10 resultados para Verification and validation technology
em Indian Institute of Science - Bangalore - Índia
Resumo:
In this paper, we consider applying derived knowledge base regarding the sensitivity and specificity of damage(s) to be detected by an SHM system being designed and qualified. These efforts are necessary toward developing capabilities in SHM system to classify reliably various probable damages through sequence of monitoring, i.e., damage precursor identification, detection of damage and monitoring its progression. We consider the particular problem of visual and ultrasonic NDE based SHM system design requirements, where the damage detection sensitivity and specificity data definitions for a class of structural components are established. Methodologies for SHM system specification creation are discussed in details. Examples are shown to illustrate how the physics of damage detection scheme limits particular damage detection sensitivity and specificity and further how these information can be used in algorithms to combine various different NDE schemes in an SHM system to enhance efficiency and effectiveness. Statistical and data driven models to determine the sensitivity and probability of damage detection (POD) has been demonstrated for plate with varying one-sided line crack using optical and ultrasonic based inspection techniques.
Resumo:
In bovines characterization of biochemical and molecular determinants of the dominant follicle before and during different time intervals after gonadotrophin surge requires precise identification of the dominant follicle from a follicular wave. The objectives of the present study were to standardize an experimental model in buffalo cows for accurately identifying the dominant follicle of the first wave of follicular growth and characterize changes in follicular fluid hormone concentrations as well as expression patterns of various genes associated with the process of ovulation. From the day of estrus (day 0), animals were subjected to blood sampling and ultrasonography for monitoring circulating progesterone levels and follicular growth. On day 7 of the cycle, animals were administered a PGF2α analogue (Tiaprost Trometamol, 750 μg i.m.) followed by an injection of hCG (2000 IU i.m.) 36 h later. Circulating progesterone levels progressively increased from day 1 of the cycle to 2.26 ± 0.17 ng/ml on day 7 of the cycle, but declined significantly after PGF2α injection. A progressive increase in the size of the dominant follicle was observed by ultrasonography. The follicular fluid estradiol and progesterone concentrations in the dominant follicle were 600 ± 16.7 and 38 ± 7.6 ng/ml, respectively, before hCG injection and the concentration of estradiol decreased to 125.8 ± 25.26 ng/ml, but concentration of progesterone increased to 195 ± 24.6 ng/ml, 24 h post-hCG injection. Inh-α and Cyp19A1 expressions in granulosa cells were maximal in the dominant follicle and declined in response to hCG treatment. Progesterone receptor, oxytocin and cycloxygenase-2 expressions in granulosa cells, regarded as markers of ovulation, were maximal at 24 h post-hCG. The expressions of genes belonging to the super family of proteases were also examined; Cathepsin L expression decreased, while ADAMTS 3 and 5 expressions increased 24 h post-hCG treatment. The results of the current study indicate that sequential treatments of PGF2α and hCG during early estrous cycle in the buffalo cow leads to follicular growth that culminates in ovulation. The model system reported in the present study would be valuable for examining temporo-spatial changes in the periovulatory follicle immediately before and after the onset of gonadotrophin surge.
Resumo:
Denial-of-service (DoS) attacks form a very important category of security threats that are prevalent in MIPv6 (mobile internet protocol version 6) today. Many schemes have been proposed to alleviate such threats, including one of our own [9]. However, reasoning about the correctness of such protocols is not trivial. In addition, new solutions to mitigate attacks may need to be deployed in the network on a frequent basis as and when attacks are detected, as it is practically impossible to anticipate all attacks and provide solutions in advance. This makes it necessary to validate the solutions in a timely manner before deployment in the real network. However, threshold schemes needed in group protocols make analysis complex. Model checking threshold-based group protocols that employ cryptography have not been successful so far. Here, we propose a new simulation based approach for validation using a tool called FRAMOGR that supports executable specification of group protocols that use cryptography. FRAMOGR allows one to specify attackers and track probability distributions of values or paths. We believe that infrastructure such as FRAMOGR would be required in future for validating new group based threshold protocols that may be needed for making MIPv6 more robust.
Resumo:
The analytical solutions for the coupled diffusion equations that are encountered in diffuse fluorescence spectroscopy/ imaging for regular geometries were compared with the well-established numerical models, which are based on the finite element method. Comparison among the analytical solutions obtained using zero boundary conditions and extrapolated boundary conditions (EBCs) was also performed. The results reveal that the analytical solutions are in close agreement with the numerical solutions, and solutions obtained using EBCs are more accurate in obtaining the mean time of flight data compared to their counterpart. The analytical solutions were also shown to be capable of providing bulk optical properties through a numerical experiment using a realistic breast model. (C) 2013 Optical Society of America
Resumo:
Empirical research available on technology transfer initiatives is either North American or European. Literature over the last two decades shows various research objectives such as identifying the variables to be measured and statistical methods to be used in the context of studying university based technology transfer initiatives. AUTM survey data from years 1996 to 2008 provides insightful patterns about the North American technology transfer initiatives, we use this data in our paper. This paper has three sections namely, a comparison of North American Universities with (n=1129) and without Medical Schools (n=786), an analysis of the top 75th percentile of these samples and a DEA analysis of these samples. We use 20 variables. Researchers have attempted to classify university based technology transfer initiative variables into multi-stages, namely, disclosures, patents and license agreements. Using the same approach, however with minor variations, three stages are defined in this paper. The first stage is to do with inputs from R&D expenditure and outputs namely, invention disclosures. The second stage is to do with invention disclosures being the input and patents issued being the output. The third stage is to do with patents issued as an input and technology transfers as outcomes.
