300 resultados para configuration


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Designers of systems that attempt to support people in maintaining social connectedness should pay attention to the physical interaction characteristics of the systems they create. Systems today mostly accept the dominant computer interface configuration of screens, keyboards and mice, which are not always a good fit for settings outside the office, such as the home. We argue by reference to two design exemplars for a design philosophy that engages a broader range of people's abilities for skilled physical action when designing for social connectedness.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The reliable operation of the electrical system at Callide Power Station is of extreme importance to the normal everyday running of the Station. This study applied the principles of reliability to do an analysis on the electrical system at Callide Power Station. It was found that the level of expected outage cost increased exponentially with a declining level of maintenance. Concluding that even in a harsh economic electricity market where CS Energy tries and push their plants to the limit, maintenance must not be neglected. A number of system configurations were found to increase the reliability of the system and reduce the expected outage costs. A number of other advantages were identified as a result of using reliability principles to do this study on the Callide electrical system configuration.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Due to increased complexity, scale, and functionality of information and telecommunication (IT) infrastructures, every day new exploits and vulnerabilities are discovered. These vulnerabilities are most of the time used by ma¬licious people to penetrate these IT infrastructures for mainly disrupting business or stealing intellectual pro¬perties. Current incidents prove that it is not sufficient anymore to perform manual security tests of the IT infra¬structure based on sporadic security audits. Instead net¬works should be continuously tested against possible attacks. In this paper we present current results and challenges towards realizing automated and scalable solutions to identify possible attack scenarios in an IT in¬frastructure. Namely, we define an extensible frame¬work which uses public vulnerability databases to identify pro¬bable multi-step attacks in an IT infrastructure, and pro¬vide recommendations in the form of patching strategies, topology changes, and configuration updates.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

ZnO is a wide band-gap semiconductor that has several desirable properties for optoelectronic devices. With its large exciton binding energy of ~60 meV, ZnO is a promising candidate for high stability, room-temperature luminescent and lasing devices [1]. Ultraviolet light-emitting diodes (LEDs) based on ZnO homojunctions had been reported [2,3], while preparing stable p-type ZnO is still a challenge. An alternative way is to use other p-type semiconductors, ether inorganic or organic, to form heterojunctions with the naturally n-type ZnO. The crystal structure of wurtzite ZnO can be described as Zn and O atomic layers alternately stacked along the [0001] direction. Because of the fastest growth rate over the polar (0001) facet, ZnO crystals tend to grow into one-dimensional structures, such as nanowires and nanobelts. Since the first report of ZnO nanobelts in 2001 [4], ZnO nanostructures have been particularly studied for their potential applications in nano-sized devices. Various growth methods have been developed for growing ZnO nanostructures, such as chemical vapor deposition (CVD), Metal-organic CVD (MOCVD), aqueous growth and electrodeposition [5]. Based on the successful synthesis of ZnO nanowires/nanorods, various types of hybrid light-emitting diodes (LEDs) were made. Inorganic p-type semiconductors, such as GaN, Si and SiC, have been used as substrates to grown ZnO nanorods/nanowires for making LEDs. GaN is an ideal material that matches ZnO not only in the crystal structure but also in the energy band levels. However, to prepare Mg-doped p-GaN films via epitaxial growth is still costly. In comparison, the organic semiconductors are inexpensive and have many options to select, for a large variety of p-type polymer or small-molecule semiconductors are now commercially available. The organic semiconductor has the limitation of durability and environmental stability. Many polymer semiconductors are susceptible to damage by humidity or mere exposure to oxygen in the air. Also the carrier mobilities of polymer semiconductors are generally lower than the inorganic semiconductors. However, the combination of polymer semiconductors and ZnO nanostructures opens the way for making flexible LEDs. There are few reports on the hybrid LEDs based on ZnO/polymer heterojunctions, some of them showed the characteristic UV electroluminescence (EL) of ZnO. This chapter reports recent progress of the hybrid LEDs based on ZnO nanowires and other inorganic/organic semiconductors. We provide an overview of the ZnO-nanowire-based hybrid LEDs from the perspectives of the device configuration, growth methods of ZnO nanowires and the selection of p-type semiconductors. Also the device performances and remaining issues are presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Different types of HTS joints of Bi-2212/Ag tapes and laminates, which are fabricated by dip-coating and partial-melt processes, have been investigated. All joints are prepared using green single and laminated tapes and according to the scheme: coating-joining-processing. The heat treated tapes have critical current (Ic) between 7 and 27 A, depending on tape thickness and the number of Bi-2212 ceramic layers in laminated tapes. It is found that the current transport properties of joints depend on the type of laminate, joint configuration and joint treatment, Ic losses in joints of Bi-2212 tapes and laminates are attributed to defects in their structure, such