71 resultados para Poisoning, Accidental
Resumo:
This paper presents a recursive strategy for online detection of actuator faults on a unmanned aerial system (UAS) subjected to accidental actuator faults. The proposed detection algorithm aims to provide a UAS with the capability of identifying and determining characteristics of actuator faults, offering necessary flight information for the design of fault-tolerant mechanism to compensate for the resultant side-effect when faults occur. The proposed fault detection strategy consists of a bank of unscented Kalman filters (UKFs) with each one detecting a specific type of actuator faults and estimating correspond- ing velocity and attitude information. Performance of the proposed method is evaluated using a typical nonlinear UAS model and it is demonstrated in simulations that our method is able to detect representative faults with a sufficient accuracy and acceptable time delay, and can be applied to the design of fault-tolerant flight control systems of UASs.
Resumo:
Many software applications extend their functionality by dynamically loading executable components into their allocated address space. Such components, exemplified by browser plugins and other software add-ons, not only enable reusability, but also promote programming simplicity, as they reside in the same address space as their host application, supporting easy sharing of complex data structures and pointers. However, such components are also often of unknown provenance and quality and may be riddled with accidental bugs or, in some cases, deliberately malicious code. Statistics show that such component failures account for a high percentage of software crashes and vulnerabilities. Enabling isolation of such fine-grained components is therefore necessary to increase the stability, security and resilience of computer programs. This thesis addresses this issue by showing how host applications can create isolation domains for individual components, while preserving the benefits of a single address space, via a new architecture for software isolation called LibVM. Towards this end, we define a specification which outlines the functional requirements for LibVM, identify the conditions under which these functional requirements can be met, define an abstract Application Programming Interface (API) that encompasses the general problem of isolating shared libraries, thus separating policy from mechanism, and prove its practicality with two concrete implementations based on hardware virtualization and system call interpositioning, respectively. The results demonstrate that hardware isolation minimises the difficulties encountered with software based approaches, while also reducing the size of the trusted computing base, thus increasing confidence in the solution’s correctness. This thesis concludes that, not only is it feasible to create such isolation domains for individual components, but that it should also be a fundamental operating system supported abstraction, which would lead to more stable and secure applications.
Resumo:
Distribution through electronic media provides an avenue for promotion, recognition and an outlet of display for graphic designers. The emergence of available media technologies have enabled graphic designers to extend these boundaries of their practice. In this context the designer is constantly striving for aesthetic success and is strongly influenced by the fashion and trends of contemporary design work. The designer is always in a state of inquiry, finding pathways of discovery that lead to innovation and originality that are highly valued criteria for self-evaluation. This research is based on an analysis of the designer perspective and the processes used within an active graphic design practice specializing entirely within a digital collage domain. Contemporary design methodologies were critically examined, compared and refined to reflect the self-practice of the researcher. The refined methodology may assist designers in maintaining systematic work practices, as well as promote the importance of exploration and experimentation processes. Research findings indicate some differences in the identified methodologies and the design practice of the researcher in the sense that many contemporary designers are not confined to a client-base but are self-generating design images influenced by contemporary practitioners. As well as confirming some aspects of more conventional design processes, the researcher found that accidental discoveries and the designer’s interaction with technology plays a significant part in the design process.
