124 resultados para Rolling Meadows
Resumo:
Failures on rolling element bearings usually originate from cracks that are detectable even in their early stage of propogation by properly analyzing vibration signals measured in the proximity of the bearing. Due to micro-slipping in the roller-races contact, damage-induced vibration signals belong to the family of quasi-periodic signals with a strong second order cyclostationary component. Cyclic coherence and its integrated form are widely considered as the most suitable tools for bearing fault diagnostics and their theoretical bases have been already consolidated. This paper presents how to correctly set the parameters of the cyclostationary analysis tool to be implemented in an automatable algorithm. In the first part of the paper some general guidelines are provided for the specific application. These considerations are further verified, applying cyclostationary tools to data collected in an experimental campaign on a specific test-rig.
Resumo:
Monitoring of the integrity of rolling element bearings in the traction system of high speed trains is a fundamental operation in order to avoid catastrophic failures and to implement effective condition-based maintenance strategies. Diagnostics of rolling element bearings is usually based on vibration signal analysis by means of suitable signal processing techniques. The experimental validation of such techniques has been traditionally performed by means of laboratory tests on artificially damaged bearings, while their actual effectiveness in industrial applications, particularly in the field of rail transport, remains scarcely investigated. This paper will address the diagnostics of bearings taken from the service after a long term operation on a high speed train. These worn bearings have been installed on a test-rig, consisting of a complete full-scale traction system of a high speed train, able to reproduce the effects of wheel-track interaction and bogie-wheelset dynamics. The results of the experimental campaign show that suitable signal processing techniques are able to diagnose bearing failures even in this harsh and noisy application. Moreover, the most suitable location of the sensors on the traction system is also proposed.
Resumo:
We propose and evaluate a novel methodology to identify the rolling shutter parameters of a real camera. We also present a model for the geometric distortion introduced when a moving camera with a rolling shutter views a scene. Unlike previous work this model allows for arbitrary camera motion, including accelerations, is exact rather than a linearization and allows for arbitrary camera projection models, for example fisheye or panoramic. We show the significance of the errors introduced by a rolling shutter for typical robot vision problems such as structure from motion, visual odometry and pose estimation.
Resumo:
The objective of this work is to formulate a nonlinear, coupled model of a container ship during parametric roll resonance, and to validate the model using experimental data.
Resumo:
Eleven new human polyomaviruses have been recently discovered, yet for most of these viruses, little is known of their biology and clinical impact. Rolling circle amplification (RCA) is an ideal method for the amplification of the circular polyomavirus genome due to its high fidelity amplification of circular DNA. In this study, a modified RCA method was developed to selectively amplify a range of polyomavirus genomes. Initial evaluation showed a multiplexed temperature-graded reaction profile gave the best yield and sensitivity in amplifying BK polyomavirus in a background of human DNA, with up to 1 × 10(8)-fold increases in viral genomes from as little as 10 genome copies per reaction. Furthermore, the method proved to be more sensitive and provided a 200-fold greater yield than that of random hexamers based standard RCA. Application of the method to other novel human polyomaviruses showed successful amplification of TSPyV, HPyV6, HPyV7, and STLPyV from low-viral load positive clinical samples, with viral genome enrichment ranging from 1 × 10(8) up to 1 × 10(10). This directed RCA method can be applied to selectively amplify other low-copy polyomaviral genomes from a background of competing non-specific DNA, and is a useful tool in further research into the rapidly expanding Polyomaviridae family.
Resumo:
The future functioning of the digital economy is inextricably linked to the use of high-speed broadband networks. As evidenced by recent Australian federal election campaigns, a focus has been on the rollout of the physical networks. The research seeks to determine the effectiveness of the current NBN rollout as a measure of Australia’s progression towards a fully functioning digital economy. The author examines submissions to the recent RTIRC Telecommunications Review 2015 in order to ascertain the NBN’s current impact upon Australia’s digital economy.