Resumo:
Several soil microbes are present in the rhizosphere zone, especially plant growth promoting rhizobacteria (PGPR), which are best known for their plant growth promoting activities. The present study reflects the effect of gold nanoparticles (GNPs) at various concentrations on the growth of PGPR. GNPs were synthesized chemically, by reduction of HAuCl 4, and further characterized by UV-Vis spectroscopy, X-ray diffraction technique (XRD), and transmission electron microscopy (TEM), etc. The impact of GNPs on PGPR was investigated by Clinical Laboratory Standards Institute (CLSI) recommended Broth-Microdilution technique against four selected PGPR viz., Pseudomonas fluorescens, Bacillus subtilis, Paenibacillus elgii, and Pseudomonas putida. Neither accelerating nor reducing impact was observed in P. putida due to GNPs. On the contrary, significant increase was observed in the case of P. fluorescens, P. elgii, and B. subtilis, and hence, GNPs can be exploited as nano-biofertilizers.
Resumo:
Mixing at low Reynolds number is usually due to diffusion and requires longer channel lengths for complete mixing. In order to reduce the mixing lengths, advective flow can be induced by varying the channel geometry. Additionally, in non-newtonian fluids, appropriate modifications to channel geometry can be used to aid the mixing process by capitalizing on their viscoelastic nature. Here we have exploited the advection and viscoelastic effects to implement a planar passive micro-mixer. Microfluidic devices incorporating different blend of mixing geometries were conceived. The optimum design was chosen based on the results of the numerical simulations performed in COMSOL. The chosen design had sudden expansion and contraction along with teeth patterns along the channel walls to improve mixing. Mixing of two different dyes was performed to validate the mixing efficiency. Particle dispersion experiments were also carried out. The results indicated effective mixing. In addition, the same design was also found to be compatible with electrical power free pumping mechanism like suction. The proposed design was then used to carry out on-chip chemical cell lysis with human whole blood samples to establish its use with non-newtonian fluids. Complete lysis of the erythrocytes was observed leaving behind the white blood cells at the outlet.
Resumo:
Memory models of shared memory concurrent programs define the values a read of a shared memory location is allowed to see. Such memory models are typically weaker than the intuitive sequential consistency semantics to allow efficient execution. In this paper, we present WOMM (abbreviation for Weak Operational Memory Model) that formally unifies two sources of weak behavior in hardware memory models: reordering of instructions and weakly consistent memory. We show that a large number of optimizations are allowed by WOMM. We also show that WOMM is weaker than a number of hardware memory models. Consequently, if a program behaves correctly under WOMM, it will be correct with respect to those hardware memory models. Hence, WOMM can be used as a formally specified abstraction of the hardware memory models. Moreover; unlike most weak memory models, WOMM is described using operational semantics, making it easy to integrate into a model checker for concurrent programs. We further show that WOMM has an important property - it has sequential consistency semantics for datarace-free programs.
Resumo:
A network of ship-mounted real-time Automatic Weather Stations integrated with Indian geosynchronous satellites Indian National Satellites (INSATs)] 3A and 3C, named Indian National Centre for Ocean Information Services Real-Time Automatic Weather Stations (I-RAWS), is established. The purpose of I-RAWS is to measure the surface meteorological-ocean parameters and transmit the data in real time in order to validate and refine the forcing parameters (obtained from different meteorological agencies) of the Indian Ocean Forecasting System (INDOFOS). Preliminary validation and intercomparison of analyzed products obtained from the National Centre for Medium Range Weather Forecasting and the European Centre for Medium-Range Weather Forecasts using the data collected from I-RAWS were carried out. This I-RAWS was mounted on board oceanographic research vessel Sagar Nidhi during a cruise across three oceanic regimes, namely, the tropical Indian Ocean, the extratropical Indian Ocean, and the Southern Ocean. The results obtained from such a validation and intercomparison, and its implications with special reference to the usage of atmospheric model data for forcing ocean model, are discussed in detail. It is noticed that the performance of analysis products from both atmospheric models is similar and good; however, European Centre for Medium-Range Weather Forecasts air temperature over the extratropical Indian Ocean and wind speed in the Southern Ocean are marginally better.