

Brucella canis infection is one of the most important causes of infertility in dogs and is a zoonosis for which no effective treatment or vaccines exist. It is not a mandatory notifiable disease. Following an increase of cases in Europe and worldwide, an investigation was performed to evaluate how much Italian and Polish veterinarians and breeders know about canine brucellosis and understand their perceptions of this infection. For this reason, two questionnaires were prepared, in Italian and Polish. Eighteen Italian and Polish veterinarians, specialists in canine reproduction, responded to the first survey and 44.4% of them affirmed having diagnosed canine brucellosis at least once in their clinical practice, and different perceptions emerged regarding the infection in the two countries. The second survey was completed by 145 Italian and Polish breeders; the disease was completely unknown to 22.8% of them, whereas 2.1% had diagnosed infection by B. canis in their kennels. In conclusion, knowledge of B. canis infection differs between these countries, with extremes ranging from diagnosed cases to complete underestimation of the presence of the problem. However, based on international data and reporting of a recent large outbreak in Italy, awareness of this contagious infectious disease and its management must be increased.
Go to article

Bibliography


Brower A, Okwumabua O, Massengill C, Muenks Q, Vanderloo P, Duster M, Homb K, Kurth K (2007) Investigation of the spread of Brucella canis via the U.S. interstate dog trade. Int J Infect Dis 11: 454-458.
Buhmann G, Paul F, Herbst W, Melzer F, Wolf G, Hartmann K, Fischer A (2019) Canine Brucellosis: Insights into the Epidemiologic Situation in Europe. Front Vet Sci 6: 151.
Corrente M, Franchini D, Decaro N, Greco G, D’Abramo M, Greco MF, Latronico F, Crovace A, Martella V (2010) Detection of Brucella canis in a dog in Italy. New Microbiol 33: 337-341.
Cosford KL (2018) Brucella canis: un update on research and clinical management. Can Vet J 59: 74-81.
De Massis F, Sacchini F, Averaimo D, Garofolo G, Lecchini P, Ruocco L, Lomolino R, Santucci U, Sgariglia E, Crotti S, Petrini A, Migliorati G, D’Alterio N, Gavaudan S, Tittarelli M (2021) First Isolation of Brucella canis from a breeding kennel in Italy. Vet Ital 57: 215-226.
Galarce N, Escobar B, Martínez E, Alvarado N, Peralta G, Dettleff P, Dorner J, Martínez V, Borie C (2020) Prevalence and Genomic Characterization of Brucella canis Strains Isolated from Kennels, Household, and Stray Dogs in Chile. Animals (Basel) 10: 2073.
Gyuranecz M., Szeredi L, Ronai Z, Denes B, Dencso L, Dan A, Palmai N, Hauser Z, Lami E, Makrai L, Erdelyi K, Janosi S (2011) Detection of Brucella canis-induced reproductive diseases in a Kennel. J Vet Diagn Invest 23: 143-147.
Hensel ME, Negron M, Arenas-Gamboa AM (2018) Brucellosis in Dogs and Public Health Risk. Emerg Infect Dis 24: 1401-1406.
Hollett RB (2006) Canine brucellosis: outbreaks and compliance. Theriogenology 66: 575-587.
Holst BS, Löfqvist K, Ernholm L, Eld K, Cedersmyg M, Hallgren G (2012) The first case of Brucella canis in Sweden: background, case report and recommendations from a northern European perspective. Acta Vet Scand 54: 18.
Johnson CA, Carter TD, Dunn JR, Baer SR, Schalow MM, Bellay YM, Guerra MA, Frank NA (2018) Investigattion and characterization of Brucella canis infections in pet-quality dogs and associated human exposures during a 2007- 2016 outbreak in Michigan. J Am Vet Med Assoc 253: 322-336.
Kaden R, Ågren J, Båverud V, Hallgren G, Ferrari S, Börjesson J, Lindberg M, Bäckman S, Wahab T (2014) Brucellosis outbreak in a Swedish kennel in 2013: determination of genetic markers for source tracing. Vet Microbiol 174: 523-530.
Kauffman LK, Petersen CA (2019) Canine Brucellosis: Old Foe and Reemerging Scourge. Vet Clin North Am Small Anim Pract 49: 763-779.
Keid LB, Chiebao DP, Batinga MC, Faita T, Diniz JA, de S Olivieira TM, Ferreira HL, Soares RM (2017) Brucella canis infection in dogs from commercial breeding kennels in Brazil. Transbound Emerg Dis 64: 691-697.
Lucero NE, Corazza R, Almuzara MN, Reynes E, Escobar GI, Boeri E, Ayala SM (2010) Human Brucella canis outbreak linked to infection in dogs. Epidemiol Infect 138: 280-285.
Lucero NE, Jacob NO, Ayala SM, Escobar GI, Tuccillo P, Jacques I (2005) Unusual clinical presentation of brucellosis caused by Brucella canis. J Med Microbiol 54: 505-508.
Marzetti S, Carranza C, Roncallo M, Escobar GI, Lucero NE (2013) Recent trends in human Brucella canis infection. Comp Immunol Microbiol Infect Dis 36: 55-61.
Middlemiss C (2021) Brucella canis in dogs in the UK. Vet Rec 188: 155.
Pickerill PA, Carmichael LE (1972) Canine brucellosis: control programs in commercial kennels and effect on reproduction. J Am Vet Med Assoc 160: 1607-1615.
Reynes E, López G, Ayala SM, Hunter GC, Lucero NE (2012) Monitoring infected dogs after a canine brucellosis outbreak. Comp Immunol Microbiol Infect Dis 35: 533-537.
Santos RL, Souza TD, Mol JP, Eckstein C, Paíxão TA (2021) Canine Brucellosis: An Update. Front Vet Sci 8: 594291.
van Dijk MA, Engelsma MY, Visser VX, Keur I, Holtslag ME, Willems N, Meij BP, Willemsen PT, Wagenaar JA, Roest HI, Broens EM (2016) Transboundary Spread of Brucella canis through Import of Infected Dogs, the Netherlands, November 2016-December 2018. Emerg Infect Dis 27: 1783-1788.
Weese JS, Hrinivich K, Anderson ME (2020) Brucella canis in Commercial Dog Breeding Kennels, Ontario, Canada. Emerg Infect Dis 26: 3079- 3080.
Go to article

