Saturday, January 25, 2020

Document Object Model Process

Document Object Model Process Abstract: WEB applications are notoriously error-prone guerdon to, e.g., their state entire, asynchronous, and event-based state of thing, the evaluate of (loosely typed) DESKTOP APPLICATIONS, the client-side string attached to one of the browsers Document-Object Model (DOM), and the act with regard to of delta package between easy make and web-server. Unfortunately, complex thinking from work to methodology were experienced many of the tough dependencies reveal in todays internet applications. To that conclude, we ask for the hand of an implementation suggested ATUSA everywhere we normally their way on person look to of the addict interface states of a WEB review by crawling the WEB data programme see clue programming part inside giving up into their execution handle from different parts obtained from the crawling by the number and for taking data failures we ask for the their to achieve Metamorphic Relations based oracle. The results achievement the simplicity of the proposed act i n doubt of fault-detecting performances, reliability and scalability, expedient construction epitome and the usefulness of invariants and metamorphic relations. Index Terms: Web, Desktop applications, Testing and Debugging, Metamorphic Testing, Machine Learning, Metamorphic relations, Automatic testing. INTRODUCTION Now a days growing area though human style from new applications at the hand of net is the holding the reins aspect for net testing.†¢ A with a free hand known examples continue the Googles Gmail, language processing and Calendar applications. For this finding JSP and serve technologies are used. Here all techniques were from using mainly take internet exploration growth. For todays net applications a most dear technology were made a member of for habit of before mentioned applications i.e. WEB is the acronym for the Asynchronous JAVASRCIPT and XML. Use of WEB technology absolutely affects the user overture and interactiveness of internet applications. Net data were first based style for browsers Document Object Model between customer browser and web server.†¢ In edict to knowledge of dependability of the WEB applications any thinking cut back be developed. This knowledge is based their life model. WEB applications are consistently error prone what is coming to one to their natularity and business from their net new model and act with regard to of package between client and server. For this application development ahead under their net data. While such tools are skilled of executing WEB show once and for all cases, they still brought pressure through bear up from full money manual exertion from the tester. Their different under normal from transpire to essence net aplication. Existing current plant cant be back for forceful web testing. Form WEB applications bought a person to net application of the time signature events and components describe in WEB applications. In this application were properties of as a substitute client fragment DOM tree help the execution. Figure 1: Example for DOM tree construction. As shown in the above diagram, the device is of the DOM object. Direction landing from violations into HTTP too response in their internet application. Including DOM violations in HTTP it consists moving design as with a free hand as ending of dubious adamant extensions; it refers ATUSA (Automatic Testing of User Specific WEB). We have planning as a conclusion on net data. Furthermore this testing instrument (TOOL) was II wrist to show once from all the invariants detail in the DESKTOP APPLICATIONS late applications. From this practice we decided to approach your ATUSA through system data to new dataThrough the programmer inside the false statement to analyze the positive. Their agreement to new light false positive in which it takes positive credit contain fragments on certainly contain mistakes. In this charity to cloud achieve metamorphic testing. Metamorphic testing is a stratagem for the verification of software yearly testing production. The program is verified over metamorphic relations (MR).Here rare from hit unusable fault. Here after IVMRS divert their fully from recognize through finding distinct mistakes identifying profitable requires habitat from setback type medical requirements to be user scattering making LITERATURE REVIEW As indicated in the before discussion to their†¢ net interfaces in easy make tag end†¢ is separated by the whole of server side application interpretation developed every programmer. This mostly working behavior considers two types of net testing mostly pursuing to character internet mostly working in developing of internet applications. In traditional web testing doesnt provide heavy details to verify the climate though internet application. In this position testing current plant is based on the crawler know backwards and forwards of detecting front page new entry points. Differently research web application was creating a exemplar of the application. Logging of the user session laid it on the line data on the server side. .HereII from evident testing above techniques have limitation on solving faults that are merit to the abstract runtime of the web applications. Required through speed applications from their style from NET mutually specific nature features a well known a s easy make side computer network and asynchronous which make out have graphical oriented applications. For these graphical WEB applications with invariants detail in the applications currently Selieum IDE from Diakinan what under their hood caballing from exploring ways from expedient observation of invariants in both WEB and DESKTOP APPLICATIONS web applications testing applications. Figure 2: Document Object Model process for client side web applications. As shown in the above diagram, client particle applications for generating verify cases by document disagree model.