712 resultados para Calvin Liu
Resumo:
We address robust stabilization problem for networked control systems with nonlinear uncertainties and packet losses by modelling such systems as a class of uncertain switched systems. Based on theories on switched Lyapunov functions, we derive the robustly stabilizing conditions for state feedback stabilization and design packet-loss dependent controllers by solving some matrix inequalities. A numerical example and some simulations are worked out to demonstrate the effectiveness of the proposed design method.
Resumo:
A purified commercial double-walled carbon nanotube (DWCNT) sample was investigated by transmission electron microscopy (TEM), thermogravimetry (TG), and Raman spectroscopy. Moreover, the heat capacity of the DWCNT sample was determined by temperature-modulated differential scanning calorimetry in the range of temperature between -50 and 290 °C. The main thermo-oxidation characterized by TG occurred at 474 °C with the loss of 90 wt% of the sample. Thermo-oxidation of the sample was also investigated by high-resolution TG, which indicated that a fraction rich in carbon nanotube represents more than 80 wt% of the material. Other carbonaceous fractions rich in amorphous coating and graphitic particles were identified by the deconvolution procedure applied to the derivative of TG curve. Complementary structural data were provided by TEM and Raman studies. The information obtained allows the optimization of composites based on this nanomaterial with reliable characteristics.
Resumo:
This is the first volume to capture the essence of the burgeoning field of cultural studies in a concise and accessible manner. Other books have explored the British and North American traditions, but this is the first guide to the ideas, purposes and controversies that have shaped the subject. The author sheds new light on neglected pioneers and a clear route map through the terrain. He provides lively critical narratives on a dazzling array of key figures including, Arnold, Barrell, Bennett, Carey, Fiske, Foucault, Grossberg, Hall, Hawkes, hooks, Hoggart, Leadbeater, Lissistzky, Malevich, Marx, McLuhan, McRobbie, D Miller, T Miller, Morris, Quiller-Couch, Ross, Shaw, Urry, Williams, Wilson, Wolfe and Woolf. Hartley also examines a host of central themes in the subject including literary and political writing, publishing, civic humanism, political economy and Marxism, sociology, feminism, anthropology and the pedagogy of cultural studies.
Resumo:
Previous work by Professor John Frazer on Evolutionary Architecture provides a basis for the development of a system evolving architectural envelopes in a generic and abstract manner. Recent research by the authors has focused on the implementation of a virtual environment for the automatic generation and exploration of complex forms and architectural envelopes based on solid modelling techniques and the integration of evolutionary algorithms, enhanced computational and mathematical models. Abstract data types are introduced for genotypes in a genetic algorithm order to develop complex models using generative and evolutionary computing techniques. Multi-objective optimisation techniques are employed for defining the fitness function in the evaluation process.
Resumo:
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while managing healthcare information. Protecting the security and privacy of healthcare information is a very complex task (Liu, May, Caelli and Croll, 2008b). In order to simplify the complexity of providing security and privacy in HIS, appropriate information security services and mechanisms have to be implemented. Solutions at the application layer have already been implemented in HIS such as those existing in healthcare web services (Weaver et al., 2003). In addition, Discretionary Access Control (DAC) is the most commonly implemented access control model to restrict access to resources at the OS layer (Liu, Caelli, May, Croll and Henricksen, 2007a). Nevertheless, the combination of application security mechanisms and DAC at the OS layer has been stated to be insufficient in satisfying security requirements in computer systems (Loscocco et al., 1998). This thesis investigates the feasibility of implementing Security Enhanced Linux (SELinux) to enforce a Role-Based Access Control (RBAC) policy to help protect resources at the Operating System (OS) layer. SELinux provides Mandatory Access Control (MAC) mechanisms at the OS layer. These mechanisms can contain the damage from compromised applications and restrict access to resources according to the security policy implemented. The main contribution of this research is to provide a modern framework to implement and manage SELinux in HIS. The proposed framework introduces SELinux Profiles to restrict access permissions over the system resources to authorised users. The feasibility of using SELinux profiles in HIS was demonstrated through the creation of a prototype, which was submitted to various attack scenarios. The prototype was also subjected to testing during emergency scenarios, where changes to the security policies had to be made on the spot. Attack scenarios were based on vulnerabilities common at the application layer. SELinux demonstrated that it could effectively contain attacks at the application layer and provide adequate flexibility during emergency situations. However, even with the use of current tools, the development of SELinux policies can be very complex. Further research has to be made in order to simplify the management of SELinux policies and access permissions. In addition, SELinux related technologies, such as the Policy Management Server by Tresys Technologies, need to be researched in order to provide solutions at different layers of protection.