as pores, secondary phases and misalignment of Bi-2212 grains near the Ag edges. By optimizing joint configuration, current transmission up to 100% is achieved for both single tapes and laminated tapes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Conspicuity limitations make bicycling at night dangerous. This experiment quantified bicyclists’ estimates of the distance at which approaching drivers would first recognize them. Twenty five participants (including 13 bicyclists who rode at least once per week, and 12 who rode once per month or less) cycled in place on a closed-road circuit at night-time and indicated when they were confident that an approaching driver would first recognize that a bicyclist was present. Participants wore black clothing alone or together with a fluorescent bicycling vest, a fluorescent bicycling vest with additional retroreflective tape, or the fluorescent retroreflective vest plus ankle and knee reflectors in a modified ‘biomotion’ configuration. The bicycle had a light mounted on the handlebars which was either static, flashing or off. Participants judged that black clothing made them least visible, retroreflective strips on the legs in addition to a retroreflective vest made them most visible and that adding retroreflective materials to a fluorescent vest provides no conspicuity benefits. Flashing bicycle lights were associated with higher conspicuity than static lights. Additionally, occasional bicyclists judged themselves to be more visible than did frequent bicyclists. Overall, bicyclists overestimated their conspicuity compared to previously collected recognition distances and underestimated the conspicuity benefits of retroreflective markings on their ankles and knees. Participants mistakenly judged that a fluorescent vest that did not include retroreflective material would enhance their night-time conspicuity. These findings suggest that bicyclists have dangerous misconceptions concerning the magnitude of the night-time conspicuity problem and the potential value of conspicuity treatments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Today, there are growing concerns about the presence of environmental pollutants in many parts of the world. In particular, a lot of attention has been drawn to the levels of water and soil contaminants (de Paiva et al., 2008). The majority of these contaminants consist of NOCs (non-ionic organic compounds) and can enter our waterways through industrial activities, mining operations, crop and animal production, waste disposal and accidental leakage (de Paiva et al., 2008; Park et al., 2011). Therefore, there is an increased interest in the synthesis of new materials that can be used to remove potentially carcinogenic and toxic water contaminants. Smectite type organoclays are widely used in numerous applications, such as sorbent agents for environmental remediation, due to their unique properties (Jiunn-Fwu et al., 1990; Sheng et al., 1996; Zhou et al., 2007; Bektas et al., 2011; Park et al., 2011). This investigation focuses on beidellite (SBId-1), which belongs to the smectite clay family. Their properties include high cation exchange capacity (CEC), swelling properties, porous, high surface area and consequential strong adsorption/absorption capacity (Xi et al., 2007). However, swelling clays in general are not an effective sorbent agent in nature due to their hydrophilic properties. The hydrophilic properties of the clay can be changed to organophilic by intercalating a cationic surfactant. Many applications of organoclays are strongly dependent on their structural properties and hence, a better understanding of the configuration and structural change of organoclay is crucial. Organoclays were synthesised through ion exchange of 21CODTMA (MW: 392.5 g mol-1) and characterised using XRD and FTIR spectroscopy. This study investigates the structural and conformational changes of beidellite intercalated with octadecyltrimethylammonium bromide.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years, organoclays have become widely used in many industrial applications, and particularly they have been applied as adsorbents for water purification (de Paiva et al., 2008; Zhou et al., 2008; Park et al., 2011). When the organoclays are enhanced by intercalation of cationic surfactant molecules, the surface properties are altered from hydrophilic to highly hydrophobic. These changes facilitate their industrial applications which are strongly dependent on the structural properties of organoclays (Koh and Dixon, 2001; Zeng et al., 2004; Cui et al., 2007). Thus a better understanding of the configuration and structural change in the organoclays by thermogravimetric analysis (TG) is essential. It has been proven that the TG is very useful for the study of complex minerals, modified minerals, and nanomaterials (Laachachi et al., 2005; Palmer et al., 2011; Park et al., in press, 2011). Therefore, the current investigation involves the thermal stability of a montmorillonite intercalated with two types of cationic surfactants: dodecyltrimethylammonium bromide (DDTMA) and didodecyldimethylammonium bromide (DDDMA) using TG. The modification of montmorillonite results in an increase in the interlayer or basal spacing and enhances the environmental and industrial application of the obtained organoclay.