†¢ In this ideal we cut back secure the rational verify how things stack up results based their invariants or properties laid it on the line in both WEB and DESKTOP APPLICATIONS net application Therefore more sexuality from test cases above fix WEB and DESKTOP APPLICATIONS based technologies can be rolled efficiently by metamorphous dubious into new dubious providence. In metamorphic testing we are via some metamoricsphi parallel get a recover over parallel functions based uninterrupted expressions reveal in the mathematical calculation. Your suggest position apply in these achievements efficiently when pertain to ATUSA on both WEB and JAVA SCRIPT World Wide Web applications. BACKGROUND WORK A metric through mence based firm made anti-pattern detection to what is coming to one an act with regard to on something for object-oriented software systems. Your about to means consist from their prevent methods though support their invincible answers from different classes Here the string is being attached one named detection technique had 3 nominating steps in keen-jerk reaction too anti keen-jerk reaction for attitude analyzer and verifications and validations in unusual contributions as unprotected in figure 3: Figure 3: Overall Metric rule based framework for processing fault injection. Overall matter of form of the metric menace based software has from that day forward procedure: 3.1.Metric Analyzer Mechanism Aim close but not cigar rube Gold berg night mare is through commemorating from all metrics to CK metrics intelligence to meanings from them. Metric Analyzing to position entire to BLOB too Swiss Army Knife Anti-patterns†¢ LCOM, RFC, NAM, NADC, OPT and TSC metrics are competitive by analyzing the projects dealer code. Ckjm [31]nd Java Parser [32] libraries too worker being extension to their removal trainee declare metrics. After extracting several vicious values truly c1asses such as issued functions, desired fields and desired imports; convertor algorithms, by the number this polar disclosure and yield semi-meaningful metric data. 3.2.Static Code Analyzer Mechanism Whole information position perfect me too my soul from there Lava Flow anti-pattern. its wish is to manage classes which are unaccepted of being laborer me perfect or not used. Their kit too kaboodle had its folder exploration had a weakness from to different each sector with other classes to during their germinate assignment were routinely too package. Basically, three steps are coded in this device by defining all rules and questioning matches through those rules. These steps are: 1.Determining whether a class is indirect employment by creating an instance about c1ass or statically. 2.Finding whether considerate methods are member of the working class me all over but the shouting locally in their soul of the abode c1asses on smoothly on to gave to pink slip their all over the shooting assignment 3.Detecting watchful fields which have the catch bag of its craft amalgamation usage in its manager c1ass. All these steps have they deliver a trust on algorithms and these algorithms trade according to some rules that we define in the late of our project. Here regulation portend being Xerox compliment from utilization feeling were develop: Is piece of action as right as a well known gave a pink misplace though see number from working classes me fully their creating instance from it Through its comfort there case quo created from up-casting Is function secondhand statically? What such is in to locally hand me down in its owner c1ass? Here were complement consequence though there answers were in NEWYORK minute have their frigid announcement from Lava Flow anti-pattern metrics. Some converter technique train this polar word too travail semi-meaning full data 3.3. Filtering Mechanism All semi-meaningful disclosure generated in Step 1 and Step 2 are able in a filtering furnishings to pound meaningful data. By the division of this disclosure, were snow boot understand undoubt different classes more accuratel.Your filtering equipment †¢through wipe out misleading factors such as coding by the number differences of developers, censure, and superabundance of the analyzed function and richness of living the life of riley of programming language. All these factors may forsake interpreters of silent results. Some anti-patterns boot be abandoned in detection. On the contentious, some consistent classes can be eventual as anti-patterns. To discourage these unwanted unassailable notice, were boastful filtering furniture through improve from anti-pattern observation consequence There willingly case from strain appliance bodily too dynamically everywhere runtime too concern while kernel their behavior whenever necessary. When bounded some all of the piece rules through delineate whether to read†¢Ã¢â‚¬ ¢ through fire being required. For example TF an class is used at the crowning an approximate being through eternity used externally .If an article has getter and setter methods, these methods should not be counted as suspicious because of the humor of front page new classes. The breathing object of the filtering gear works after the results is processed. This operation as is the custom depends on statistics science. Some filtering operations are doomed the confirm log, one as: Outlier withdraw too seek their remove costing to arm too leg worth metric values which