Resumo:
Predicting temporal responses of ecosystems to disturbances associated with industrial activities is critical for their management and conservation. However, prediction of ecosystem responses is challenging due to the complexity and potential non-linearities stemming from interactions between system components and multiple environmental drivers. Prediction is particularly difficult for marine ecosystems due to their often highly variable and complex natures and large uncertainties surrounding their dynamic responses. Consequently, current management of such systems often rely on expert judgement and/or complex quantitative models that consider only a subset of the relevant ecological processes. Hence there exists an urgent need for the development of whole-of-systems predictive models to support decision and policy makers in managing complex marine systems in the context of industry based disturbances. This paper presents Dynamic Bayesian Networks (DBNs) for predicting the temporal response of a marine ecosystem to anthropogenic disturbances. The DBN provides a visual representation of the problem domain in terms of factors (parts of the ecosystem) and their relationships. These relationships are quantified via Conditional Probability Tables (CPTs), which estimate the variability and uncertainty in the distribution of each factor. The combination of qualitative visual and quantitative elements in a DBN facilitates the integration of a wide array of data, published and expert knowledge and other models. Such multiple sources are often essential as one single source of information is rarely sufficient to cover the diverse range of factors relevant to a management task. Here, a DBN model is developed for tropical, annual Halophila and temperate, persistent Amphibolis seagrass meadows to inform dredging management and help meet environmental guidelines. Specifically, the impacts of capital (e.g. new port development) and maintenance (e.g. maintaining channel depths in established ports) dredging is evaluated with respect to the risk of permanent loss, defined as no recovery within 5 years (Environmental Protection Agency guidelines). The model is developed using expert knowledge, existing literature, statistical models of environmental light, and experimental data. The model is then demonstrated in a case study through the analysis of a variety of dredging, environmental and seagrass ecosystem recovery scenarios. In spatial zones significantly affected by dredging, such as the zone of moderate impact, shoot density has a very high probability of being driven to zero by capital dredging due to the duration of such dredging. Here, fast growing Halophila species can recover, however, the probability of recovery depends on the presence of seed banks. On the other hand, slow growing Amphibolis meadows have a high probability of suffering permanent loss. However, in the maintenance dredging scenario, due to the shorter duration of dredging, Amphibolis is better able to resist the impacts of dredging. For both types of seagrass meadows, the probability of loss was strongly dependent on the biological and ecological status of the meadow, as well as environmental conditions post-dredging. The ability to predict the ecosystem response under cumulative, non-linear interactions across a complex ecosystem highlights the utility of DBNs for decision support and environmental management.
Resumo:
In this work, we examine unbalanced computation between an initiator and a responder that leads to resource exhaustion attacks in key exchange protocols. We construct models for two cryp-tographic protocols; one is the well-known Internet protocol named Secure Socket Layer (SSL) protocol, and the other one is the Host Identity Protocol (HIP) which has built-in DoS-resistant mechanisms. To examine such protocols, we develop a formal framework based on Timed Coloured Petri Nets (Timed CPNs) and use a simulation approach provided in CPN Tools to achieve a formal analysis. By adopting the key idea of Meadows' cost-based framework and re¯ning the de¯nition of operational costs during the protocol execution, our simulation provides an accurate cost estimate of protocol execution compar- ing among principals, as well as the percentage of successful connections from legitimate users, under four di®erent strategies of DoS attack.