Resumo:
Background Falls are one of the most frequently occurring adverse events that impact upon the recovery of older hospital inpatients. Falls can threaten both immediate and longer-term health and independence. There is need to identify cost-effective means for preventing falls in hospitals. Hospital-based falls prevention interventions tested in randomized trials have not yet been subjected to economic evaluation. Methods Incremental cost-effectiveness analysis was undertaken from the health service provider perspective, over the period of hospitalization (time horizon) using the Australian Dollar (A$) at 2008 values. Analyses were based on data from a randomized trial among n = 1,206 acute and rehabilitation inpatients. Decision tree modeling with three-way sensitivity analyses were conducted using burden of disease estimates developed from trial data and previous research. The intervention was a multimedia patient education program provided with trained health professional follow-up shown to reduce falls among cognitively intact hospital patients. Results The short-term cost to a health service of one cognitively intact patient being a faller could be as high as A$14,591 (2008). The education program cost A$526 (2008) to prevent one cognitively intact patient becoming a faller and A$294 (2008) to prevent one fall based on primary trial data. These estimates were unstable due to high variability in the hospital costs accrued by individual patients involved in the trial. There was a 52% probability the complete program was both more effective and less costly (from the health service perspective) than providing usual care alone. Decision tree modeling sensitivity analyses identified that when provided in real life contexts, the program would be both more effective in preventing falls among cognitively intact inpatients and cost saving where the proportion of these patients who would otherwise fall under usual care conditions is at least 4.0%. Conclusions This economic evaluation was designed to assist health care providers decide in what circumstances this intervention should be provided. If the proportion of cognitively intact patients falling on a ward under usual care conditions is 4% or greater, then provision of the complete program in addition to usual care will likely both prevent falls and reduce costs for a health service.
Resumo:
Nick Herd begins his institutional history of Australian commercial television in the early 1890s, when an amateur inventor named Henry Sutton designed the ‘telephane’ with the intent of watching the Melbourne Cup in his home town of Ballarat. The ‘race that stops a nation’ was not broadcast live on television until 1960, but Sutton’s initiative indicates how closely sport and television were aligned in Australia even before the medium existed. The first licensed commercial stations to begin regular broadcasting went on air in Sydney and Melbourne shortly before the 1956 Melbourne Olympic Games, although Herd claims that this was ‘almost accidental’ rather than planned. (49) Only Melbourne viewers were able to see some events live, many via television sets in Ampol service stations following the company’s last minute sponsorship of coverage on Melbourne station GTV-9...
Resumo:
Molecular and morphological data indicate that the pest thrips damaging Myoporum species in California and Hawai'i, Klambothrips myoporiMound and Morris, originated in Tasmania, Australia. This trans-Pacific dispersal presumably resulted from the international horticultural trade in Myoporum species. The data distinguish the pest from K. adelaideae sp.n. that induces leaf deformation on M. insulare along the coast of mainland Australia that is separated by ∼300km from Tasmania by the Bass Strait. K. myopori is more damaging to its non-native hosts in California and Hawai'i than to M. insulare in Tasmania, and further research is needed to determine if this is the result of release from its natural enemies. However, in certain areas of California, some Myoporum species are invasive weeds, and K. myopori may be considered an example of an accidental but beneficial introduction in this instance because of its detrimental impact on the plant species.
Resumo:
This paper presents a recursive strategy for online detection of actuator faults on a unmanned aerial system (UAS) subjected to accidental actuator faults. The proposed detection algorithm aims to provide a UAS with the capability of identifying and determining characteristics of actuator faults, offering necessary flight information for the design of fault-tolerant mechanism to compensate for the resultant side-effect when faults occur. The proposed fault detection strategy consists of a bank of unscented Kalman filters (UKFs) with each one detecting a specific type of actuator faults and estimating corresponding velocity and attitude information. Performance of the proposed method is evaluated using a typical nonlinear UAS model and it is demonstrated in simulations that our method is able to detect representative faults with a sufficient accuracy and acceptable time delay, and can be applied to the design of fault-tolerant flight control systems of UASs.
Resumo:
This paper presents a vulnerability within the generic object oriented substation event (GOOSE) communication protocol. It describes an exploit of the vulnerability and proposes a number of attack variants. The attacks sends GOOSE frames containing higher status numbers to the receiving intelligent electronic device (IED). This prevents legitimate GOOSE frames from being processed and effectively causes a hijacking of the communication channel, which can be used to implement a denial–of–service (DoS) or manipulate the subscriber (unless a status number roll-over occurs). The authors refer to this attack as a poisoning of the subscriber. A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful.
