371 resultados para isolating


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many software applications extend their functionality by dynamically loading executable components into their allocated address space. Such components, exemplified by browser plugins and other software add-ons, not only enable reusability, but also promote programming simplicity, as they reside in the same address space as their host application, supporting easy sharing of complex data structures and pointers. However, such components are also often of unknown provenance and quality and may be riddled with accidental bugs or, in some cases, deliberately malicious code. Statistics show that such component failures account for a high percentage of software crashes and vulnerabilities. Enabling isolation of such fine-grained components is therefore necessary to increase the stability, security and resilience of computer programs. This thesis addresses this issue by showing how host applications can create isolation domains for individual components, while preserving the benefits of a single address space, via a new architecture for software isolation called LibVM. Towards this end, we define a specification which outlines the functional requirements for LibVM, identify the conditions under which these functional requirements can be met, define an abstract Application Programming Interface (API) that encompasses the general problem of isolating shared libraries, thus separating policy from mechanism, and prove its practicality with two concrete implementations based on hardware virtualization and system call interpositioning, respectively. The results demonstrate that hardware isolation minimises the difficulties encountered with software based approaches, while also reducing the size of the trusted computing base, thus increasing confidence in the solution’s correctness. This thesis concludes that, not only is it feasible to create such isolation domains for individual components, but that it should also be a fundamental operating system supported abstraction, which would lead to more stable and secure applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mesenchymal stem cells (MSCs) represent multipotent stromal cells that can differentiate into a variety of cell types, including osteoblasts (bone cells), chondrocytes (cartilage cells), and adipocytes (fat cells). Their multi-potency provides a great promise as a cell source for tissue engineering and cell-based therapy for many diseases, particularly bone diseases and bone formation. To be able to direct and modulate the differentiation of MSCs into the desired cell types in situ in the tissue, nanotechnology is introduced and used to facilitate or promote cell growth and differentiation. These nano-materials can provide a fine structure and tuneable surface in nanoscales to help the cell adhesion and promote the cell growth and differentiation of MSCs. This could be a dominant direction in future for stem cells based therapy or tissue engineering for various diseases. Therefore, the isolation, manipulation, and differentiation of MSCs are very important steps to make meaningful use of MSCs for disease treatments. In this chapter, we have described a method of isolating MSC from human bone marrow, and how to culture and differentiate them in vitro. We have also provided research methods on how to use MSCs in an in vitro model and how to observe MSC biological response on the surface of nano-scaled materials.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, a framework for isolating unprecedented faults for an EGR valve system is presented. Using normal behavior data generated by a high fidelity engine simulation, the recently introduced Growing Structure Multiple Model System (GSMMS) is used to construct models of normal behavior for an EGR valve system and its various subsystems. Using the GSMMS models as a foundation, anomalous behavior of the entire system is then detected as statistically significant departures of the most recent modeling residuals from the modeling residuals during normal behavior. By reconnecting anomaly detectors to the constituent subsystems, the anomaly can be isolated without the need for prior training using faulty data. Furthermore, faults that were previously encountered (and modeled) are recognized using the same approach as the anomaly detectors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The catalytic action of putrescine specific amine oxidases acting in tandem with 4-aminobutyraldehyde dehydrogenase is explored as a degradative pathway in Rhodococcus opacus. By limiting the nitrogen source, increased catalytic activity was induced leading to a coordinated response in the oxidative deamination of putrescine to 4-aminobutyraldehyde and subsequent dehydrogenation to 4-aminobutyrate. Isolating the dehydrogenase by ion exchange chromatography and gel filtration revealed that the enzyme acts principally on linear aliphatic aldehydes possessing an amino moiety. Michaelis-Menten kinetic analysis delivered a Michaelis constant (KM=0.014mM) and maximum rate (Vmax=11.2μmol/min/mg) for the conversion of 4-aminobutyraldehyde to 4-aminobutyrate. The dehydrogenase identified by MALDI-TOF mass spectrometric analysis (E value=0.031, 23% coverage) belongs to a functionally related genomic cluster that includes the amine oxidase, suggesting their association in a directed cell response. Key regulatory, stress and transport encoding genes have been identified, along with candidate dehydrogenases and transaminases for the further conversion of 4-aminobutyrate to succinate. Genomic analysis has revealed highly similar metabolic gene clustering among members of Actinobacteria, providing insight into putrescine degradation notably among Micrococcaceae, Rhodococci and Corynebacterium by a pathway that was previously uncharacterised in bacteria.