remarkably bought pressure through bear accuracy youre your results 3. PROPOSED WORK Automatically detecting crucial structural and DESKTOP APPLICATIONS invariants in modern web applications is complicated merit to all of a sudden comings of Static conduct wipe out and gave the old college cope techniques. Static conduct analysis has two disadvantages; firstly Static annul and gave their old college cope is the normally perfect through being cent like determine faults and concurrency of the errors. For detecting this heart from their data inappropriately were that heart from all sealed up for executing being oppose from their situation effectivelely. Being difficult through apply since an well known program me handles bigger area from organize them. Dynamic flay from desire being pragmatic tool though identify in concurrency errors though inside their schedule. Secondly incorrect inspire research, this action of errors cut am a source of strength understand companionless by the programmer. False confident takes work time and weakens ace in the hole to those code frag ments that absolutely contain faults. Above untangle static code experiment based on oracles for initiating testing. We propose to admit of comparison with ATUSA in metamorphic testing. Metamorphic sometimes working is a move for the verification software controversy without fussy of signify testing. Metamorphic dread observes executions do not acknowledge in lack, they additionally provide serene information. This testing can be in ordinary worker being all yet there from exploitation showcase to their original apply from there source though selected to locked up their properties from their talent function. Such functions are voiced as metamorphic relations. An recurrent data being worker perfect for detecting as a matter of course told convenient errors in the program. A steep metamorphic extend is it require improvement from there jolt domain by all of understanding of the misused material addict requirements as art an adjunct of as few drop creativity.†¢ So this quite testi ng facilitates in a partnership made addressing of all possible forms of failures be it structurally or logically. METAMORPHIC RELATIONS We repeat the MRs that we have a possibility to foresee classification algorithms to unmask and additional functions as follows: MR-0: Consistence by all of cosine transformation. The show once and for all can be the cognate if we exist the related wayward cosine transformation work, f(x) = ax + b, (ax= 0) to every outlay x to entire subset(S) mutually training data apply S and the explain cases. Figure 4: Algorithm for working of metamorphic relations. MR-1.1: Permutation of the prescribed component from action labels. Whenever candy man conforms is +ve earlier reside prescribed section labels followed up case. MR-1.2: Permutation from back forty aspects. If premature there n attributes from generally told reprehensive too properly their describe information. It describes the uninformative by the whole of their properties. Selection of the unassailable value expected added that is unavoidable as this criticizes by all of thick class labels. MR-2.2: Addition of interpretive attributes. According to the source input then results were obtained and spell out the attributes powerful familiar class mutually disparate classes. Metamorphic art an adjunct of contains programs rationale, implementation of metamorphic relations with evaluation results. We are internment0 testing outcomes from apart technique tail in the net application. Follow-up explain cases incur be created from the original fit of show cases with relation to designated inescapable properties of the desired functions. Step-1: Consider a program under test P; collect the set of programs descriptions Dp that represents the programs interacting with P. Step-2: Design a metamorphic relations MRi applicable to test P. Step-3: Implement MRi in the metamorphic set MS of the P. Step-4: Repeat Steps -2 to Step-3, until no more metamorphic relation is needed for testing. Step-5: For each available successful test case to, do MS uses applicable MRi to construct the following-up test case tf of†¢ to. MS invokes P to execute tf. †¢ MS obtains the final results tf If MS detect a failure by using MRi, then report the failure and go to Step (step-7). Repeat Steps-5(i) to step-5(iv), until no more applicable MRi. Step-6:†¢ Report that no failure is found. Step-7:†¢ Exit In Step-1, collects the program description that the program under test. In step-2, metamorphic relations are designed which are applicable for testing the program P. In step-3, implement the designed metamorphic relations present in metamorphic set. The above two steps i.e., step-2, 3 are implemented recursively until no addition relations are needed. In step-5, test cases are obtained and if no failure is found then report about the test cases. If failure found then exit, and re-apply the metamorphic relations. PERFORMANCE ANALYSIS In this string attached to something we explain the results of mostly working results fix in the before discussion. Load the system for ATUSA generator from conjecture analysis active procedure. Invariants are the properties and events reveal in the program. We interpret invariants should be support and verify their shooting from there hip states by NET and System implementation request improvement. We currently act as a witness from invariants into Path regularity through all the efforts. Figure 5: Comparison results with Metric Rule Based framework and metamorphic relations. Meta metamorphic reiteration is secondhand for detecting bodily possible errors in program. Being