Authors and Affiliations

M. Tymczak
1
B. Favi
2
M. Beccaglia
3
M.C. Pisu
4
V. Tarducci
5
M.P. Franciosini
1
M.L. Marenzoni
1

  1. Department of Veterinary Medicine, University of Perugia, Perugia, 06124, Italy
  2. Servizio di Sanità Animale, ASL 1 Umbria, Perugia, 06126, Italy
  3. Private practitioner, Ambulatorio Veterinario Beccaglia, Lissone, Monza-Brianza, 20851, Italy
  4. Private practitioner, Centro di Referenza Veterinario, Torino, 10138, Italy
  5. Private practitioner, Ambulatorio Veterinario Le Coccinelle, Mogliano, Macerata, 62010, Italy
Download PDF Download RIS Download Bibtex

Abstract

The structural concept of the dome dates back to the Pantheon in Rome. It is used as the cover of many churches and mosques all around the world. Light solutions, with a well-visible dome-shaped truss skeleton, are often preferred in modern architecture. Base isolation techniques can be adopted to mitigate the seismic effects. This paper aims to investigate the efficiency of different designs for the truss skeleton. To solve the problem, one has to assign the constraints, the materials and the geometry of the dome, its supporting structure and the isolation devices (number, locations, and type). The screening of the effects of different scheme assumptions on structural behaviour provides a better insight into the problem.
Go to article

Authors and Affiliations

Sara Casciati
1
ORCID: ORCID

  1. SIART srl, Pavia, Italy
Download PDF Download RIS Download Bibtex

Abstract

Idea to travel faster and faster is as old as human civilization. Different ways were used to move from point to point over centuries. The railways, cars, air-plains and rockets were invented. Each of them have limitations and advantages. Therefore, people always look for other, better solutions. One of them is “vacuum rail” moving inside a tube, known also as a Hyperloop. The number of problems to be solved is extremely high. This paper is devoted to civil engineering problems only e.g. viaducts, tunnels, stations. It is necessary to consider the kind of sub- and superstructure supporting the tube, influence of changes of ambient temperature and solar radiation, the way to ensure safety and structural integrity of the structures in case of fire, decompression of a structural tube and air-tightening, occurrence of accidents etc. Taking into account the fact that bridge and tunnel standards do not include information relating to above mentioned problems it is interesting to determine rules for design, construction and maintenance of such structures.
Go to article