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a practical recursive fault detection and diagnosis (FDD) scheme for online identification of actuator faults for unmanned aerial systems (UASs) based on the unscented Kalman filtering (UKF) method. The proposed FDD algorithm aims to monitor health status of actuators and provide indication of actuator faults with reliability, offering necessary information for the design of fault-tolerant flight control systems to compensate for side-effects and improve fail-safe capability when actuator faults occur. The fault detection is conducted by designing separate UKFs to detect aileron and elevator faults using a nonlinear six degree-of-freedom (DOF) UAS model. The fault diagnosis is achieved by isolating true faults by using the Bayesian Classifier (BC) method together with a decision criterion to avoid false alarms. High-fidelity simulations with and without measurement noise are conducted with practical constraints considered for typical actuator fault scenarios, and the proposed FDD exhibits consistent effectiveness in identifying occurrence of actuator faults, verifying its suitability for integration into the design of fault-tolerant flight control systems for emergency landing of UASs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent controversy on the quantum dots dephasing mechanisms (between pure and inelastic) is re-examined by isolating the quantum dots from their substrate by using the appropriate limits of the ionization energy theory and the quantum adiabatic theorem. When the phonons in the quantum dots are isolated adiabatically from the phonons in the substrate, the elastic or pure dephasing becomes the dominant mechanism. On the other hand, for the case where the phonons from the substrate are non-adiabatically coupled to the quantum dots, the inelastic dephasing process takes over. This switch-over is due to different elemental composition in quantum dots as compared to its substrate. We also provide unambiguous analysis as to understand why GaAs/AlGaAs quantum dots may only have pure dephasing while InAs/GaAs quantum dots give rise to the inelastic dephasing as the dominant mechanism. It is shown that the elemental composition plays an important role (of both quantum dots and substrate) in evaluating the dephasing mechanisms of quantum dots.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Conceptions of learning, as well as other associated aspects of prior knowledge, are theoretically important factors in influencing the manner in which the content and context of learning are engaged. The present study reports on: (a) the operationalisation of some of these factors aimed at isolating sources of explanatory variation that can be used for modelling purposes; and (b) a conservative exploration of the discriminatory power of, and exhibited patterns of association between, such sources of variation as have been isolated. Based on a conservative analytical approach, the results of the present study do not support a single clearly defined empirical model of conceptions of learning and associated constructs. Instead, there is consistent evidence that underlying empirical structures appear to be sensitive to the response context and other factors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Isolating processes within the brain that are specific to human behavior is a key goal for social neuroscience. The current research was an attempt to test whether recent findings of enhanced negative ERPs in response to unexpected human gaze are unique to eye gaze stimuli by comparing the effects of gaze cues with the effects of an arrow cue. ERPs were recorded while participants (N¼30) observed a virtual actor or an arrow that gazed (or pointed) either toward (object congruent) or away from (object incongruent) a flashing checkerboard. An enhanced negative ERP (N300) in response to object incongruent compared to object congruent trials was recorded for both eye gaze and arrow stimuli. The findings are interpreted as reflecting a domain general mechanism for detecting unexpected events.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: The use of salivary diagnostics is increasing because of its noninvasiveness, ease of sampling, and the relatively low risk of contracting infectious organisms. Saliva has been used as a biological fluid to identify and validate RNA targets in head and neck cancer patients. The goal of this study was to develop a robust, easy, and cost-effective method for isolating high yields of total RNA from saliva for downstream expression studies. METHODS: Oral whole saliva (200 mu L) was collected from healthy controls (n = 6) and from patients with head and neck cancer (n = 8). The method developed in-house used QIAzol lysis reagent (Qiagen) to extract RNA from saliva (both cell-free supernatants and cell pellets), followed by isopropyl alcohol precipitation, cDNA synthesis, and real-time PCR analyses for the genes encoding beta-actin ("housekeeping" gene) and histatin (a salivary gland-specific gene). RESULTS: The in-house QIAzol lysis reagent produced a high yield of total RNA (0.89 -7.1 mu g) from saliva (cell-free saliva and cell pellet) after DNase treatment. The ratio of the absorbance measured at 260 nm to that at 280 nm ranged from 1.6 to 1.9. The commercial kit produced a 10-fold lower RNA yield. Using our method with the QIAzol lysis reagent, we were also able to isolate RNA from archived saliva samples that had been stored without RNase inhibitors at -80 degrees C for >2 years. CONCLUSIONS: Our in-house QIAzol method is robust, is simple, provides RNA at high yields, and can be implemented to allow saliva transcriptomic studies to be translated into a clinical setting.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As each day passes, and as new and better devices and services are developed, more and more government and private services are being moved to an online format. This movement makes access to the internet an essential for 21st Century life. The internet has become so integrated in our lives that many of us cannot imagine how we could operate without it. This omnipresent ‘being’ affects all forms of ‘normal’ social and economic activity and does so in ways that we do not realize. Those with access are able to engage with government, business, and family and friends more easily, which can lead to an improved standard of living. For the disadvantaged, however – those with the desire but without the capacity – a lack of access can be socially isolating. "Between the idea And the reality Between the motion And the act Falls the Shadow – T. S. Elliott. “The Hollow Men” Engagement in the internet economy requires both physical access and the individual to have the necessary finances and skills to make and sustain their use. If governments and the international community want a fully functioning internet economy this requires that all individuals must be operating in it. That not all individuals do so means, very simply, that the internet economy is not fully functioning. The text contextualizes for policy makers and legislatures why it is essential to ensure that individuals have appropriate access to the internet and what can be done to achieve it. The interrelationship/overlap between why access is essential, how it can be achieved and the central role of the individual to the internet economy is explored and translated into the concept of connectedness. From this, solutions for ensuring connectedness for all individuals are developed. It is Dr Cradduck’s hope that in the not too distant future readers will puzzle over why texts such as this needed to be written.