20 resultados para Malicious nodes
Resumo:
AIMS: To compare the performance of ultrasound elastography with conventional ultrasound in the assessment of axillary lymph nodes in suspected breast cancer and whether ultrasound elastography as an adjunct to conventional ultrasound can increase the sensitivity of conventional ultrasound used alone. MATERIALS AND METHODS: Fifty symptomatic women with a sonographic suspicion for breast cancer underwent ultrasound elastography of the ipsilateral axilla concurrent with conventional ultrasound being performed as part of triple assessment. Elastograms were visually scored, strain measurements calculated and node area and perimeter measurements taken. Theoretical biopsy cut points were selected. The sensitivity, specificity, positive predictive value (PPV), and negative predictive values (NPV) were calculated and receiver operating characteristic (ROC) analysis was performed and compared for elastograms and conventional ultrasound images with surgical histology as the reference standard. RESULTS: The mean age of the women was 57 years. Twenty-nine out of 50 of the nodes were histologically negative on surgical histology and 21 were positive. The sensitivity, specificity, PPV, and NPV for conventional ultrasound were 76, 78, 70, and 81%, respectively; 90, 86, 83, and 93%, respectively, for visual ultrasound elastography; and for strain scoring, 100, 48, 58 and 100%, respectively. There was no significant difference between any of the node measurements CONCLUSIONS: Initial experience with ultrasound elastography of axillary lymph nodes, showed that it is more sensitive than conventional ultrasound in detecting abnormal nodes in the axilla in cases of suspected breast cancer. The specificity remained acceptable and ultrasound elastography used as an adjunct to conventional ultrasound has the potential to improve the performance of conventional ultrasound alone.
Resumo:
This paper presents a new wireless radio frequency identification (RFID) repeater system, facilitating remote interrogation without the need for arrays of wired antennas, despite using entirely passive, low-cost ultra high frequency (UHF) RFID tags. The proposed system comprises a master RFID reader with both transmit and receive functions, and multiple RFID repeaters to receive, amplify and retransmit tag-to-reader and reader-to-tag communications. This expands the area over which the master RFID reader may provide coverage for a given maximum transmit power at each antenna. We first demonstrate a single hop wireless repeater system to allow similar read performance to a standard commercial passive UHF RFID reader. Finally, a proof of principle system demonstrates that a single wireless repeater node can allow an extension in range.
Resumo:
Wireless Sensor Networks (WSNs) which utilise IEEE 802.15.4 technology offer the potential for low cost deployment and maintenance compared with conventional wired sensor networks, enabling effective and efficient condition monitoring of aged civil engineering infrastructure. We will address wireless propagation for a below to above ground scenario where one of the wireless nodes is located in a below ground fire hydrant chamber to permit monitoring of the local water distribution network. Frequency Diversity (FD) is one method that can be used to combat the damaging effects of multipath fading and so improve the reliability of radio links. However, no quantitative investigation concerning the potential performance gains from the use of FD at 2.4GHz is available for the outlined scenario. In this paper, we try to answer this question by performing accurate propagation measurements using modified and calibrated off-the-shelf 802.15.4 based sensor nodes. These measurement results are also compared with those obtained from simulations that employ our Modified 2D Finite-Difference Time-Domain (FDTD) approach. ©2009 IEEE.
Resumo:
Wireless Sensor Networks (WSNs) which utilise IEEE 802.15.4 technology operate primarily in the 2.4 GHz globally compatible ISM band. However, the wireless propagation channel in this crowded band is notoriously variable and unpredictable, and it has a significant impact on the coverage range and quality of the radio links between the wireless nodes. Therefore, the use of Frequency Diversity (FD) has potential to ameliorate this situation. In this paper, the possible benefits of using FD in a tunnel environment have been quantified by performing accurate propagation measurements using modified and calibrated off-the-shelf 802.15.4 based sensor motes in the disused Aldwych underground railway tunnel. The objective of this investigation is to characterise the performance of FD in this confined environment. Cross correlation coefficients are calculated from samples of the received power on a number of frequency channels gathered during the field measurements. The low measured values of the cross correlation coefficients indicate that applying FD at 2.4 GHz will improve link performance in a WSN deployed in a tunnel. This finding closely matches results obtained by running a computational simulation of the tunnel radio propagation using a 2D Finite-Difference Time-Domain (FDTD) method. ©2009 IEEE.
