619 resultados para Damage control (Warships)


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Deploying wireless networks in networked control systems (NCSs) has become more and more popular during the last few years. As a typical type of real-time control systems, an NCS is sensitive to long and nondeterministic time delay and packet losses. However, the nature of the wireless channel has the potential to degrade the performance of NCS networks in many aspects, particularly in time delay and packet losses. Transport layer protocols could play an important role in providing both reliable and fast transmission service to fulfill NCS’s real-time transmission requirements. Unfortunately, none of the existing transport protocols, including the Transport Control Protocol (TCP) and the User Datagram Protocol (UDP), was designed for real-time control applications. Moreover, periodic data and sporadic data are two types of real-time data traffic with different priorities in an NCS. Due to the lack of support for prioritized transmission service, the real-time performance for periodic and sporadic data in an NCS network is often degraded significantly, particularly under congested network conditions. To address these problems, a new transport layer protocol called Reliable Real-Time Transport Protocol (RRTTP) is proposed in this thesis. As a UDP-based protocol, RRTTP inherits UDP’s simplicity and fast transmission features. To improve the reliability, a retransmission and an acknowledgement mechanism are designed in RRTTP to compensate for packet losses. They are able to avoid unnecessary retransmission of the out-of-date packets in NCSs, and collisions are unlikely to happen, and small transmission delay can be achieved. Moreover, a prioritized transmission mechanism is also designed in RRTTP to improve the real-time performance of NCS networks under congested traffic conditions. Furthermore, the proposed RRTTP is implemented in the Network Simulator 2 for comprehensive simulations. The simulation results demonstrate that RRTTP outperforms TCP and UDP in terms of real-time transmissions in an NCS over wireless networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We previously reported a new community-based mosquito control strategy that resulted in elimination of Aedes aegypti (Linn.) in 40 of 46 communes in northern and central Vietnam, and with annual recurrent total costs (direct and indirect) of only $0.28-$0.89 international dollars per person. This control strategy was extended to four provinces in southern Vietnam in Long An and Hau Giang (2004-2007) and to Long An, Ben Tre, and Vinh Long (2005-2010). In a total of 14 communes with 124,743 residents, the mean ± SD of adult female Ae. aegypti was reduced from 0.93 ± 0.62 to 0.06 ± 0.09, and the reduction of immature Ae. aegypti averaged 98.8%. By the final survey, no adults could be collected in 6 of 14 communes, and one commune, Binh Thanh, also had no immature forms. Although the community-based programs also involved community education and clean-up campaigns, the prevalence of Mesocyclops in large water storage containers > 50 liters increased from 12.77 ± 8.39 to 75.69 ± 9.17% over periods of 15-45 months. At the conclusion of the study, no confirmed dengue cases were detected in four of the five communes for which diagnostic serologic analysis was performed. The rate of progress was faster in communes that were added in stages to the program but the reason for this finding was unclear. At the completion of the formal project, sustainability funds were set up to provide each commune with the financial means to ensure that community-based dengue control activities continued.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work presents a collision avoidance approach based on omnidirectional cameras that does not require the estimation of range between two platforms to resolve a collision encounter. Our method achieves minimum separation between the two vehicles involved by maximising the view-angle given by the omnidirectional sensor. Only visual information is used to achieve avoidance under a bearing- only visual servoing approach. We provide theoretical problem formulation, as well as results from real flights using small quadrotors

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The numerical analysis method of cracking in cast-in-place reinforced concrete slabs is presented. T he results agree w ell with the actual conditions. T he current state of knowledge and some new research findings on crack-control are introduced such as increasing the quantities of the distribution steel, adopting fibre reinforced concrete etc. Some recommended crack-control procedures used in design construction is presented based on the investigation and study of cracking in a frame structure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new optimal control model of the interactions between a growing tumour and the host immune system along with an immunotherapy treatment strategy is presented. The model is based on an ordinary differential equation model of interactions between the growing tu- mour and the natural killer, cytotoxic T lymphocyte and dendritic cells of the host immune system, extended through the addition of a control function representing the application of a dendritic cell treat- ment to the system. The numerical solution of this model, obtained from a multi species Runge–Kutta forward-backward sweep scheme, is described. We investigate the effects of varying the maximum al- lowed amount of dendritic cell vaccine administered to the system and find that control of the tumour cell population is best effected via a high initial vaccine level, followed by reduced treatment and finally cessation of treatment. We also found that increasing the strength of the dendritic cell vaccine causes an increase in the number of natural killer cells and lymphocytes, which in turn reduces the growth of the tumour.