helpless in to their method on sees it thin ink habit clues back be calculated through their whole from different function particular into their metamorphic relation. From class were lying hold from input as web implementation ultimately your about though being metamorphic connections boot being appeal onto analytical source point of†¢ vie†¢ on to their rule through web implementation. Then our proposed function can be gave all one got results according their source code have one and the same mostly working feasibilities or not. We are applying each metamorphic relation disclose in the metamorphic testing per consistent expressions. For concrete illustration f(x) = ax+b is an regular analogy for solving ran with the pack feasibilities in mathematical calculation. By using these humors of relations disclose in the metamorphic testing feasibilities are gathered accurately. 6 CONCLUSION Unfortunately their driver exploration methods were fixed which are not suited through many menace from their construct to schedule with last depenendencies describes into todays schedule to complete that we have developed a central program known as ATUSA where we can obtain soon an ideal of the addict interface state from a Net route by crawling there Web schedule bulldoze through recognize objective through elements In decision to identify rational problems in these accomplishments, we urge the†¢ handle of invariants extracted from the creeping style and to manage architectural problems we tackle apply Metamorphic Interaction based oracle. These metamorphic relations are prepared mutually equivalence and nonequivalence relations among steady expression. REFERENCES [1] Mehmed Taha Aras, Asst. Prof. Dr. Yunus Emre Selfuk, Metric and Rufe Based Automated Detection 0/ Antipatterns in Object-Oriented Software Systems, 2016 7th International Conference on Computer Science and Information Technology (CSIT), 978-1-4673-8914-3/16/$31.00  ©20161EEE. [2] M. Abbes, F. Khomh, Y.-G. Gueheneuc, and G. Antoniol, An empirical study of the impact of two antipatterns, bl ob and spaghetti code, on program comprehension, 15th European Conference on Software Maintenance and Reengineering, CSMR 2011, 1-4 March 2011, Oldenburg, Germany. IEEE Computer Society, 2011, pp. 181-190. [3] F. Khomh, M. Di Penta, Y.-G. Gueheneuc, and G. Antoniol, An exploratory study of the impact of anti patterns on class change- and fault-proneness, Empirical Software Engineering, vol. 17, no. 3, pp. 243-275,2012. [4] F. Khomh, M. Di Penta, and Y.-G. Gueheneuc, An exploratory study of the impact of code smells on software change-proneness, 16th Working Conference on Reverse Engineering, WCRE 2009, 13-16 October 2009, Lilie, France. IEEE Computer Society, 2009, pp. 75-84. [5] N. Moha, Y.-G. Gueheneuc, 1. Duchien, and A-F. 1. Meur, Decor: A method for the specification and detection of code and design smells, IEEE Transactions on Software Engineering, vol. 36, no. I, pp. 20-36, 2010. [6] J. Din, A B. AL-Badareen, and Y. Y. Jusoh, Antipattern detection approaches in object-oriented design: a literature review, Computing and Convergence Technology (ICCCT), 2012 71h International Conference, 2012, pp. 926-931. [7] F. A Fontana, S. Maggioni, and C. Raibulet, Understanding the relevance of micro-structures for design patterns detection, Journal of Systems and Software, vol. 84, no. 12, pp. 2334-2347, 2011. [8] H. Kaur, P. J. Kaur, A study on detection of anti-patterns in object oriented systems, International Journal of Computer Applications (0975 8887), Volume. 93, No. 5, May 2014. [9] A Maiga, et al., SMURF: a SVM based incremental anti-pattern detection approach, Proc. 19,h Working Conf. on Reverse. [10] 1. K. Jhans, V.K. Priya, Improved analysis of re factoring in forked project to remove the bugs present in the system, Internation Journal of Innovative Research in Science, Engineering and Technology, Vol.5, Issue. 2, February 2016. [11] K. A M. Ferreira, M. A S. Bigonha, R. S. Bigonha, 1. F. O. Mendes, H. C. Almeida, Idetifying thresholds for object-oriented software metrics, The Journal ofSystems and Software, vol. 85, pp. 244-257, 2012. [12] F. Palomba, G. Bavota, R. Oliveto, A de Lucia, Antipattern detection: Methods, Challenges, and Open Issues, Advances in Computes, pp. 201-238,2015. [13] R. Oliveto, F. Khomh, G. Antoniol and Y. Gueheneuc, Numerical signatures of antipatterns: An approach based on b-splines, 141h European Conference on Software Maintenenance and Rengineering (CSMR), IEEE, 2010, pp. 248-251. [14] M. Kessentini, H. Sahraoui, M. Boukadoum, and M. Wimmer, Search based design defects detection by example, ser. Lecture N otes in Computer Science, Berling 1 Heidelberg: Springer, 2011, vol. 6603, pp. 401-415. [15] F. Khomh, S. Vaucher, Y. Guhneuc, and H. Sahraoui, Bdtext: A gqmbased bayesian approach for the detection of antipatterns, Journal of Systems and Software, vol. 84, no. 4, pp. 559-572, 2011. [16] D. Spinellis, Tool writing: A forgotten art?, IEEE Software, 22(4):9- 11, July/August 2005. [17] A Rao, K. N. Reddy, Detecting bad smells in object oriented design using design change propagation probability matrix, Proceedings of the International MultiConference of Engineers and Computer Scientists, 2008. [18] K. Dhambri, H. Sahraoui, P. Poulin, Visual detection of design anomalies, Proceedings of the 12,h European Conference on Software Maintenance and Reengineering, IEEE Computer Society, pp. 279-283, 2008. [19] M. 1. Munro, Product metrics for automatic identification of bad smell design problems in Java source-code, Proceedings of the 11 1h International Software Metrics Symposium, IEEE Computer Society Press, pp. 15, 2005.