Resumo:
Banana bunchy top is regarded as the most important viral disease of banana, causing significant yield losses worldwide. The disease is caused by Banana bunchy top virus (BBTV), which is a circular ssDNA virus belonging to the genus Babuvirus in the family Nanoviridae. There are currently few effective control strategies for this and other ssDNA viruses. “In Plant Activation” (InPAct) is a novel technology being developed at QUT for ssDNA virus-activated suicide gene expression. The technology exploits the rolling circle replication mechanism of ssDNA viruses and is based on a unique “split” gene design such that suicide gene expression is only activated in the presence of the viral Rep. This PhD project aimed to develop a BBTV-based InPAct system as a suicide gene strategy to control BBTV. The BBTV-based InPAct vector design requires a BBTV intergenic region (IR) to be embedded within an intron in the gene expression cassette. To ensure that the BBTV IR would not interfere with intron splicing, a TEST vector was initially generated that contained the entire BBTV IR embedded within an intron in a β-glucuronidase (GUS) expression vector. Transient GUS assays in banana embryogenic cell suspensions indicated that cryptic intron splice sites were present within the IR. Transcript analysis revealed two cryptic intron splice sites in the Domain III sequence of the CR-M within the IR. Removal of the CR-M from the TEST vector resulted in an enhancement of GUS expression suggesting that the cryptic intron splice sites had been removed. An InPAct GUS vector was subsequently generated that contained the modified BBTV IR, with the CR-M (minus Domain III) repositioned within the InPAct cassette. Using transient histochemical and fluorometric GUS assays in banana embryogenic cells, the InPAct GUS vector was shown to be activated in the presence of the BBTV Rep. However, the presence of both BBTV Rep and Clink was shown to have a deleterious effect on GUS expression suggesting that these proteins were cytotoxic at the levels expressed. Analysis of replication of the InPAct vectors by Southern hybridisation revealed low levels of InPAct cassette-based episomal DNA released from the vector through the nicking/ligation activity of BBTV Rep. However, Rep-mediated episomal replicons, indicative of rolling circle replication of the released circularised cassettes, were not observed. The inability of the InPAct cassette to be replicated was further investigated. To examine whether the absence of Domain III of the CR-M was responsible, a suite of modified BBTV-based InPAct GUS vectors was constructed that contained the CR-M with the inclusion of Domain III, the CR-M with the inclusion of Domain III and additional upstream IR sequence, or no CR-M. Analysis of replication by Southern hybridisation revealed that neither the presence of Domain III, nor the entire CR-M, had an effect on replication levels. Since the InPAct cassette was significantly larger than the native BBTV genomic components (approximately 1 kb), the effect of InPAct cassette size on replication was also investigated. A suite of size variant BBTV-based vectors was constructed that increased the size of a replication competent cassette to 1.1 kbp through to 2.1 kbp.. Analysis of replication by Southern hybridisation revealed that an increase in vector size above approximately 1.5 - 1.7 kbp resulted in a decrease in replication. Following the demonstration of Rep-mediated release, circularisation and expression from the InPAct GUS vector, an InPAct vector was generated in which the uidA reporter gene was replaced with the ribonuclease-encoding suicide gene, barnase. Initially, a TEST vector was generated to assess the cytotoxicity of Barnase on banana cells. Although transient assays revealed a Barnase-induced cytotoxic effect in banana cells, the expression levels were sub-optimal. An InPAct BARNASE vector was generated and tested for BBTV Rep-activated Barnase expression using transient assays in banana embryogenic cells. High levels of background expression from the InPAct BARNASE vector made it difficult to accurately assess Rep-activated Barnase expression. Analysis of replication by Southern hybridisation revealed low levels of InPAct cassette-based episomal DNA released from the vector but no Rep-mediated episomal replicons indicative of rolling circle replication of the released circularised cassettes were again observed. Despite the inability of the InPAct vectors to replicate to enable high level gene expression, the InPAct BARNASE vector was assessed in planta for BBTV Rep-mediated activation of Barnase expression. Eleven lines of transgenic InPAct BARNASE banana plants were generated by Agrobacterium-mediated transformation and were challenged with viruliferous Pentalonia nigronervosa. At least one clonal plant in each line developed bunchy top symptoms and infection was confirmed by PCR. No localised lesions were observed on any plants, nor was there any localised GUS expression in the one InPAct GUS line challenged with viruliferous aphids. The results presented in this thesis are the first study towards the development of a BBTV-based InPAct system as a Rep-activatable suicide gene expression system to control BBTV. Although further optimisation of the vectors is necessary, the preliminary results suggest that this approach has the potential to be an effective control strategy for BBTV. The use of iterons within the InPAct vectors that are recognised by Reps from different ssDNA plant viruses may provide a broad-spectrum resistance strategy against multiple ssDNA plant viruses. Further, this technology holds great promise as a platform technology for the molecular farming of high-value proteins in vitro or in vivo through expression of the ssDNA virus Rep protein.
Resumo:
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.