997 resultados para Analysis of binaries
Resumo:
The construction industry has long been burdened with inherent adversarial relationships among the parties and the resulting disputes. Dispute review boards (DRBs) have emerged as alternatives to settle construction-related disputes outside courts. Although DRBs have found support in some quarters of the construction industry, the quantitative assessment of the impact of DRBs has not been adequately addressed. This paper presents the results of a research project undertaken to assess the impact of DRBs on the construction program of a large-scale highway agency. Three dimensions of DRB impact were assessed: (1) influence on project cost and schedule performance, (2) effectiveness of DRBs in preventing and resolving construction disputes, and (3) costs of DRB implementation. The analyses encompass data from approximately 3,000 projects extending over a 10-year period (2000–2009). Quantitative measures of performance were developed and analyzed for each category. Projects that used DRBs faced reduced costs and schedule growth (6.88 and 12.92%, respectively) when compared to non-DRB projects (11.53 and 28.96%). DRBs were also found to be effective in avoiding and settling disputes; the number of arbitration cases reduced consistently after DRB implementation, and DRBs have a success rate of 97% in settling disputes for which DRBs were used. Moreover, costs of DRBs were found to comprise a relatively small fraction (i.e., approximately 0.3%) of total project budgets. It was concluded that DRBs were effective dispute prevention and resolution alternatives with no significant adverse effects on project performance.
Resumo:
Temporary Traffic Control Plans (TCP’s), which provide construction phasing to maintain traffic during construction operations, are integral component of highway construction project design. Using the initial design, designers develop estimated quantities for the required TCP devices that become the basis for bids submitted by highway contractors. However, actual as-built quantities are often significantly different from the engineer’s original estimate. The total cost of TCP phasing on highway construction projects amounts to 6–10% of the total construction cost. Variations between engineer estimated quantities and final quantities contribute to reduced cost control, increased chances of cost related litigations, and bid rankings and selection. Statistical analyses of over 2000 highway construction projects were performed to determine the sources of variation, which later were used as the basis of development for an automated-hybrid prediction model that uses multiple regressions and heuristic rules to provide accurate TCP quantities and costs. The predictive accuracy of the model developed was demonstrated through several case studies.
Resumo:
Studies on quantitative fit analysis of precontoured fracture fixation plates emerged within the last few years and therefore, there is a wide research gap in this area. Quantitative fit assessment facilitates the measure of the gap between a fracture fixation plate and the underlying bone, and specifies the required plate fit criteria. For clinically meaningful fit assessment outcome, it is necessary to establish the appropriate criteria and parameter. The present paper studies this subject and recommends using multiple fit criteria and the maximum distance between the plate and underlying bone as fit parameter for clinically relevant outcome. We also propose the development of a software tool for automatic plate positioning and fit assessment for the purpose of implant design validation and optimization in an effort to provide better fitting implant that can assist proper fracture healing. The fundamental specifications of the software are discussed.
Resumo:
Scoliosis is a deformity of the spine which affects children and adolescents, and remains a challenge to treat. This study measured the forces used during surgery to correct scoliosis and studied changes to spinal mechanics from the implantation of metal rods used to hold the spine straight. The results of this study will help surgeons and engineers understand how to straighten the spine more efficiently to provide patients with better outcomes.
Resumo:
Aiming at the large scale numerical simulation of particle reinforced materials, the concept of local Eshelby matrix has been introduced into the computational model of the eigenstrain boundary integral equation (BIE) to solve the problem of interactions among particles. The local Eshelby matrix can be considered as an extension of the concepts of Eshelby tensor and the equivalent inclusion in numerical form. Taking the subdomain boundary element method as the control, three-dimensional stress analyses are carried out for some ellipsoidal particles in full space with the proposed computational model. Through the numerical examples, it is verified not only the correctness and feasibility but also the high efficiency of the present model with the corresponding solution procedure, showing the potential of solving the problem of large scale numerical simulation of particle reinforced materials.