Bibliography

[1] Z. Malecha, P. Krukowski, P. Pyrka, K. Skrzynecki, P. Prycinski, M. Palka, Analysis of technological rediness transportation system using high speed vehicles in limited space with reducted air preassure. Report for National research and Development Centre – Poland, 06.2018 (in Polish).
[2] M. Pawlik, M. Kycko, K. Zakrzewski, “Hyperloop vehicles spacing control challenges and possible solutions”, Archives of Civil Engineering, 2021, vol. 67, no. 2, pp. 261–274, DOI: 10.24425/ace.2021.137167.
[3] J. Piechna, Report on Conceptual Design of Hyperloop, internal material,Warsaw University of Technology, Poland, 2020 (in Polish).
[4] K. Polak, “Hyperloop technology and perspective of implementation”, Prace Instytutu Kolejnictwa, 2017, vol. 156, pp. 28–32 (in Polish).
[5] M. Rudowski, “Intermodal Transport of Hyperloop Capsules – Concept, Requirements, Benefits”, Problemy Kolejnictwa (Railway Reports), 2018, vol. 62, no. 178, pp. 55–62.
[6] R. Sabarinath, “Warsaw Hyperloop Station – Technical Challenges and Opportunities Overview”, MSc. Diploma, Warsaw University of Technology, Poland, 2020.
[7] K. Trzonski, A. Ostenda, “High speed railways – technical and social aspects – Hyperloop One”, Nowoczesne Budownictwo Inzynieryjne, 2017, no.6, pp. 86–90 (in Polish).
[8] J. Tamarit, Evacuated Tube Transportation. Sponsored by CEN/CENELEC, NEN, UNE, 12.2018.
[9] Report “Potential for the development and implementation of the vacuum rail technology in Poland in the social, technical, economic and legal context”, GOSPOSTRATEG, September 2020.
[10] Hyperloop – International Development Overview, Prepared by HARDT, HYPER POLAND, TRANSPOD, ZELEROS, 10.2018.
[11] Hyperloop Alpha by SpaceX, 2017.
Go to article

Authors and Affiliations

Henryk Zobel
1
ORCID: ORCID
Anna Pawlak
2
Marek Pawlik
3
ORCID: ORCID
Piotr Żółtowski
2
Radosław Czubacki
1
Thakaa Al-Khafaji
1
ORCID: ORCID

  1. Warsaw University of Technology, Faculty of Civil Engineering, Al. Armii Ludowej 16, 00-637 Warsaw, Poland
  2. YLE Inzynierowie Co., Warsaw, Poland
  3. Railways Institute, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

An advanced evaluation technique, helpful in the fire resistance assessment of a simple steel structure exposed to fire is presented and discussed in detail on the example of an unrestrained and uniformly heated steel beam. The proposed design methodology deals with the generalised probability-based approach in which the most probable failure point is formally identified. The random nature of all variables considered in the detailed analysis is taken into account. The critical temperature of the steel from which the considered beam is made of is accepted here as the authoritative safety measure. This temperature value is associated with the fire resistance limit state defined for the maximum acceptable value of failure probability. When forecasting the failure probability, not only the risk of a potential fire being initiated but also not being effectively extinguished is included in the calculation. Various levels of the target failure probability may be assumed in such the analysis, depending on the selected reliability class. They are specified in general by setting an appropriate value of the required reliability index β fire req. In the presented design algorithm no representative values of the considered random variables are specified. The critical temperature estimates obtained from these calculations are always less restrictive in comparison with the corresponding solutions computed after applying the conventional standard procedure.

Go to article

Authors and Affiliations

Mariusz Maślak
ORCID: ORCID
Download PDF Download RIS Download Bibtex

Abstract

The study involved experimental work implemented from April 2014 until March 2017. Its purpose was to observe grape production quality parameters, such as yield, water productivity, berry size and bio-mass. Different irrigation methods, such as drip irrigation (DI), drip irrigation with plastic mulching (DIPM), drip irrigation with organic mulching (DIOM), subsur-face irrigation with stone column (SISC), subsurface irrigation with mud pot (SIMP), and subsurface irrigation with plastic bottles (SIPB) have been used during the experimental work. The crop has been irrigated following the CROPWAT-8.0 model developed by the FAO. Climate parameters are obtained from the automatic weather station located near the experi-mental field. Based on experimental results and analyses, it has been observed that the drip irrigation with the plastic mulching method is the best for irrigation in terms of the grape yield comparing with all other methods due to its highest productivity of 35–40%. Subsurface irrigation with the plastic bottle method is found to be suitable as it gives 20% higher yield than the traditional drip irrigation method. The SIPB method shows the cost-benefit ratio of 112.3, whereas the DIPM method had the ratio of 36.6. Based on the cost-benefit analysis, it is concluded that the SIPB method is economically more viable as compared with all other methods. Hence, based on the findings, it is recommended to use drip irrigation with a plastic mulch-ing and drip irrigation with a plastic bottle as the best options to achieve grape productivity while using minimum water.
Go to article

