303 resultados para nanocomposite strain sensor


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Hamstring strain injuries (HSIs) are prevalent in sport and re-injury rates have been high for many years. Whilst much focus has centred on the impact of previous hamstring strain injury on maximal eccentric strength, high rates of torque development is also of interest, given the important role of the hamstrings during the terminal swing phase of gait. The impact of prior strain injury on neuromuscular function of the hamstrings during tasks requiring high rates of torque development has received little attention. The purpose of this study is to determine if recreational athletes with a history of unilateral hamstring strain injury, who have returned to training and competition, will exhibit lower levels of eccentric muscle activation, rate of torque development and impulse 30, 50 and 100ms after the onset of electromyographical or torque development in the previously injured limb compared to the uninjured limb. Methods: Twenty-six recreational athletes were recruited. Of these, 13 athletes had a history of unilateral hamstring strain injury (all confined to biceps femoris long head) and 13 had no history of hamstring strain injury. Following familiarisation, all athletes undertook isokinetic dynamometry testing and surface electromyography assessment of the biceps femoris long head and medial hamstrings during eccentric contractions at -60 and -1800.s-1. Results: In the injured limb of the injured group, compared to the contralateral uninjured limb rate of torque development and impulse was lower during -600.s-1 eccentric contractions at 50 (RTD, p=0.008; IMP, p=0.005) and 100ms (RTD, p=0.001; IMP p<0.001) after the onset of contraction. There was also a non-significant trend for rate of torque development during -1800.s-1 to be lower 100ms after onset of contraction (p=0.064). Biceps femoris long head muscle activation was lower at 100ms at both contraction speeds (-600.s-1, p=0.009; -1800.s-1, p=0.009). Medial hamstring activation did not differ between limbs in the injured group. Comparisons in the uninjured group showed no significant between limbs difference for any variables. Conclusion: Previously injured hamstrings displayed lower rate of torque development and impulse during eccentric contraction. Lower muscle activation was confined to the biceps femoris long head. Regardless of whether these deficits are the cause of or the result of injury, these findings have important implications for hamstring strain injury and re-injury and suggest greater attention be given to neural function of the knee flexors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives This study evaluated the heat strain experienced by armored vehicle officers (AVOs) wearing personal body armor (PBA) in a sub-tropical climate. Methods Twelve male AVOs, aged 35-58 years, undertook an eight hour shift while wearing PBA. Heart rate and core temperature were monitored continuously. Urine specific gravity (USG) was measured before and after, and with any urination during the shift. Results Heart rate indicated an intermittent and low-intensity nature of the work. USG revealed six AVOs were dehydrated from pre through post shift, and two others became dehydrated. Core temperature averaged 37.4 ± 0.3°C, with maximum's of 37.7 ± 0.2°C. Conclusions Despite increased age, body mass, and poor hydration practices, and Wet-Bulb Globe Temperatures in excess of 30°C; the intermittent nature and low intensity of the work prevented excessive heat strain from developing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Maize streak virus (MSV), which causes maize streak disease (MSD), is one of the most serious biotic threats to African food security. Here, we use whole MSV genomes sampled over 30 years to estimate the dates of key evolutionary events in the 500 year association of MSV and maize. The substitution rates implied by our analyses agree closely with those estimated previously in controlled MSV evolution experiments, and we use them to infer the date when the maize-adapted strain, MSV-A, was generated by recombination between two grass-adapted MSV strains. Our results indicate that this recombination event occurred in the mid-1800s, ∼20 years before the first credible reports of MSD in South Africa and centuries after the introduction of maize to the continent in the early 1500s. This suggests a causal link between MSV recombination and the emergence of MSV-A as a serious pathogen of maize. © 2009 SGM.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Maize streak virus strain A (MSV-A), the causal agent of maize streak disease, is today one of the most serious biotic threats to African food security. Determining where MSV-A originated and how it spread transcontinentally could yield valuable insights into its historical emergence as a crop pathogen. Similarly, determining where the major extant MSV-A lineages arose could identify geographical hot spots of MSV evolution. Here, we use model-based phylogeographic analyses of 353 fully sequenced MSV-A isolates to reconstruct a plausible history of MSV-A movements over the past 150 years. We show that since the probable emergence of MSV-A in southern Africa around 1863, the virus spread transcontinentally at an average rate of 32.5 km/year (95% highest probability density interval, 15.6 to 51.6 