Resumo:
The constrained deformation of an aluminium alloy foam sandwiched between steel substrates has been investigated. The sandwich plates are subjected to through-thickness shear and normal loading, and it is found that the face sheets constrain the foam against plastic deformation and result in a size effect: the yield strength increases with diminishing thickness of foam layer. The strain distribution across the foam core has been measured by a visual strain mapping technique, and a boundary layer of reduced straining was observed adjacent to the face sheets. The deformation response of the aluminium foam layer was modelled by the elastic-plastic finite element analysis of regular and irregular two dimensional honeycombs, bonded to rigid face sheets; in the simulations, the rotation of the boundary nodes of the cell-wall beam elements was set to zero to simulate full constraint from the rigid face sheets. It is found that the regular honeycomb under-estimates the size effect whereas the irregular honeycomb provides a faithful representation of both the observed size effect and the observed strain profile through the foam layer. Additionally, a compressible version of the Fleck-Hutchinson strain gradient theory was used to predict the size effect; by identifying the cell edge length as the relevant microstructural length scale the strain gradient model is able to reproduce the observed strain profiles across the layer and the thickness dependence of strength. © 2002 Elsevier Science Ltd. All rights reserved.
Resumo:
Node placement plays a significant role in the effective and successful deployment of Wireless Sensor Networks (WSNs), i.e., meeting design goals such as cost effectiveness, coverage, connectivity, lifetime and data latency. In this paper, we propose a new strategy to assist in the placement of Relay Nodes (RNs) for a WSN monitoring underground tunnel infrastructure. By applying for the first time an accurate empirical mean path loss propagation model along with a well fitted fading distribution model specifically defined for the tunnel environment, we address the RN placement problem with guaranteed levels of radio link performance. The simulation results show that the choice of appropriate path loss model and fading distribution model for a typical environment is vital in the determination of the number and the positions of RNs. Furthermore, we adapt a two-tier clustering multi-hop framework in which the first tier of the RN placement is modelled as the minimum set cover problem, and the second tier placement is solved using the search-and-find algorithm. The implementation of the proposed scheme is evaluated by simulation, and it lays the foundations for further work in WSN planning for underground tunnel applications. © 2010 IEEE.
Resumo:
This work demonstrates transmission at 2.5 Gbit/s across two wavelength-division multiplexing (WDM) network nodes, constructed using counter-propagating semiconductor optical amplifier (SOA) wavelength converters and an integrated wavelength-selective router separated by 45 km of fiber, with an overall penalty of 0.6 dB. Minimal degradation of the eye diagram is evident across the whole system. Full utilization of the capacity of the router would allow an aggregate 360-Gbit/s node capacity for a WDM channel of 2.5 Gb/s.
Resumo:
In most recent substructuring methods, a fundamental role is played by the coarse space. For some of these methods (e.g. BDDC and FETI-DP), its definition relies on a 'minimal' set of coarse nodes (sometimes called corners) which assures invertibility of local subdomain problems and also of the global coarse problem. This basic set is typically enhanced by enforcing continuity of functions at some generalized degrees of freedom, such as average values on edges or faces of subdomains. We revisit existing algorithms for selection of corners. The main contribution of this paper consists of proposing a new heuristic algorithm for this purpose. Considering faces as the basic building blocks of the interface, inherent parallelism, and better robustness with respect to disconnected subdomains are among features of the new technique. The advantages of the presented algorithm in comparison to some earlier approaches are demonstrated on three engineering problems of structural analysis solved by the BDDC method.
Resumo:
Brittleness is the unintended, but inevitable consequence of producing a transparent ceramic for architectural applications such as the soda-lime glass. Its tensile strength is particularly sensitive to surface imperfections, such as that from natural weathering and malicious damage. Although a significant amount of testing of new glass has been carried out, there has been surprisingly little testing on weathered glass. Due to the variable nature of the causes of surface damage, the lack of data on weathered glass leads to a considerable degree of uncertainty in the long-term strength of exposed glass. This paper presents the results of recent tests on weathered annealed glass which has been exposed to natural weathering for more than 20 years. The tests include experimental investigations using the co-axial ring setup as well as optical and atomic force microscopy of the glass surfaces. The experimental data from these tests is subsequently used to extend existing fracture mechanics-based models to predict the strength of weathered glass. It is shown that using an automated approach based directly on finite element analysis results can give an increase in effective design strength in the order of 70 to 100% when compared to maximum stress methods. It is also shown that by combining microscopy and strength test results, it is possible to quantitatively characterise the damage on glass surfaces.
Resumo:
This technical note studies global asymptotic state synchronization in networks of identical systems. Conditions on the coupling strength required for the synchronization of nodes having a cyclic feedback structure are deduced using incremental dissipativity theory. The method takes advantage of the incremental passivity properties of the constituent subsystems of the network nodes to reformulate the synchronization problem as one of achieving incremental passivity by coupling. The method can be used in the framework of contraction theory to constructively build a contracting metric for the incremental system. The result is illustrated for a network of biochemical oscillators. © 2011 IEEE.