Resumo:
This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)
Resumo:
An accumulator based on bilinear pairings was proposed at CT-RSA'05. Here, it is first demonstrated that the security model proposed by Lan Nguyen does lead to a cryptographic accumulator that is not collision resistant. Secondly, it is shown that collision-resistance can be provided by updating the adversary model appropriately. Finally, an improvement on Nguyen's identity escrow scheme, with membership revocation based on the accumulator, by removing the trusted third party is proposed.
Resumo:
E-mail spam has remained a scourge and menacing nuisance for users, internet and network service operators and providers, in spite of the anti-spam techniques available; and spammers are relentlessly circumventing these anti-spam techniques embedded or installed in form of software products on both client and server sides of both fixed and mobile devices to their advantage. This continuous evasion degrades the capabilities of these anti-spam techniques as none of them provides a comprehensive reliable solution to the problem posed by spam and spammers. Major problem for instance arises when these anti-spam techniques misjudge or misclassify legitimate emails as spam (false positive); or fail to deliver or block spam on the SMTP server (false negative); and the spam passes-on to the receiver, and yet this server from where it originates does not notice or even have an auto alert service to indicate that the spam it was designed to prevent has slipped and moved on to the receiver’s SMTP server; and the receiver’s SMTP server still fail to stop the spam from reaching user’s device and with no auto alert mechanism to inform itself of this inability; thus causing a staggering cost in loss of time, effort and finance. This paper takes a comparative literature overview of some of these anti-spam techniques, especially the filtering technological endorsements designed to prevent spam, their merits and demerits to entrench their capability enhancements, as well as evaluative analytical recommendations that will be subject to further research.
Resumo:
The basic reproduction number of a pathogen, R 0, determines whether a pathogen will spread (R0>1R 0>1), when introduced into a fully susceptible population or fade out (R0<1R 0<1), because infected hosts do not, on average, replace themselves. In this paper we develop a simple mechanistic model for the basic reproduction number for a group of tick-borne pathogens that wholly, or almost wholly, depend on horizontal transmission to and from vertebrate hosts. This group includes the causative agent of Lyme disease, Borrelia burgdorferi, and the causative agent of human babesiosis, Babesia microti, for which transmission between co-feeding ticks and vertical transmission from adult female ticks are both negligible. The model has only 19 parameters, all of which have a clear biological interpretation and can be estimated from laboratory or field data. The model takes into account the transmission efficiency from the vertebrate host as a function of the days since infection, in part because of the potential for this dynamic to interact with tick phenology, which is also included in the model. This sets the model apart from previous, similar models for R0 for tick-borne pathogens. We then define parameter ranges for the 19 parameters using estimates from the literature, as well as laboratory and field data, and perform a global sensitivity analysis of the model. This enables us to rank the importance of the parameters in terms of their contribution to the observed variation in R0. We conclude that the transmission efficiency from the vertebrate host to Ixodes scapularis ticks, the survival rate of Ixodes scapularis from fed larva to feeding nymph, and the fraction of nymphs finding a competent host, are the most influential factors for R0. This contrasts with other vector borne pathogens where it is usually the abundance of the vector or host, or the vector-to-host ratio, that determine conditions for emergence. These results are a step towards a better understanding of the geographical expansion of currently emerging horizontally transmitted tick-borne pathogens such as Babesia microti, as well as providing a firmer scientific basis for targeted use of acaricide or the application of wildlife vaccines that are currently in development.
Resumo:
This paper provides a detailed description of the current Australian e-passport implementation and makes a formal verification using model checking tools CASPER/CSP/FDR. We highlight security issues present in the current e-passport implementation and identify new threats when an e-passport system is integrated with an automated processing systems like SmartGate. Because the current e-passport specification does not provide adequate security goals, to perform a rational security analysis we identify and describe a set of security goals for evaluation of e-passport protocols. Our analysis confirms existing security issues that were previously informally identified and presents weaknesses that exists in the current e-passport implementation.
Resumo:
The use of dual growing rods is a fusionless surgical approach to the treatment of early onset scoliosis (EOS) which aims to harness potential growth in order to correct spinal deformity. This study compared through in-vitro experiments the biomechanical response of two different rod designs under axial rotation loading. The study showed that a new design of telescoping growing rod preserved the rotational flexibility of the spine in comparison with rigid rods indicating them to be a more physiological way to improve the spinal deformity.