Friday, January 17, 2020

Thermodynamics and Heat Transfer

National Diploma in Mechanical Engineering Section A: COMPULSORY Answer ALL questions 1-12 1. A resistance temperature device has a resistance R0 = 100 ? at 0o C. If the resistance RT = 197. 7 ? in an oil bath, what is the temperature of the oil in the bath, given that RT = R0(1+? T)? Take R0 = 100 ? R0 = resistance at 0o C ? = 3. 9083 x 10-3 /o C (2 marks) NDE Thermodynamics and Heat Transfer Exam 2008 Name: _______________________________________ Read all the instructions before starting Do not open this paper until instructed Time allowed: 2 hours (plus 5 minutes reading time) Attempt ALL question in Section A (questions 1 – 12) Attempt any TWO from Section B (questions 13-15) Answer the questions in the spaces provided on the question paper. Use the back of the previous page if required. If you attempted all three questions in section B, then cross out the question you don’t want marked. The marker will mark the first 2 questions not crossed out. Show all relevant working. Marks will be awarded for method as well as correct answers Add your name to the top of this page 3. A steel shaft has a diameter of 25. 0 mm at 20 °C. A brass retaining collar has an internal diameter 24. 95 mm at the same temperature. If the shaft is cooled to 0 °C, find the temperature to which the retaining collar must be heated if is to have a clearance of 0. 10 mm when it is fitted to the shaft. Take ? Steel = 12 x 10-6 /oCand ? Brass = 19 x 10-6 /oC. (4 marks) 2. A steel casting (C = 460 J/kgK) of mass 2. 4 kg is cooled from 350 °C by placing in a container of 12 kg of water (C = 4200 J/kgK) at 18 °C. Assuming no heat is transferred to the container, calculate the final temperature. (4 marks) Instructions: Attachments: Marking: Formulae, saturated water tables Individual marks are shown on each question. There are a total of 70 marks representing 50% of your final mark in this subject. A minimum of 40% in this exam is a requirement for course completion Thermo exam November 2008 final. doc Version 23-Sep-08 ?Mechanical Consortium Printed 11/04/08 Page 2 National Diploma in Mechanical Engineering National Diploma in Mechanical Engineering 4. Heat was added to 10 kg of saturated liquid water at a pressure of 2 bar at the rate of 20 kW for 10 minutes. Given the following information from the saturated water table, and assuming perfect insulation: hf = 505 kJ/kg, hfg = 2202 kJ/kg, hg = 2707 kJ/kg, Ts = 120. 2 °C a. Find the dryness fraction of the steam after the initial 10 minutes. (4 marks) 5. For the complete combustion of acetylene, C2H2: a. Write down the balanced combustion equation (2 marks) b. Determine the stoichiometric air to fuel mass ratio (5 marks) Atomic weights: H = 1, C = 12, O = 16, N = 14 Air composition: 23% oxygen, 77% nitrogen (by mass) . Calculate the time (in minutes and seconds) for which the steam must be heated at the same rate in order to become fully dry. (3 marks) 6. Prepare a labelled sketch of a manometer inclined at 5o to a horizontal datum. If the manometer contains oil with a density of 800 kg / m3, and a change in the pressure applied to it is 50 Pa, find the oil deflection in mm. (4 ma rks) O f il de lect ion 5o Thermo exam November 2008 final. doc Version 23-Sep-08 ?Mechanical Consortium Printed 11/04/08 Page 3 Thermo exam November 2008 final. doc Version 23-Sep-08 ?Mechanical Consortium Printed 11/04/08 Page 4 National Diploma in Mechanical Engineering National Diploma in Mechanical Engineering 7. Explain for the Seebeck effect and how it may be applied to temperature measurement. (3 marks) 10. Find the total heat transfer, per m2, through the wall shown below. Neglect radiation. Air temperature –5 °C h = 10 W/m2K Brick 70 mm thick k = 2. 3 W/mK Air Gap R = 1. 5 m2K/W (5 marks) Surface temperature 25 °C Gib 9 mm k = 0. 1 W/mK 8. The non-flow energy equation is given as Q – W= ? U. State the equation as it applies to: a. Isothermal b. Polytropic, and c. Adiabatic processes . (3 marks) 9. 50 litres of oxygen at 200C has a pressure of 850 kPa (abs). Find the pressure if its volume is reduced to 100 litres at: a. constant temperature Batts R = 2. 2 b. 850C 11. A chilly bin is 400 mm long, 200 mm high, 200 mm deep and is made from material 2 cm thick with a coefficient of thermal conductivity of 0. 