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Considerate amount of research has proposed optimization-based approaches employing various vibration parameters for structural damage diagnosis. The damage detection by these methods is in fact a result of updating the analytical structural model in line with the current physical model. The feasibility of these approaches has been proven. But most of the verification has been done on simple structures, such as beams or plates. In the application on a complex structure, like steel truss bridges, a traditional optimization process will cost massive computational resources and lengthy convergence. This study presents a multi-layer genetic algorithm (ML-GA) to overcome the problem. Unlike the tedious convergence process in a conventional damage optimization process, in each layer, the proposed algorithm divides the GA’s population into groups with a less number of damage candidates; then, the converged population in each group evolves as an initial population of the next layer, where the groups merge to larger groups. In a damage detection process featuring ML-GA, as parallel computation can be implemented, the optimization performance and computational efficiency can be enhanced. In order to assess the proposed algorithm, the modal strain energy correlation (MSEC) has been considered as the objective function. Several damage scenarios of a complex steel truss bridge’s finite element model have been employed to evaluate the effectiveness and performance of ML-GA, against a conventional GA. In both single- and multiple damage scenarios, the analytical and experimental study shows that the MSEC index has achieved excellent damage indication and efficiency using the proposed ML-GA, whereas the conventional GA only converges at a local solution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent experimental evidence has shown that learning occurs in the host selection behaviour of Helicoverpa armigera (Hübner), one of the world‘s most important agricultural pests. This paper discusses how the occurrence of learning changes our understanding of the host selection behaviour of this polyphagous moth. Host preferences determined from previous laboratory studies may be vastly different from preferences exhibited by moths in the field, where the abundance of particular hosts may be more likely to determine host preference. In support of this prediction, a number of field studies have shown that the ‘attractiveness’ of different hosts for H. armigera oviposition may depend on the relative abundance of these host species. Insect learning may play a fundamental role in the design and application of present and future integrated pest management strategies such as the use of host volatiles, trap crops and resistant crop varieties for monitoring and controlling this important pest species

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The feral pig, Sus scrofa, is a widespread and abundant invasive species in Australia. Feral pigs pose a significant threat to the environment, agricultural industry, and human health, and in far north Queensland they endanger World Heritage values of the Wet Tropics. Historical records document the first introduction of domestic pigs into Australia via European settlers in 1788 and subsequent introductions from Asia from 1827 onwards. Since this time, domestic pigs have been accidentally and deliberately released into the wild and significant feral pig populations have become established, resulting in the declaration of this species as a class 2 pest in Queensland. The overall objective of this study was to assess the population genetic structure of feral pigs in far north Queensland, in particular to enable delineation of demographically independent management units. The identification of ecologically meaningful management units using molecular techniques can assist in targeting feral pig control to bring about effective long-term management. Molecular genetic analysis was undertaken on 434 feral pigs from 35 localities between Tully and Innisfail. Seven polymorphic and unlinked microsatellite loci were screened and fixation indices (FST and analogues) and Bayesian clustering methods were used to identify population structure and management units in the study area. Sequencing of the hyper-variable mitochondrial control region (D-loop) of 35 feral pigs was also examined to identify pig ancestry. Three management units were identified in the study at a scale of 25 to 35 km. Even with the strong pattern of genetic structure identified in the study area, some evidence of long distance dispersal and/or translocation was found as a small number of individuals exhibited ancestry from a management unit outside of which they were sampled. Overall, gene flow in the study area was found to be influenced by environmental features such as topography and land use, but no distinct or obvious natural or anthropogenic geographic barriers were identified. Furthermore, strong evidence was found for non-random mating between pigs of European and Asian breeds indicating that feral pig ancestry influences their population genetic structure. Phylogenetic analysis revealed two distinct mitochondrial DNA clades, representing Asian domestic pig breeds and European breeds. A significant finding was that pigs of Asian origin living in Innisfail and south Tully were not mating randomly with European breed pigs populating the nearby Mission Beach area. Feral pig control should be implemented in each of the management units identified in this study. The control should be coordinated across properties within each management unit to prevent re-colonisation from adjacent localities. The adjacent rainforest and National Park Estates, as well as the rainforest-crop boundary should be included in a simultaneous control operation for greater success.