km/year). Using distinctive patterns of nucleotide variation caused by 20 unique intra-MSV-A recombination events, we tentatively classified the MSV-A isolates into 24 easily discernible lineages. Despite many of these lineages displaying distinct geographical distributions, it is apparent that almost all have emerged within the past 4 decades from either southern or east-central Africa. Collectively, our results suggest that regular analysis of MSV-A genomes within these diversification hot spots could be used to monitor the emergence of future MSV-A lineages that could affect maize cultivation in Africa. © 2011, American Society for Microbiology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: Eccentric exercise has become the treatment of choice for Achilles tendinopathy. However, little is known about the acute response of tendons to eccentric exercise or the mechanisms underlying its clinical benefit. This research evaluated the sonographic characteristics and acute anteroposterior (AP) strain response of control (healthy), asymptomatic, and symptomatic Achilles tendons to eccentric exercise. Methods: Eleven male adults with unilateral midportion Achilles tendinopathy and nine control male adults without tendinopathy participated in the research. Sagittal sonograms of the Achilles tendon were acquired immediately before and after completion of a common eccentric rehabilitation exercise protocol and again 24 h later. Tendon thickness, echogenicity, and AP strain were determined 40 mm proximal to the calcaneal insertion. Results: Compared with the control tendon, both the asymptomatic and symptomatic tendons were thicker (P < 0.05) and hypoechoic (P < 0.05) at baseline. All tendons decreased in thickness immediately after eccentric exercise (P < 0.05). The symptomatic tendon was characterized by a significantly lower AP strain response to eccentric exercise compared with both the asymptomatic and control tendons (P < 0.05). AP strains did not differ in the control and asymptomatic tendons. For all tendons, preexercise thickness was restored 24 h after exercise completion. Conclusions: These observations support the concept that Achilles tendinopathy is a bilateral or systemic process and structural changes associated with symptomatic tendinopathy alter fluid movement within the tendon matrix. Altered fluid movement may disrupt remodeling and homeostatic processes and represents a plausible mechanism underlying the progression of tendinopathy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vertical displacements are one of the most relevant parameters for structural health monitoring of bridges in both the short and long terms. Bridge managers around the globe are always looking for a simple way to measure vertical displacements of bridges. However, it is difficult to carry out such measurements. On the other hand, in recent years, with the advancement of fiber-optic technologies, fiber Bragg grating (FBG) sensors are more commonly used in structural health monitoring due to their outstanding advantages including multiplexing capability, immunity of electromagnetic interference as well as high resolution and accuracy. For these reasons, using FBG sensors is proposed to develop a simple, inexpensive and practical method to measure vertical displacements of bridges. A curvature approach for vertical displacement measurements using curvature measurements is proposed. In addition, with the successful development of FBG tilt sensors, an inclination approach is also proposed using inclination measurements. A series of simulation tests of a full- scale bridge was conducted. It shows that both of the approaches can be implemented to determine vertical displacements for bridges with various support conditions, varying stiffness (EI) along the spans and without any prior known loading. These approaches can thus measure vertical displacements for most of slab-on-girder and box-girder bridges. Besides, the approaches are feasible to implement for bridges under various loading. Moreover, with the advantages of FBG sensors, they can be implemented to monitor bridge behavior remotely and in real time. A beam loading test was conducted to determine vertical displacements using FBG strain sensors and tilt sensors. The discrepancies as compared with dial gauges reading using the curvature and inclination approaches are 0.14mm (1.1%) and 0.41mm (3.2%), respectively. Further recommendations of these approaches for developments will also be discussed at the end of the paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Reliable communications is one of the major concerns in wireless sensor networks (WSNs). Multipath routing is an effective way to improve communication reliability in WSNs. However, most of existing multipath routing protocols for sensor networks are reactive and require dynamic route discovery. If there are many sensor nodes from a source to a destination, the route discovery process will create a long end-to-end transmission delay, which causes difficulties in some time-critical applications. To overcome this difficulty, the efficient route update and maintenance processes are proposed in this paper. It aims to limit the amount of routing overhead with two-tier routing architecture and introduce the combination of piggyback and trigger update to replace the periodic update process, which is the main source of unnecessary