Resumo:
Research from a humanist perspective has much to offer in interrogating the social and cultural ramifications of invasion ecologies. The impossibility of securing national boundaries against accidental transfer and the unpredictable climatic changes of our time have introduced new dimensions and hazards to this old issue. Written by a team of international scholars, this book allows us to rethink the impact on national, regional or local ecologies of the deliberate or accidental introduction of foreign species, plant and animal. Modern environmental approaches that treat nature with naïve realism or mobilize it as a moral absolute, unaware or unwilling to accept that it is informed by specific cultural and temporal values, are doomed to fail. Instead, this book shows that we need to understand the complex interactions of ecologies and societies in the past, present and future over the Anthropocene, in order to address problems of the global environmental crisis. It demonstrates how humanistic methods and disciplines can be used to bring fresh clarity and perspective on this long vexed aspect of environmental thought and practice. Students and researchers in environmental studies, invasion ecology, conservation biology, environmental ethics, environmental history and environmental policy will welcome this major contribution to environmental humanities.
Resumo:
This book had to be written. Congratulations to British dispensing optician Timothy Bowden for his dogged determination in researching, writing and essentially self-publishing this hefty tome. How does one tackle the monumental task of tracking the complex history of the development of the contact lens, from the production of the first human artificial glass eyes by Ludwig Müller-Uri in Germany in 1835 to the sophisticated, high-technology, multi-billion dollar contact lens industry of today? The superficial answer may seem simple: do it chronologically, but it is much more difficult than that. Multiple contemporaneous and seemingly unconnected events often converged to result in ideas that elevated contact lens technology to the next level and many developments revolved around the deliberate and sometimes accidental activities of a long list of enthusiasts, inventors, entrepreneurs, businessmen, technicians, scientists, engineers, polymer scientists, opticians, optometrists and ophthalmologists.
Resumo:
Throughout a long and occasionally distinguished career first as a television sports correspondent, then chat show host (dramatically ended by the accidental homicide of a guest live on air), then rebirth as a radio presenter at North Norfolk Digital, Alan Partridge has navigated the stormy waters of the British media landscape, now achieving mainstream success on the big screen with a starring role in Steve Coogan’s Alpha Papa (Declan Lowney, 2013). A man who in his desperation for a television series of his own once sank so low as to pitch a show called Monkey Tennis to the BBC finally finds his inner hero in a film which, while presenting mainly as comedy, also contains a biting critique of trends in the British media with which all journalists and media practitioners in general will be familiar. Alpha Papa is a nostalgic, elegiac riff on the pleasures and values of local radio the way it used to be, exemplified by North Norfolk Digital’s stable of flawed, but endearing jocks – Wally Banter, Bruno Brooks, Dave Clifton (who in one scene recounts the depths to which he sank as an alcoholic, drug addicted wreck—“I woke up in a skip with someone else’s underpants in my mouth. I can laugh about it now …”), and Pat Farrell. 50- something Pat is sacked by the new owners of North Norfolk Digital, who in their efforts to transform the station into a “multiplatform content provider” going by the more Gen Yfriendly name of Shape (“the way you want it to be”), wish to replace him with a younger, brattish model lacking in taste and manners. Out go records by the likes of Glen Campbell and Neil Diamond (“You can keep Jesus Christ”, observes Partridge after playing Diamond’s Sweet Caroline in a demonstration of the crackling radio repartee for which he is by now renowned, “that was the king of the Jews”), in comes Roachford. Pat, grieving his dead wife Molly, finally snaps and turns the glitzy media launch of Shape into a hostage siege. Only Alan Partridge, it seems, can step in and talk Pat out of a looming catastrophe.
Resumo:
Using density functional theory, we have investigated the catalytic properties of bimetallic complex catalysts PtlAum(CO)n (l + m = 2, n = 1–3) in the reduction of SO2 by CO. Due to the strong coupling between the C-2p and metal 5d orbitals, pre-adsorption of CO molecules on the PtlAum is found to be very effective in not only reducing the activation energy, but also preventing poisoning by sulfur. As result of the coupling, the metal 5d band is broadened and down-shifted, and charge is transferred from the CO molecules to the PtlAum. As SO2 is adsorbed on the catalyst, partial charge moves to the anti-σ bonding orbitals between S and O in SO2, weakening the S–O bond strength. This effect is enhanced by pre-adsorbing up to three CO molecules, therefore the S–O bonds become vulnerable. Our results revealed the mechanism of the excellent catalytic properties of the bimetallic complex catalysts.