Resumo:
Latent variable models for network data extract a summary of the relational structure underlying an observed network. The simplest possible models subdivide nodes of the network into clusters; the probability of a link between any two nodes then depends only on their cluster assignment. Currently available models can be classified by whether clusters are disjoint or are allowed to overlap. These models can explain a "flat" clustering structure. Hierarchical Bayesian models provide a natural approach to capture more complex dependencies. We propose a model in which objects are characterised by a latent feature vector. Each feature is itself partitioned into disjoint groups (subclusters), corresponding to a second layer of hierarchy. In experimental comparisons, the model achieves significantly improved predictive performance on social and biological link prediction tasks. The results indicate that models with a single layer hierarchy over-simplify real networks.
Resumo:
Design rationale is an effective way of capturing knowledge, since it records the issues addressed, the options considered, and the arguments used when specific decisions are made during the design process. Design rationale is generally captured by identifying elements and their dependencies, i.e. in a structured way. Current retrieval methods focus mainly on either the classification of rationale or on keyword-based searches of records. Keyword-based retrieval is reasonably effective as the information in design rationale records is mainly described using text. However, most of the current keyword-based retrieval methods discard the implicit structures of these records, resulting either in poor precision of retrieval or in isolated pieces of information that are difficult to understand. This ongoing research aims to go beyond keyword-based retrieval by developing methods and tools to facilitate the provision of useful design knowledge in new design projects. Our first step is to understand the structured information derived from the relationship between lumps of text held in different nodes in the design rationale captured via a software tool currently used in industry, and study how this information can be utilised to improve retrieval performance. Specifically, methods for utilising various structured information are developed and implemented on a prototype keyword-based retrieval system developed in our earlier work. The implementation and evaluation of these methods shows that the structured information can be utilised in a number of ways, such as filtering the results and providing more complete information. This allows the retrieval system to present results that are easy to understand, and which closely match designers' queries. Like design rationale, other methods for representing design knowledge also in essence involve structured information and thus the methods proposed can be generalised to be adapted and applied for the retrieval of other kinds of design knowledge. Copyright © 2002-2012 The Design Society. All rights reserved.
Resumo:
The Hoberman 'switch-pitch ' ball is a transformable structure with a single folding and unfolding path. The underlying cubic structure has a novel mechanism that retains tetrahedral symmetry during folding. Here, we propose a generalized class of structures of a similar type that retain their full symmetry during folding. The key idea is that we require two orbits of nodes for the structure: within each orbit, any node can be copied to any other node by a symmetry operation. Each member is connected to two nodes, which may be in different orbits, by revolute joints. We will describe the symmetry analysis that reveals the symmetry of the internal mechanism modes for a switch-pitch structure. To follow the complete folding path of the structure, a nonlinear iterative predictor-corrector algorithm based on the Newton method is adopted. First, a simple tetrahedral example of the class of two-orbit structures is presented. Typical configurations along the folding path are shown. Larger members of the class of structures are also presented, all with cubic symmetry. These switch-pitch structures could have useful applications as deployable structures.
Resumo:
A common approach to visualise multidimensional data sets is to map every data dimension to a separate visual feature. It is generally assumed that such visual features can be judged independently from each other. However, we have recently shown that interactions between features do exist [Hannus et al. 2004; van den Berg et al. 2005]. In those studies, we first determined individual colour and size contrast or colour and orientation contrast necessary to achieve a fixed level of discrimination performance in single feature search tasks. These contrasts were then used in a conjunction search task in which the target was defined by a combination of a colour and a size or a colour and an orientation. We found that in conjunction search, despite the matched feature discriminability, subjects significantly more often chose an item with the correct colour than one with correct size or orientation. This finding may have consequences for visualisation: the saliency of information coded by objects' size or orientation may change when there is a need to simultaneously search for colour that codes another aspect of the information. In the present experiment, we studied whether a colour bias can also be found in a more complex and continuous task, Subjects had to search for a target in a node-link diagram consisting of SO nodes, while their eye movements were being tracked, Each node was assigned a random colour and size (from a range of 10 possible values with fixed perceptual distances). We found that when we base the distances on the mean threshold contrasts that were determined in our previous experiments, the fixated nodes tend to resemble the target colour more than the target size (Figure 1a). This indicates that despite the perceptual matching, colour is judged with greater precision than size during conjunction search. We also found that when we double the size contrast (i.e. the distances between the 10 possible node sizes), this effect disappears (Figure 1b). Our findings confirm that the previously found decrease in salience of other features during colour conjunction search is also present in more complex (more 'visualisation- realistic') visual search tasks. The asymmetry in visual search behaviour can be compensated for by manipulating step sizes (perceptual distances) within feature dimensions. Our results therefore also imply that feature hierarchies are not completely fixed and may be adapted to the requirements of a particular visualisation. Copyright © 2005 by the Association for Computing Machinery, Inc.