Search results for: B. Bergström
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6

Search results for: B. Bergström

6 Modeling and Validation of Microspheres Generation in the Modified T-Junction Device

Authors: Lei Lei, Hongbo Zhang, Donald J. Bergstrom, Bing Zhang, K. Y. Song, W. J. Zhang

Abstract:

This paper presents a model for a modified T-junction device for microspheres generation. The numerical model is developed using a commercial software package: COMSOL Multiphysics. In order to test the accuracy of the numerical model, multiple variables, such as the flow rate of cross-flow, fluid properties, structure, and geometry of the microdevice are applied. The results from the model are compared with the experimental results in the diameter of the microsphere generated. The comparison shows a good agreement. Therefore the model is useful in further optimization of the device and feedback control of microsphere generation if any.

Keywords: CFD modeling, validation, microsphere generation, modified T-junction

Procedia PDF Downloads 671
5 Key Factors for Stakeholder Engagement and Sustainable Development

Authors: Jo Rhodes, Bruce Bergstrom, Peter Lok, Vincent Cheng

Abstract:

The aim of this study is to determine key factors and processes for multinationals (MNCs) to develop an effective stakeholder engagement and sustainable development framework. A qualitative multiple-case approach was used. A triangulation method was adopted (interviews, archival documents and observations) to collect data on three global firms (MNCs). 9 senior executives were interviewed for this study (3 from each firm). An initial literature review was conducted to explore possible practices and factors (the deductive approach) to sustainable development. Interview data were analysed using Nvivo to obtain appropriate nodes and themes for the framework. A comparison of findings from interview data and themes, factors developed from the literature review and cross cases comparison were used to develop the final conceptual framework (the inductive approach). The results suggested that stakeholder engagement is a key mediator between ‘stakeholder network’ (internal and external factors) and outcomes (corporate social responsibility, social capital, shared value and sustainable development). Key internal factors such as human capital/talent, technology, culture, leadership and processes such as collaboration, knowledge sharing and co-creation of value with stakeholders were identified. These internal factors and processes must be integrated and aligned with external factors such as social, political, cultural, environment and NGOs to achieve effective stakeholder engagement.

Keywords: stakeholder, engagement, sustainable development, shared value, corporate social responsibility

Procedia PDF Downloads 485
4 Immune Complex Components Act as Agents in Relapsing Fever Borrelia Mediated Rosette Formation

Authors: Mukunda Upreti, Jill Storry, Rafael Björk, Emilie Louvet, Johan Normark, Sven Bergström

Abstract:

Borrelia duttonii and most other relapsing fever species are Gram-negative bacteria which cause a blood borne infection characterized by the binding of bacterium to erythrocytes. The bacteria associate with two or more erythrocytes to form clusters of cells into rosettes. Rosetting is a major virulence factor and the mechanism is believed to facilitate persistence of bacteria in the circulatory system and the avoidance of host immune cells through masking or steric hindrance effects. However, the molecular mechanisms of rosette formation are still poorly understood. This study aims at determining the molecules involved in the rosette formation phenomenon. Fractionated serum, using different affinity purification methods, was investigated as a rosetting agent and IgG and at least one other serum components were needed for rosettes to form. An IgG titration curve demonstrated that IgG alone is not enough to restore rosette formation level to the level whole serum gives. IgG hydrolysis by IdeS ( Immunoglobulin G-degrading enzyme of Streptococcus pyogenes) and deglycosylation using N-Glycanase proved that the whole IgG molecule regardless of saccharide moieties is critical for Borrelia induced rosetting. Complement components C3 and C4 were also important serum molecules necessary to maintain optimum rosetting rates. The deactivation of complement network and serum depletion with C3 and C4 significantly reduced the rosette formation rate. The dependency of IgG and complement components also implied involvement of the complement receptor (CR1). Rosette formation test with Knops null RBC and sCR1 confirmed that CR1 is also part of Borrelia induced rosette formation.