routing overhead. Simulations are carried out to demonstrate the effectiveness of the proposed processes in improvement of total amount of routing overhead over existing popular routing protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter presents a comparative survey of recent key management (key distribution, discovery, establishment and update) solutions for wireless sensor networks. We consider both distributed and hierarchical sensor network architectures where unicast, multicast and broadcast types of communication take place. Probabilistic, deterministic and hybrid key management solutions are presented, and we determine a set of metrics to quantify their security properties and resource usage such as processing, storage and communication overheads. We provide a taxonomy of solutions, and identify trade-offs in these schemes to conclude that there is no one-size-fits-all solution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Secure communications between large number of sensor nodes that are randomly scattered over a hostile territory, necessitate efficient key distribution schemes. However, due to limited resources at sensor nodes such schemes cannot be based on post deployment computations. Instead, pairwise (symmetric) keys are required to be pre-distributed by assigning a list of keys, (a.k.a. key-chain), to each sensor node. If a pair of nodes does not have a common key after deployment then they must find a key-path with secured links. The objective is to minimize the keychain size while (i) maximizing pairwise key sharing probability and resilience, and (ii) minimizing average key-path length. This paper presents a deterministic key distribution scheme based on Expander Graphs. It shows how to map the parameters (e.g., degree, expansion, and diameter) of a Ramanujan Expander Graph to the desired properties of a key distribution scheme for a physical network topology.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current state of the art robot mapping and navigation systems produce impressive performance under a narrow range of robot platform, sensor and environmental conditions, in contrast to animals such as rats that produce “good enough” maps that enable them to function under an incredible range of situations. In this paper we present a rat-inspired featureless sensor-fusion system that assesses the usefulness of multiple sensor modalities based on their utility and coherence for place recognition during a navigation task, without knowledge as to the type of sensor. We demonstrate the system on a Pioneer robot in indoor and outdoor environments with abrupt lighting changes. Through dynamic weighting of the sensors, the system is able to perform correct place recognition and mapping where the static sensor weighting approach fails.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As a novel sensitive element and due to its advantages of immunity to electrical interference, distributed measurement, etc., fiber Bragg grating (FBG) has been researched widely. To realize the substitution of high accurate electronic temperature sensors, high sensitive FBG temperature sensors can be made by taking advantage of its characters of being sensitive to both temperature and strain. Although there are reports about high sensitive FBG temperature sensors, however, few about their stability have been done. We manufactured a high sensitive FBG temperature sensor, and put it together with an average FBG temperature sensor and an electronic crystal temperature sensor into a stainless steel container filled by water to observe the room temperature change. By comparing their results in two weeks, we have found out that: although the high sensitive FBG temperature sensor is in much better agreement with the electronic crystal sensor than the average FBG sensor is, it has occurred some small drifts. Because the drifts appeared in the process of further pulling the FBG, it might be a result of the slip of the FBG fixing points. This contributes some good experiences to the application of FBG in high accuracy temperature measurement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article proposes an approach for real-time monitoring of risks in executable business process models. The approach considers risks in all phases of the business process management lifecycle, from process design, where risks are defined on top of process models, through to process diagnosis, where risks are detected during process execution. The approach has been realized via a distributed, sensor-based architecture. At design-time, sensors are defined to specify risk conditions which when fulfilled, are a likely indicator of negative process states (faults) to eventuate. Both historical and current process execution data can be used to compose such conditions. At run-time, each sensor independently notifies a sensor manager when a risk is detected. In turn, the sensor manager interacts with the monitoring component of a business process management system to prompt the results to process administrators who may take remedial actions. The proposed architecture has been implemented on top of the YAWL system, and evaluated through performance measurements and usability tests with students. The results show that risk conditions can be computed efficiently and that the approach is perceived as useful by the participants in the tests.