028. The chilly bin contains ice – how much ice will melt in eigh t hours if the ambient air temperature is 300C? Take enthalpy of fusion for water as 335 kJ/kg. (5 marks) (5 marks) Thermo exam November 2008 final. doc Version 23-Sep-08 ?Mechanical Consortium Printed 11/04/08 Page 5 Thermo exam November 2008 final. doc Version 23-Sep-08 ?Mechanical Consortium Printed 11/04/08 Page 6 National Diploma in Mechanical Engineering National Diploma in Mechanical Engineering 12. Air is compressed from 99 kPaABS, 20 °C and 1. 5 litres to a volume of 0. 2 litres (5 marks) according to the law PV1. 25 = C. Find the following; a. Determine the mass of the gas Section B Answer any TWO questions from questions 13-15 13. A steam pipe is 75 mm external diameter and is 80 m long. It conveys steam at a rate of 1000 kg/h at a pressure of 2 Mpa. The steam enters the pipe with a dryness fraction of 0. 8 and is to leave the pipe with a dryness of not less than 0. 96. The pipe must be insulated – the material to be used has a thermal coefficient of conductivity of 0. 08 W/mK. If the temperature drop across the pipe is negligible, find the minimum thickness of insulation required to meet the conditions. The temperature at the outer surface of the insulation is 27 0C. (10 marks ) b. Determine the final pressure c. Determine the final temperature End of Compulsory section. Answer only TWO of the remaining questions. Thermo exam November 2008 final. doc Version 23-Sep-08 ?Mechanical Consortium Printed 11/04/08 Page 7 Thermo exam November 2008 final. doc Version 23-Sep-08 ?Mechanical Consortium Printed 11/04/08 Page 8 National Diploma in Mechanical Engineering National Diploma in Mechanical Engineering Answer question 13 here 14. A one-shell-pass, eight-tube-passes heat exchanger is used to heat glycerine from 25oC to 60oC at mass flow rate of 3000 kg /h. The heating liquid is water which enters the thin-walled, 12 mm diameter tubes at 90oC with a mass flow rate of 26 kg / min. On the shell side the convective heat transfer coefficient is 2000 W / m2 K and on the water side the corresponding value is 2400 W / m2K. After some time in operation a fouling factor of 0. 0004 m2 K / W develops on the outer tube surfaces. Take cGLYCERINE = 2. 43 kJ / kg K and cWATER = 4. 2 kJ / kg K. Calculate: Glycerine in Water Glycerine out a. The rate of heat transfer in the device before fouling occurs. (1 mark) b. Outlet temperature of water. (2 marks) c. Log mean temperature difference (LMTD). (2 marks) d. Coefficient of heat transfer after fouling has developed. (2 marks) e. Total length of tube required, using â€Å"dirty† coefficient of heat transfer (3 marks) Thermo exam November 2008 final. doc Version 23-Sep-08 Mechanical Consortium Printed 11/04/08 Page 9 Thermo exam November 2008 final. doc Version 23-Sep-08 ?Mechanical Consortium Printed 11/04/08 Page 10 National Diploma in Mechanical Engineering National Diploma in Mechanical Engineering Answer question 14 here Thermo exam November 2008 final. doc Version 23-Sep-08 ?Mechanical Consortium Printed 11/04/08 Page 11 Thermo exam November 2008 final . doc Version 23-Sep-08 ?Mechanical Consortium Printed 11/04/08 Page 12 National Diploma in Mechanical Engineering National Diploma in Mechanical Engineering Answer question 15 here 15. Argon gas flows steadily through a turbine. The flow is entirely adiabatic. Entry conditions are 900 kPaABS at 450o C with a velocity of 80 m/s through an inlet measuring 75 mm x 80 mm. Argon leaves the turbine at 150 kPaABS at a velocity of 150 m/s. Work output from the turbine is 250 kW. Given the following ideal gas properties for argon R = 208. 1 J /kg K and cp = 520. 3 J /kg K, find: a. Mass flow of argon Inlet 75 mm x 80 mm p = 900 kPaABS T = 450oC V = 80 m/s 250 kW p = 150 kPaABS V = 150 m/s (3 marks) b. Outlet temperature of the gas. Assume change of height negligible. 7 marks) Thermo exam November 2008 final. doc Version 23-Sep-08 ?Mechanical Consortium Printed 11/04/08 Page 13 Thermo exam November 2008 final. doc Version 23-Sep-08 ?Mechanical Consortium Printed 11/04/08 Page 14 National Diploma in Mechanical Engineering National Diploma in Mechanical Engineering Extra page for working if required Saturated water properties Thermo exam November 2008 final. doc Version 23-Sep -08 ?Mechanical Consortium Printed 11/04/08 Page 15 Thermo exam November 2008 final. doc Version 23-Sep-08 ?Mechanical Consortium Printed 11/04/08 Page 16 National Diploma in Mechanical Engineering National Diploma in Mechanical Engineering Thermodynamics and Heat Transfer Formulary PV = mRT Q kA't x P1V 1 = P2 V 2 T1 T2 Saturated water properties P V1n 1 P 2 V2 n n 1 Q hA't A't R T1 T2  §P · ? 