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless networked control systems (WNCSs) have been widely used in the areas of manufacturing and industrial processing over the last few years. They provide real-time control with a unique characteristic: periodic traffic. These systems have a time-critical requirement. Due to current wireless mechanisms, the WNCS performance suffers from long time-varying delays, packet dropout, and inefficient channel utilization. Current wirelessly networked applications like WNCSs are designed upon the layered architecture basis. The features of this layered architecture constrain the performance of these demanding applications. Numerous efforts have attempted to use cross-layer design (CLD) approaches to improve the performance of various networked applications. However, the existing research rarely considers large-scale networks and congestion network conditions in WNCSs. In addition, there is a lack of discussions on how to apply CLD approaches in WNCSs. This thesis proposes a cross-layer design methodology to address the issues of periodic traffic timeliness, as well as to promote the efficiency of channel utilization in WNCSs. The design of the proposed CLD is highlighted by the measurement of the underlying network condition, the classification of the network state, and the adjustment of sampling period between sensors and controllers. This period adjustment is able to maintain the minimally allowable sampling period, and also maximize the control performance. Extensive simulations are conducted using the network simulator NS-2 to evaluate the performance of the proposed CLD. The comparative studies involve two aspects of communications, with and without using the proposed CLD, respectively. The results show that the proposed CLD is capable of fulfilling the timeliness requirement under congested network conditions, and is also able to improve the channel utilization efficiency and the proportion of effective data in WNCSs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper outlines an innovative and feasible flight control scheme for a rotary-wing unmanned aerial system (RUAS) with guaranteed safety and reliable flight quality in a gusty environment. The proposed control methodology aims to increase gust-attenuation capability of a RUAS to ensure improved flight performance when strong gusts occur. Based on the design of an effective estimator, an altitude controller is firstly constructed to synchronously compensate for fluctuations of the main rotor thrust which might lead to crashes in a gusty environment. Afterwards, a nonlinear state feedback controller is proposed to stabilize horizontal positions of the RUAS with gust-attenuation property. Performance of the proposed control framework is evaluated using parameters of a Vario XLC helicopter and high-fidelity simulations show that the proposed controllers can effectively reduce side-effect of gusts and demonstrate performance improvement when compared with the proportional-integral-derivative (PID) controllers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Crude petroleum remains the single most imported commodity into Australia and is sourced from a number of countries around the world (Department of Foreign Affairs and Trade (DFAT), 2011a). While interest in crude petroleum is widespread, in recent years Australia's focus has been drawn to the continent of Africa, where increased political stability, economic recovery and an improved investment climate has made one of the largest oil reserves in the world increasingly more attractive. Despite improvement across the continent, there remain a number of risks which have the potential to significantly damage Australia's economic interests in the petroleum sector,including government policies and legislation, corruption and conflict. The longest exporters of crude petroleum products to Australia – Nigeria and Libya – have been subject to these factors in recent years and, accordingly, are the focus of this paper. Once identified, the impact of political instability, conflict, government corruption and other risk factors to Australia's mining interests within these countries is examined, and efforts to manage such risks are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis was a step forward in improving the stability of power systems by applying new control and modelling techniques. The developed methods use the data obtained from voltage angle measurement devices which are synchronized with GPS signals to stabilize the system and avoid system-wide blackouts in the event of severe faults. New approaches were developed in this research for identifying and estimating reduced dynamic system models using phasor measurement units. The main goal of this research is achieved by integrating the developed methods to obtain a feasible wide-area control system for stabilizing the power systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis investigated the viability of using Frequency Response Functions in combination with Artificial Neural Network technique in damage assessment of building structures. The proposed approach can help overcome some of limitations associated with previously developed vibration based methods and assist in delivering more accurate and robust damage identification results. Excellent results are obtained for damage identification of the case studies proving that the proposed approach has been developed successfully.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: Epidemiologic research has demonstrated that cutaneous markers of photo-damage are associated with risk of basal cell carcinoma (BCC). However there has been no previous attempt to calculate pooled risk estimates. METHODS: We conducted a systematic review and meta-analysis after extracting relevant studies published up to January 2013 from five electronic databases. Eligible studies were those that permitted quantitative assessment of the association between histologically-confirmed BCC and actinic keratoses, solar elastosis, solar lentigines, or telangiectasia. RESULTS: Seven eligible studies were identified and summary odds ratios (OR) were calculated using both random and quality effects models. Having more than ten actinic keratoses was most strongly associated with BCC, conferring up to a 5-fold increase in risk (OR: 4.97; 95% CI: 3.26, 7.58). Other factors, including solar elastosis, solar lentigines, and telangiectasia had weaker but positive associations with BCC with ORs around 1.5. CONCLUSIONS: Markers of chronic photo-damage are positively associated with BCC. The presence of actinic keratoses was the most strongly associated with BCC of the markers examined. IMPACT: This work highlights the relatively modest association between markers of chronic ultraviolet exposure and BCC.