Resumo:
High resolution thermogravimetry has been used to evaluate the carbonaceous content in a commercial sample of single-walled carbon nanotube (SWNT). The content of SWNTs in the sample was found to be at least 77mass% which was supported by images obtained with scanning and transmission electron microscopies (SEM and TEM). Furthermore, the influence of SWNT addition on the thermal stability of graphite in mixtures of SWNT/graphite at different proportions was investigated. The graphite stability decreased with the increased of SWNT content in the overall range of composition. This behavior could be due to the close contact between these carbonaceous species as determined by SEM analysis.
Resumo:
Realistic estimates of short- and long-term (strategic) budgets for maintenance and rehabilitation of road assessment management should consider the stochastic characteristics of asset conditions of the road networks so that the overall variability of road asset data conditions is taken into account. The probability theory has been used for assessing life-cycle costs for bridge infrastructures by Kong and Frangopol (2003), Zayed et.al. (2002), Kong and Frangopol (2003), Liu and Frangopol (2004), Noortwijk and Frangopol (2004), Novick (1993). Salem 2003 cited the importance of the collection and analysis of existing data on total costs for all life-cycle phases of existing infrastructure, including bridges, road etc., and the use of realistic methods for calculating the probable useful life of these infrastructures (Salem et. al. 2003). Zayed et. al. (2002) reported conflicting results in life-cycle cost analysis using deterministic and stochastic methods. Frangopol et. al. 2001 suggested that additional research was required to develop better life-cycle models and tools to quantify risks, and benefits associated with infrastructures. It is evident from the review of the literature that there is very limited information on the methodology that uses the stochastic characteristics of asset condition data for assessing budgets/costs for road maintenance and rehabilitation (Abaza 2002, Salem et. al. 2003, Zhao, et. al. 2004). Due to this limited information in the research literature, this report will describe and summarise the methodologies presented by each publication and also suggest a methodology for the current research project funded under the Cooperative Research Centre for Construction Innovation CRC CI project no 2003-029-C.
Resumo:
This article reports an enhanced solvent casting/particulate (salt) leaching (SCPL) method developed for preparing three-dimensional porous polyurethane (PU) scaffolds for cardiac tissue engineering. The solvent for the preparation of the PU scaffolds was a mixture of dimethylformamide (DFM) and tetrahydrofuran (THF). The enhanced method involved the combination of a conventional SCPL method and a step of centrifugation, with the centrifugation being employed to improve the pore uniformity and the pore interconnectivity of scaffolds. Highly porous three-dimensional scaffolds with a well interconnected porous structure could be achieved at the polymer solution concentration of up to 20% by air or vacuum drying to remove the solvent. When the salt particle sizes of 212-295, 295-425, or 425-531 µm and a 15% w/v polymer solution concentration were used, the porosity of the scaffolds was between 83-92% and the compression moduli of the scaffolds were between 13 kPa and 28 kPa. Type I collagen acidic solution was introduced into the pores of a PU scaffold to coat the collagen onto the pore walls throughout the whole PU scaffold. The human aortic endothelial cells (HAECs) cultured in the collagen-coated PU scaffold for 2 weeks were observed by scanning electron microscopy (SEM). It was shown that the enhanced SCPL method and the collagen coating resulted in a spatially uniform distribution of cells throughout the collagen-coated PU scaffold.
Resumo:
A simple mimetic of a heparan sulfate disaccharide sequence that binds to the growth factors FGF-1 and FGF-2 was synthesized by coupling a 2-azido-2-deoxy-D-glucosyl trichloroacetimidate donor with a 1,6-anhydro-2-azido-2-deoxy--D-glucose acceptor. Both the donor and acceptor were obtained from a common intermediate readily obtained from D-glucal. Molecular docking calculations showed that the predicted locations of the disaccharide sulfo groups in the binding site of FGF-1 and FGF-2 are similar to the positions observed for co-crystallized heparin-derived oligosaccharides obtained from published crystal structures.
Resumo:
An improved synthetic route to α(1→3)/α(1→2)-linked mannooligosaccharides has been developed and applied to a more efficient preparation of the potent anti-angiogenic sulfated pentasaccharide, benzyl Manα(1→3)-Manα(1→3)-Manα(1→3)-Manα(1→2)-Man hexadecasulfate, using only two monosaccharide building blocks. Of particular note are improvements in the preparation of both building blocks and a simpler, final deprotection strategy. The route also provides common intermediates for the introduction of aglycones other than benzyl, either at the building block stage or after oligosaccharide assembly. The anti-angiogenic activity of the synthesized target compound was confirmed via the rat aortic assay.
Resumo:
In Australia, the Queensland fruit fly (B. tryoni), is the most destructive insect pest of horticulture, attacking nearly all fruit and vegetable crops. This project has researched and prototyped a system for monitoring fruit flies so that authorities can be alerted when a fly enters a crop in a more efficient manner than is currently used. This paper presents the idea of our sensor platform design as well as the fruit fly detection and recognition algorithm by using machine vision techniques. Our experiments showed that the designed trap and sensor platform is capable to capture quality fly images, the invasive flies can be successfully detected and the average precision of the Queensland fruit fly recognition is 80% from our experiment.