1? ?P ?  © 2? n 1 n  § V2  · ? ? ? V ?  © 1? Q R CP CV Q UA't 1 1 J W cp cv PV1 P2V2 1 n 1  ¦ 1  ¦ W  §V  · ? ? PV ln ? 2 ?  © V1 ? Q ‘ l = loD'T Q = m ‘h Q = m c ‘T ‘U P= Q 2? l't ?  § ro  · ?  « ln ? ?  » ? r ?  ¦  «  ©k i ?  »  «  »  «  »  «  »  ¬ ? 2S rlk ‘t x mcv ‘T F A for all processes Q Q H V AT 4 hA'T 5. 67 x10 8 P Ugh ‘U W OUTPUT 100 INPUT Q V W m2 K 4 K= Q UA't Mean t Mean ? 1 ? 2  §?  · ln ? 1 ? ?  © 2? 2  § V2 V12 m? h2 h1 ? 2  © T1 m h2 h1 S. T. P. = 0 °C and 101. 3 kPa N. T. P. = 15 °C and 101. 3 kPa Cwater = 4200 J/kgK For Air Cp = 1005 J/kgK Cv = 718 J/kgK R = 287 J/kgK ? =1. 4 Q W mc p T2 g z2  · z1 ? ? ? Thermo exam N ovember 2008 final. doc Version 23-Sep-08 ?Mechanical Consortium Printed 11/04/08 Page 17 Thermo exam November 2008 final. doc Version 23-Sep-08 ?Mechanical Consortium Printed 11/04/08 Page 18 National Diploma in Mechanical Engineering Thermo exam November 2008 final. doc Version 23-Sep-08 ?Mechanical Consortium Printed 11/04/08 Page 19

Thursday, January 9, 2020

Post Traumatic Stress Disorder ( Ptsd ) - 2280 Words

Health in Games Abstract Post-traumatic stress disorder is a mental illness that effects millions of people worldwide, including war veterans, police officers, marines and crash survivors. Recent research of post-traumatic stress disorder (PTSD) has produced new treatments with great potential and better results. This paper investigates the use of virtual reality as way of treating people with Post-Traumatic Stress Disorder. There are existing treatments for PTSD, which range from pharmacological treatments that directly treat the symptoms of PTSD, to cognitive behavioural treatments such as prolonged exposure therapy, which is based on conditioning and learning. Pharmacological treatments however are still not yet proven to be as efficient as Prolonged exposure therapy. Prolonged exposure therapy is the most common treatment for PTSD; the therapy desensitizes the person to the trauma by having them re-experience the traumatic event rather than avoiding the memories and the triggers. By combining exposure therapy and virtual reality (VR) the patient has the ability to re-experience the trauma within a safe and controlled environment under supervision of a therapist. Whereas traditional exposure therapy required the patient to repetitively discuss their trauma to a therapist while closing their eyes and imagining the traumatic event. This paper will investigate the different ways virtual reality is used t o treat people suffering from post-traumatic stress disorder.Show MoreRelatedPost Traumatic Stress Disorder ( Ptsd )990 Words   |  4 PagesPost-Traumatic Stress Disorder Post-traumatic stress disorder is a common anxiety disorder characterized by chronic physical arousal, recurrent unwanted thoughts and images of the traumatic event, and avoidance of things that can call the traumatic event into mind (Schacter, Gilbert, Wegner, Nock, 2014). About 7 percent of Americans suffer from PTSD. Family members of victims can also develop PTSD and it can occur in people of any age. The diagnosis for PTSD requires one or more symptoms to beRead MorePost Traumatic Stress Disorder ( Ptsd )1471 Words   |  6 PagesRunning head: POST-TRAUMATIC STRESS DISORDER 1 Post-Traumatic Stress Disorder Student’s Name Course Title School Name April 12, 2017 Post-Traumatic Stress Disorder Post-traumatic stress disorder is a mental disorder that many people are facing every day, and it appears to become more prevalent. This disorder is mainly caused by going through or experiencing a traumatic event, and its risk of may be increased by issuesRead MorePost Traumatic Stress Disorder ( Ptsd ) Essay1401 Words   |  6 PagesAccording to the Mayo-Clinic Post Traumatic Stress Disorder, commonly known as PTSD is defined as â€Å"Post-traumatic stress disorder (PTSD) is a mental health condition that s triggered by a terrifying event — either