Resumo:
Trivium is a stream cipher candidate of the eStream project. It has successfully moved into phase three of the selection process under the hardware category. No attacks faster than the exhaustive search have so far been reported on Trivium. Bivium-A and Bivium-B are simplified versions of Trivium that are built on the same design principles but with two registers. The simplified design is useful in investigating Trivium type ciphers with a reduced complexity and provides insight into effective attacks which could be extended to Trivium. This paper focuses on an algebraic analysis which uses the boolean satisfiability problem in propositional logic. For reduced variants of the cipher, this analysis recovers the internal state with a minimal amount of keystream observations.
Resumo:
A nonlinear finite element analysis was carried out to investigate the viscoplastic deformation of solder joints in a ball grid array (BGA) package under temperature cycle. The effects of constraint on print circuit board (PCB) and stiffness of substrate on the deformation behaviour of the solder joints were also studied. A relative damage stress was adopted to analyze the potential failure sites in the solder joints. The results indicated that high inelastic strain and strain energy density were developed in the joints close to the package center. On the other hand, high constraint and high relative damage stress were associated with the joint closest to the edge of the silicon chip. The joint closest to the edge of the silicon chip was regarded as the most susceptible failure site if cavitation instability is the dominant failure mechanism. Increase the external constraint on the print circuit board (PCB) causes a slight increase in stress triaxiality (m/eq) and relative damage stress in the joint closest to the edge of silicon die. The relative damage stress is not sensitive to the Young’s modulus of the substrate.
Resumo:
The catalytic action of putrescine specific amine oxidases acting in tandem with 4-aminobutyraldehyde dehydrogenase is explored as a degradative pathway in Rhodococcus opacus. By limiting the nitrogen source, increased catalytic activity was induced leading to a coordinated response in the oxidative deamination of putrescine to 4-aminobutyraldehyde and subsequent dehydrogenation to 4-aminobutyrate. Isolating the dehydrogenase by ion exchange chromatography and gel filtration revealed that the enzyme acts principally on linear aliphatic aldehydes possessing an amino moiety. Michaelis-Menten kinetic analysis delivered a Michaelis constant (KM=0.014mM) and maximum rate (Vmax=11.2μmol/min/mg) for the conversion of 4-aminobutyraldehyde to 4-aminobutyrate. The dehydrogenase identified by MALDI-TOF mass spectrometric analysis (E value=0.031, 23% coverage) belongs to a functionally related genomic cluster that includes the amine oxidase, suggesting their association in a directed cell response. Key regulatory, stress and transport encoding genes have been identified, along with candidate dehydrogenases and transaminases for the further conversion of 4-aminobutyrate to succinate. Genomic analysis has revealed highly similar metabolic gene clustering among members of Actinobacteria, providing insight into putrescine degradation notably among Micrococcaceae, Rhodococci and Corynebacterium by a pathway that was previously uncharacterised in bacteria.
Resumo:
Two native copper-containing amine oxidases (EC 1.4.3.21) have been isolated from Rhodococcus opacus and reveal phenotypic plasticity and catalytic activity with respect to structurally diverse natural and synthetic amines. Altering the amine growth substrate has enabled tailored and targeted oxidase upreg-ulation, which with subsequent treatment by precipitation, ion exchange and gel filtration, achieved a 90–150 fold purification. MALDI-TOF mass spectrometric and genomic analysis has indicated multiple gene activation with complex biodegradation pathways and regulatory mechanisms. Additional post-purification characterisation has drawn on the use of carbonyl reagent and chelating agent inhibitors. Michaelis–Menten kinetics for common aliphatic and aromatic amine substrates and several structural analogues demonstrated a broad specificity and high affinity with Michaelis constants (K M) ranging from 0.1 to 0.9 mM for C 1 –C 5 aliphatic mono-amines and <0.2 mM for a range of aromatic amines. Potential exploitation of the enzymatic versatility of the two isolated oxidases in biosensing and bioprocessing is discussed.