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Extra corporeal membrane oxygenation (ECMO) is a complex rescue therapy used to provide cardiac and/or respiratory support for critically ill patients who have failed maximal conventional medical management. ECMO is based on a modified cardiopulmonary bypass (CPB) circuit, and can provide cardiopulmonary support for up-to several months. It can be used in a veno venous configuration for isolated respiratory failure, (VV-ECMO), or in a veno arterial configuration (VA-ECMO) where support is necessary for cardiac +/- respiratory failure. The ECMO circuit consists of five main components: large bore cannulae (access cannulae) for drainage of the venous system, and return cannulae to either the venous (in VV-ECMO) or arterial (in VA ECMO) system. An oxygenator, with a vast surface area of hollow filaments, allows addition of oxygen and removal of carbon dioxide; a centrifugal blood pump allows propulsion of blood through the circuit at upto 10 L/minute; a control module and a thermoregulatory unit, which allows for exact temperature control of the extra corporeal blood. Methods: The first successful use of ECMO for ARDS in adults occurred in 1972, and its use has become more commonplace over the last 30 years, supported by the improvement in design and biocompatibility of the equipment, which has reduced the morbidity associated with this modality. Whilst the use of ECMO in neonatal population has been supported by numerous studies, the evidence upon which ECMO was integrated into adult practice was substantially less robust. Results: Recent data, including the CESAR study (Conventional Ventilatory Support versus Extra corporeal membrane oxygenation for Severe Respiratory failure) has added a degree of evidence to the role of ECMO in such a patient population. The CESAR study analysed 180 patients, and confirmed that ECMO was associated with an improved rate of survival. More recently, ECMO has been utilized in numerous situations within the critical care area, including support in high-risk percutaneous interventions in cardiac catheter lab; the operating room, emergency department, as well in specialized inter-hospital retrieval services. The increased understanding of the risk:benefit profile of ECMO, along with a reduction in morbidity associated with its use will doubtless lead to a substantial rise in the utilisation of this modality. As with all extra-corporeal circuits, ECMO opposes the basic premises of the mammalian inflammation and coagulation cascade where blood comes into foreign circulation, both these cascades are activated. Anti-coagulation is readily dealt with through use of agents such as heparin, but the inflammatory excess, whilst less macroscopically obvious, continues un-abated. Platelet consumption and neutrophil activation occur rapidly, and the clinician is faced with balancing the need of anticoagulation for the circuit, against haemostasis in an acutely bleeding patient. Alterations in pharmacokinetics may result in inadequate levels of disease modifying therapeutics, such as antibiotics, hence paradoxically delaying recovery from conditions such as pneumonia. Key elements of nutrition and the innate immune system maysimilarly be affected. Summary: This presentation will discuss the basic features of ECMO to the nonspecialist, and review the clinical conundrum faced by the team treating these most complex cases.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper investigates the response of multi-storey structures under simulated earthquake loads with friction dampers, viscoelastic dampers and combined friction-viscoelastic damping devices strategically located within shear walls. Consequently, evaluations are made as to how the damping systems affect the seismic response of these structures with respect to deflections and accelerations. In particular, this paper concentrates on the effects of damper types, configurations and their locations within the cut-outs of shear walls. The initial stiffness of the cut out section of the shear wall is removed and replaced by the stiffness and damping of the device. Influence of parameters of damper properties such as stiffness, damping coefficient, location, configuration and size are studied and evaluated using results obtained under several different earthquake scenarios. Structural models with cut outs at different heights are treated in order to establish the effectiveness of the dampers and their optimal placement. This conceptual study has demonstrated the feasibility of mitigating the seismic response of building structures by using embedded dampers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighbouring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighbouring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools. Comparison to probabilistic schemes shows that our combinatorial approach produces better connectivity with smaller key-chain sizes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Large igneous provinces (LIPs) host the most frequently recurring, largest volume basaltic & silicic eruptions on Earth. The largest volume (>1000 km^3 DRE) and magnitude (>M8) eruptions produce areally extensive (10^4-10^5 km^2) basaltic flow fields and sills, and silicic ignimbrites that are the main LIP building blocks. Basaltic and silicic eruptions have comparable magnitudes, but silicic ignimbrite volumes may be significantly underestimated due to unrecognized and correlated, but voluminous co-ignimbrite ash deposits. Magma composition is no barrier to individual eruption volume. Despite similar magnitudes, flood basaltic and silicic eruptions are very different in eruption mechanism, duration, intensity, vent configuration, and emplacement style. Flood basalts are dominantly effusive Hawaiian-Strombolian, with magma discharge rates of ~10^7-10^8 kg s^-1, and produce dominantly compound pahoehoe flow fields over eruption durations most likely >10 yrs. Most silicic eruptions are moderately to highly explosive, producing cocurrent pyroclastic fountains (rarely Plinian) and suggested to be of short-duration (hours to days) and high intensity (~10^11 kg s^-1). Eruption frequencies are elevated for largemagnitude eruptions of both magma types during LIP formation. In basalt-dominated provinces, large magnitude (>M8) eruptions have much shorter recurrence intervals (10^3-10^4 years) than similar magnitude silicic eruptions (~10^5 years). The huge volumes of magma erupted rapidly in LIPs raises several unresolved issues in terms of locus of magma generation and storage (if any) in the crust prior to eruption, the paths and rates of ascent from magma reservoirs to the surface, and relative aerosol contributions to the stratosphere from the flood basaltic and rhyolitic eruptions.