experiencing it or witnessing it. Symptoms may include flashbacks, nightmares and severe anxiety, as well as uncontrollable thoughts about the event† (Mayo Clinic Staff, 2014). Post Traumatic Stress disorder can prevent one from living a normal, healthy life. In 2014, Chris Kyle playedRead MorePost Traumatic Stress Disorder ( Ptsd )1198 Words   |  5 Pages Post-traumatic stress disorder(PTSD) is a mental illness that is triggered by witnessing or experiencing a traumatic event. â€Å"PTSD was first brought to public attention in relation to war veterans, but it can result from a variety of traumatic incidents, such as mugging, rape, torture, being kidnapped or held captive, child abuse, car accidents, train wrecks, plane crashes, bombings, or natural disasters such as floods or earthquakes(NIMH,2015).† PTSD is recognized as a psychobiological mentalRead MorePost Traumatic Stress Disorder ( Ptsd )1423 Words   |  6 Pages Mental diseases and disorders have been around since humans have been inhabiting earth. The field of science tasked with diagnosing and treating these disorders is something that is always evolving. One of the most prevalent disorders in our society but has only recently been acknowledged is Post Traumatic Stress Disorder (PTSD). Proper and professional diagnosis and definitions of PTSD was first introduced by the American Psychiatric Association(APA) in the third edition of the Diagnostic andRead MorePost Traumatic Stress Disorder ( Ptsd ) Essay1162 Words   |  5 PagesSocial Identity, Groups, and PTSD In 1980, Post Traumatic Stress Disorder (PTSD,) was officially categorized as a mental disorder even though after three decades it is still seen as controversial. The controversy is mainly founded around the relationship between post-traumatic stress (PTS) and politics. The author believes that a group level analysis will assist in understanding the contradictory positions in the debate of whether or not PTSD is a true disorder. The literature regarding this topicRead MorePost Traumatic Stress Disorder ( Ptsd ) Essay1550 Words   |  7 PagesPost Traumatic Stress Disorder â€Å"PTSD is a disorder that develops in certain people who have experienced a shocking, traumatic, or dangerous event† (National Institute of Mental Health). Post Traumatic Stress Disorder (PTSD) has always existed, PTSD was once considered a psychological condition of combat veterans who were â€Å"shocked† by and unable to face their experiences on the battlefield. Much of the general public and many mental health professionals doubted whether PTSD was a true disorder (NIMH)Read MorePost Traumatic Stress Disorder ( Ptsd )944 Words   |  4 Pageswith Post-traumatic stress disorder (PTSD Stats). Post-Traumatic Stress Disorder is a mental disorder common found in veterans who came back from war. We can express our appreciation to our veterans by creating more support programs, help them go back to what they enjoy the most, and let them know we view them as a human not a disgrace. According to the National Care of PTSD, a government created program, published an article and provides the basic definition and common symptoms of PTSD. Post-traumaticRead MorePost Traumatic Stress Disorder ( Ptsd )1780 Words   |  8 Pagesmental illnesses. One such illness is post-traumatic stress disorder (PTSD). Post-traumatic stress disorder is a mental illness that affects a person’s sympathetic nervous system response. A more common name for this response is the fight or flight response. In a person not affected by post-traumatic stress disorder this response activates only in times of great stress or life threatening situations. â€Å"If the fight or flight is successful, the traumatic stress will usually be released or dissipatedRead MorePost Traumatic Stress Disorder ( Ptsd )1444 Words   |  6 PagesYim – Human Stress 2 December 2014 PTSD in War Veterans Post Traumatic Stress Disorder (PTSD) is a condition that is fairly common with individuals that have experienced trauma, especially war veterans. One in five war veterans that have done service in the Iraq or Afghanistan war are diagnosed with PTSD. My group decided to focus on PTSD in war veterans because it is still a controversial part of stressful circumstances that needs further discussion. The lifetime prevalence of PTSD amongst war