Authors and Affiliations

Sharad J. Kadbhane
1
ORCID: ORCID
Vivek L. Manekar
2
ORCID: ORCID

  1. Savitribai Phule Pune University, NDMVPS KBT College of Engineering, Nashik, Udoji Maratha Boarding Campus, 422013, Nashik, India
  2. Sardar Vallabhbhai National Institute of Technology, Surat, Gujarat, India
Download PDF Download RIS Download Bibtex

Abstract

Improper planning of inventory will affect the factory operating costs, building costs, the cost of loss, and the cost of product defects due to being stored for too long which will eventually become a loss. This research discusses the processing industry which is experiencing lumpy demand. In carrying out the production process, the company has never made plans for future demand, resulting in a waste of message costs due to repeated orders of raw materials ordered to suppliers. This paper contributes to overcoming this issue by simulating future demand by using the Material Requirement Planning (MRP) method with a probabilistic Economic Order Quantity (EOQ) and Periodic Order Quantity (POQ) model. The demand in the coming period is determined using the Autoregressive Integrated Moving Average (ARIMA) method, and an aggregate plan is carried out to determine the regular cost of raw material production and optimal subcontracting. The final analysis states that the calculation of MRP on the selected items using POQ produces the lowest cost for planning S45C-F, SGT-R, and SKD11-R, while SLD-R uses the probabilistic EOQ method.
Go to article

Authors and Affiliations

Filscha Nurprihatin
1
Glisina Dwinoor Rembulan
2
Yohanes Dwi Pratama
2

  1. Department of Industrial Engineering, Sampoerna University, Indonesia
  2. Department of Industrial Engineering, Universitas Bunda Mulia, Indonesia
Download PDF Download RIS Download Bibtex

Abstract

The paper presents pursuits of the truth in building materials engineering. Some definitions of “what truth is” were presented. Partial truths were specified: the truth of scientific reasoning, the truth of scientific assessment, the truth of development directions and the splendour of scientific truth. All categories are addressed to the building materials engineering. In the chapter “Load capacity and stability vs entropy” definitions of entropy and exergy were presented followed by their influence on building construction, illustrated by the “Seneca cliff” and “Energy pyramid”. Chapter 3 presents the truth of scientific reasoning was presented. Three partial truths were indicated: the truth of experimental fact, the truth of scientific reasoning and the truth of scientific presentation. In the chapter “Truth of scientific assessment” two main assessment methods were presented: peer review and a bibliometric parametric assessment as well as their impact on the results and authors. The risks associated with the sole parametric assessment were shown as the two basic factors of a parametric assessment – citation number and Hirsch index – need time to "mature". Additionally, the influence of digitalisation of the assessment of a scientist and a scientific unit on the commoditisation and dehumanisation of science was outlined. In the chapter “Truth of development directions: defined past – fuzzy future” the megatrends observed in technology in the last few decades years were indicated along with new possible trends. Milestones in the development of C-PCs (Concrete-Polymer Composites) were presented. The new paradigm for the new development cycle was proposed.

Go to article

Authors and Affiliations

Lech Czarnecki
Download PDF Download RIS Download Bibtex

Abstract

To survive in the competitive challenges, the products have to be designed to meet the needs and requirements of customers, differ from the competitors, and be friendly with the environment. This research was to propose an innovative design approach for charcoal briquette packaging design to meet the customer requirements. The customer requirements were explored and translated to product characteristics by using quality function deployment. The customers’ perceptions to product visual forms were explored through the emotional design approach. Customers’ requirements and customer perceptions were integrated to create a new charcoal briquette packaging. A new packaging design and process during its life cycle was evaluated an impact on the environment through carbon footprint values. The result showed that the innovative design approach can be used to guide designer design the charcoal briquette packaging to meet the requirements and perceptions of customers, illustrate the product identity and be friendly with the environment.
Go to article

Authors and Affiliations

Pilada Wangphanich
1
Nattapong Kongprasert
1

  1. Department of Industrial Engineering, Faculty of Engineering, Srinakharinwirot University, Thailand

This page uses 'cookies'. Learn more