Resumo:
The catalytic activities, to the reduction of SO2 by CO, of clusters PtlAum (l + m = 2) with or without preadsorbing CO molecules are investigated using first-principles density functional theory. We find that the PtAu(CO)n (n = 1–3) clusters show more excellent catalytic properties than either pure metallic catalysts. Preadsorption of CO to the catalysts could effectively avoid platinum-based catalyst sulfur poisoning; as more CO molecules preadsorbed to the catalysts, the energy barriers for the carbonyl sulfide (COS) molecule’s desorption from the catalyst are remarkably decreased. We propose an ideal catalytic cycle to simultaneously get rid of SO2 and CO over the catalysts PtAu(CO)3.
Resumo:
Abstract: Social network technologies, as we know them today have become a popular feature of everyday life for many people. As their name suggests, their underlying premise is to enable people to connect with each other for a variety of purposes. These purposes however, are generally thought of in a positive fashion. Based on a multi-method study of two online environments, Habbo Hotel and Second Life, which incorporate social networking functionality, we she light on forms of what can be conceptualized as antisocial behaviours and the rationales for these. Such behaviours included: scamming, racist/homophobic attacks, sim attacks, avatar attacks, non-conformance to contextual norms, counterfeiting and unneighbourly behaviour. The rationales for sub behaviours included: profit, fun, status building, network disruption, accidental acts and prejudice. Through our analysis we are able to comment upon the difficulties of defining antisocial behaviour in such environments, particularly when such environments are subject to interpretation vis their use and expected norms. We also point to the problems we face in conducting our public and private lives given the role ICTs are playing in the convergence of these two spaces and also the convergence of ICTs themselves.
Resumo:
The importance of the isoform CYP2E1 of the human cytochrome P-450 superfamily of enzymes for occupational and environmental medicine is derived from its unique substrate spectrum that includes a number of highly important high-production chemicals, such as aliphatic and aromatic hydrocarbons, solvents and industrial monomers (i.a. alkanes, alkenes, aromatic and halogenated hydrocarbons). Many polymorphic genes, such as CYP2E1, show considerable differences in allelic distribution between different human populations. The polymorphic nature of the human CYP2E1 gene is significant for inter-individual differences in toxicity of its substrates. Since the substrate spectrum of CYP2E1 includes many compounds of basic relevance to industrial toxicology, a rationale for metabolic interactions of different CYP2E1 substrates is provided. In-depth research into the inter-individual phenotypic differences of human CYP2E1 enzyme activities was enabled by the recognition that the 6-hydroxylation of the drug chlorzoxazone is mediated by CYP2E1. Studies on CYP2E1 phenotyping have pointed to inter-individual variations in enzyme activities. There are consistent ethnic differences in CYP2E1 enzyme expression, mostly demonstrated between European and Japanese populations, which point to a major impact of genetic factors. The most frequently studied genetic polymorphisms are the restriction fragment length polymorphisms PstI/RsaI (mutant allele: CYP2E1*5B) located in the 5′-flanking region of the gene, as well as the DraI polymorphism (mutant allele: CYP2E1*6) located in intron 6. These polymorphisms are partly related, as they form the common allele designated CYP2E1*5A. Striking inter-ethnic differences between Europeans and Asians appear with respect to the frequencies of the CYP2E1*5A allele (only approximately 5% of Europeans are heterozygous, but 37% of Asians are, whilst 6% of Asians are homozygous). Available studies indicate a wide variation in human CYP2E1 expression, which are very likely based on complex gene-environment interactions. Major inter-ethnic differences are apparent on the genotyping and the phenotyping levels. Selected cases are presented where inter-ethnic variations of CYP2E1 may provide likely explanations for unexplained findings concerning industrial chemicals that are CYP2E1 substrates. Possible consequences of differential inter-individual and inter-ethnic susceptibilities are related to individual expressions of clinical symptoms of chemical toxicity, to results of biological monitoring of exposed workers, and to the interpretation of results of epidemiological or molecular-epidemiological studies.