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduced in this paper is a Bayesian model for isolating the resonant frequency from combustion chamber resonance. The model shown in this paper focused on characterising the initial rise in the resonant frequency to investigate the rise of in-cylinder bulk temperature associated with combustion. By resolving the model parameters, it is possible to determine: the start of pre-mixed combustion, the start of diffusion combustion, the initial resonant frequency, the resonant frequency as a function of crank angle, the in-cylinder bulk temperature as a function of crank angle and the trapped mass as a function of crank angle. The Bayesian method allows for individual cycles to be examined without cycle-averaging|allowing inter-cycle variability studies. Results are shown for a turbo-charged, common-rail compression ignition engine run at 2000 rpm and full load.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

More than ever, research is playing an important part in supporting proposed tax reforms and finding solutions to Australia’s tax system. Also, for tax academics the importance of quality research is critical in an increasingly competitive tertiary environment. However, life for an academic can be an isolating experience at time, especially if one’s expertise is in an area that many of their immediate colleagues do not share an interest in. Collegiately and the ability to be able to discuss research is seen as critical in fostering the next generation of academics. It is with this in mind that on the 5th of July 2010 the Inaugural Queensland Tax Teachers’ Symposium was hosted by Griffith University at its Southbank campus. The aim was to bring together for one day tax academics in Queensland, and further afield, to present their current research projects and encourage independent tax research. If was for this reason that the symposium was later re-named the Queensland Tax Researchers’ Symposium (QTRS) to reflect its emphasis. The Symposium has been held annually mid-year on four occasions with in excess of 120 attendees over this period. The fifth QTRS is planned for June 2014 to be hosted by James Cook University.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is a strong sense of negativity associated with online fraud victimization. Despite an increasing awareness, understanding about the reality of victimization experiences is not apparent. Rather, victims of online fraud are constructed as greedy and gullible and there is an overwhelming sense of blame and responsibility levelled at them for the actions that led to their losses. This belief transcends both non-victims and victims. The existence of this victim-blaming discourse is significant. Based on interviews with 85 seniors across Queensland, Australia, who received fraudulent emails, this article establishes the victim-blaming discourse as an overwhelmingly powerful and controlling discourse about online fraud victimization. However, the article also examines how humour acts as a tool to reinforce this discourse by isolating victims and impacting on their ability to disclose to those around them. Identifying and challenging this victim-blaming discourse, as well as the role of humour and its social acceptance, is a first step in the facilitation of victim recovery and future well-being.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite extensive literature on female mate choice, empirical evidence on women’s mating preferences in the search for a sperm donor is scarce, even though this search, by isolating a male’s genetic impact on offspring from other factors like paternal investment, offers a naturally ”controlled” research setting. In this paper, we work to fill this void by examining the rapidly growing online sperm donor market, which is raising new challenges by offering women novel ways to seek out donor sperm. We not only identify individual factors that influence women’s mating preferences but find strong support for the proposition that behavioural traits (inner values) are more important in these choices than physical appearance (exterior values). We also report evidence that physical factors matter more than resources or other external cues of material success, perhaps because the relevance of good character in donor selection is part of a female psychological adaptation throughout evolutionary history. The lack of evidence on a preference for material resources, on the other hand, may indicate the ability of peer socialization and better access to resources to rapidly shape the female decision process. Overall, the paper makes useful contributions to both the literature on human behaviour and that on decision-making in extreme and highly important situations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many software applications extend their functionality by dynamically loading libraries into their allocated address space. However, shared libraries are also often of unknown provenance and quality and may contain accidental bugs or, in some cases, deliberately malicious code. Most sandboxing techniques which address these issues require recompilation of the libraries using custom tool chains, require significant modifications to the libraries, do not retain the benefits of single address-space programming, do not completely isolate guest code, or incur substantial performance overheads. In this paper we present LibVM, a sandboxing architecture for isolating libraries within a host application without requiring any modifications to the shared libraries themselves, while still retaining the benefits of a single address space and also introducing a system call inter-positioning layer that allows complete arbitration over a shared library’s functionality. We show how to utilize contemporary hardware virtualization support towards this end with reasonable performance overheads and, in the absence of such hardware support, our model can also be implemented using a software-based mechanism. We ensure that our implementation conforms as closely as possible to existing shared library manipulation functions, minimizing the amount of effort needed to apply such isolation to existing programs. Our experimental results show that it is easy to gain immediate benefits in scenarios where the goal is to guard the host application against unintentional programming errors when using shared libraries, as well as in more complex scenarios, where a shared library is suspected of being actively hostile. In both cases, no changes are required to the shared libraries themselves.