Keywords: complement components C3 and C4, complement receptor 1, Immunoglobulin G, Knops null, Rosetting

Procedia PDF Downloads 298
3 A National Survey of Clinical Psychology Graduate Student Attitudes toward Psychotherapy Treatment Manuals: A Replication Study

Authors: B. Bergström, A. Ladd, A. Jones, L. Rosso, P. Michael

Abstract:

Attitudes toward treatment manuals serve as a meaningful predictor of general attitudes toward evidence-based practice. Despite demonstrating high effectiveness in treating many mental disorders, manualized treatments have been underutilized by practitioners. Thus, one can assess the state of the field regarding the adoption of evidence-based practices by surveying practitioner attitudes towards manualized treatments. This study is an adapted replication that assesses psychology graduate student attitudes towards manualized treatments, as a general marker for attitudes towards evidence-based practice. Training programs provide future clinicians with the foundation for critical skills in clinical practice. Research demonstrates that post-graduate continuing education has little to no effect on clinical practice; thus, graduate programs serve as the primary, and often final platform for all future practice. However, there are little empirical data identifying the attitudes and training of graduate students in utilizing manualized treatments. The empirical analysis of this study indicates an increase in positive attitudes among graduate student attitudes towards manualized treatments (within the United States), when compared to past surveys of professional psychologists. Findings from this study may inform graduate programs of barriers for students in developing positive attitudes toward manualized treatments and evidence-based practice. This study also serves as a preliminary predictor of the state-of-the field, in regards to professional psychologists attitudes towards evidence-based practice, if attitudes remain stable. This study indicates that the attitudes toward utilizing evidence-based practices, such as treatment manuals, has become more positive since year 2000.

Keywords: exposure therapy, evidence based practice, manualized treatments, student attitudes

Procedia PDF Downloads 130
2 Effect of Carbide Precipitates in Tool Steel on Material Transfer: A Molecular Dynamics Study

Authors: Ahmed Tamer AlMotasem, Jens Bergström, Anders Gåård, Pavel Krakhmalev, Thijs Jan Holleboom

Abstract:

In sheet metal forming processes, accumulation and transfer of sheet material to tool surfaces, often referred to as galling, is the major cause of tool failure. Initiation of galling is assumed to occur due to local adhesive wear between two surfaces. Therefore, reducing adhesion between the tool and the work sheet has a great potential to improve the tool materials galling resistance. Experimental observations and theoretical studies show that the presence of primary micro-sized carbides and/or nitrides in alloyed steels may significantly improve galling resistance. Generally, decreased adhesion between the ceramic precipitates and the sheet material counter-surface are attributed as main reason to the latter observations. On the other hand, adhesion processes occur at an atomic scale and, hence, fundamental understanding of galling can be obtained via atomic scale simulations. In the present study, molecular dynamics simulations are used, with utilizing second nearest neighbor embedded atom method potential to investigate the influence of nano-sized cementite precipitates embedded in tool atoms. The main aim of the simulations is to gain new fundamental knowledge on galling initiation mechanisms. Two tool/work piece configurations, iron/iron and iron-cementite/iron, are studied under dry sliding conditions. We find that the average frictional force decreases whereas the normal force increases for the iron-cementite/iron system, in comparison to the iron/iron configuration. Moreover, the average friction coefficient between the tool/work-piece decreases by about 10 % for the iron-cementite/iron case. The increase of the normal force in the case of iron-cementite/iron system may be attributed to the high stiffness of cementite compared to bcc iron. In order to qualitatively explain the effect of cementite on adhesion, the adhesion force between self-mated iron/iron and cementite/iron surfaces has been determined and we found that iron/cementite surface exhibits lower adhesive force than that of iron-iron surface. The variation of adhesion force with temperature was investigated up to 600 K and we found that the adhesive force, generally, decreases with increasing temperature. Structural analyses show that plastic deformation is the main deformation mechanism of the work-piece, accompanied with dislocations generation.

Keywords: adhesion, cementite, galling, molecular dynamics

Procedia PDF Downloads 275
1 Risks beyond Cyber in IoT Infrastructure and Services

Authors: Mattias Bergstrom

Abstract:

Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.

Keywords: IoT, security, infrastructure, SCADA, blockchain, AI

Procedia PDF Downloads 68