83 resultados para Angle of attack (Aerodynamics)
Resumo:
Hamstring strain injuries (HSIs) are common in a number of sports and incidence rates have not declined in recent times. Additionally, the high rate of recurrent injuries suggests that our current understanding of HSI and re-injury risk is incomplete. Whilst the multifactoral nature of HSIs is agreed upon by many, often individual risk factors and/or causes of injury are examined in isolation. This review aims to bring together the causes, risk factors and interventions associated with HSIs to better understand why HSIs are so prevalent. Running is often identified as the primary activity type for HSIs and given the high eccentric forces and moderate muscle strain placed on the hamstrings during running these factors are considered to be part of the aetiology of HSIs. However, the exact causes of HSIs remain unknown and whilst eccentric contraction and muscle strain purportedly play a role, accumulated muscle damage and/or a single injurious event may also contribute. Potentially, all of these factors interact to varying degrees depending on the injurious activity type (i.e. running, kicking). Furthermore, anatomical factors, such as the biarticular organization, the dual innervations of biceps femoris (BF), fibre type distribution, muscle architecture and the degree of anterior pelvic tilt, have all been implicated. Each of these variables impact upon HSI risk via a number of different mechanisms that include increasing hamstring muscle strain and altering the susceptibility of the hamstrings to muscle damage. Reported risk factors for HSIs include age, previous injury, ethnicity, strength imbalances, flexibility and fatigue. Of these, little is known, definitively, about why previous injury increases the risk of future HSIs. Nevertheless, interventions put in place to reduce the incidence of HSIs by addressing modifiable risk factors have focused primarily on increasing eccentric strength, correcting strength imbalances and improving flexibility. The response to these intervention programmes has been mixed with varied levels of success reported. A conceptual framework is presented suggesting that neuromuscular inhibition following HSIs may impede the rehabilitation process and subsequently lead to maladaptation of hamstring muscle structure and function, including preferentially eccentric weakness, atrophy of the previously injured muscles and alterations in the angle of peak knee flexor torque. This remains an area for future research and practitioners need to remain aware of the multifactoral nature of HSIs if injury rates are to decline.
Resumo:
The problem of steady subcritical free surface flow past a submerged inclined step is considered. The asymptotic limit of small Froude number is treated, with particular emphasis on the effect that changing the angle of the step face has on the surface waves. As demonstrated by Chapman & Vanden-Broeck (2006), the divergence of a power series expansion in powers of the square of the Froude number is caused by singularities in the analytic continuation of the free surface; for an inclined step, these singularities may correspond to either the corners or stagnation points of the step, or both, depending on the angle of incline. Stokes lines emanate from these singularities, and exponentially small waves are switched on at the point the Stokes lines intersect with the free surface. Our results suggest that for a certain range of step angles, two wavetrains are switched on, but the exponentially subdominant one is switched on first, leading to an intermediate wavetrain not previously noted. We extend these ideas to the problem of flow over a submerged bump or trench, again with inclined sides. This time there may be two, three or four active Stokes lines, depending on the inclination angles. We demonstrate how to construct a base topography such that wave contributions from separate Stokes lines are of equal magnitude but opposite phase, thus cancelling out. Our asymptotic results are complemented by numerical solutions to the fully nonlinear equations.
Resumo:
Homo-and heteronuclear meso,meso-(E)-ethene-1,2-diyl-linked diporphyrins have been prepared by the Suzuki coupling of porphyrinylboronates and iodovinylporphyrins. Combinations comprising 5,10,15-triphenylporphyrin (TriPP) on both ends of the ethene-1,2-diyl bridge M 210 (M 2=H 2/Ni, Ni 2, Ni/Zn, H 4, H 2Zn, Zn 2) and 5,15-bis(3,5-di-tert-butylphenyl)porphyrinato-nickel(II) on one end and H 2, Ni, and ZnTriPP on the other (M 211), enable the first studies of this class of compounds possessing intrinsic polarity. The compounds were characterized by electronic absorption and steady state emission spectra, 1H NMR spectra, and for the Ni 2 bis(TriPP) complex Ni 210, single crystal X-ray structure determination. The crystal structure shows ruffled distortions of the porphyrin rings, typical of Ni II porphyrins, and the (E)-C 2H 2 bridge makes a dihedral angle of 50° with the mean planes of the macrocycles. The result is a stepped parallel arrangement of the porphyrin rings. The dihedral angles in the solid state reflect the interplay of steric and electronic effects of the bridge on interporphyrin communication. The emission spectra in particular, suggest energy transfer across the bridge is fast in conformations in which the bridge is nearly coplanar with the rings. Comparisons of the fluorescence behaviour of H 410 and H 2Ni10 show strong quenching of the free base fluorescence when the complex is excited at the lower energy component of the Soret band, a feature associated in the literature with more planar conformations. TDDFT calculations on the gas-phase optimized geometry of Ni 210 reproduce the features of the experimental electronic absorption spectrum within 0.1 eV. © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Resumo:
Study Design. Analysis of a case series of 24 Lenke 1C adolescent idiopathic scoliosis (AIS) patients receiving selective thoracoscopic anterior scoliosis correction. Objective. To report the behaviour of the compensatory lumbar curve in a group of Lenke IC AIS patients following thoracoscopic anterior scoliosis correction, and to compare the results of this study with previously published data. Summary of Background Data. Several prior studies have reported spontaneous lumbar curve correction for both anterior and posterior selective fusion in Lenke 1C/King-Moe II patients; however to our knowledge no previous studies have reported outcomes of thoracoscopic anterior correction for this curve type. Methods. All AIS patients with a curve classification of Lenke 1C and a minimum of 24 months follow-up were retrieved from a consecutive series of 190 AIS patients who underwent thoracoscopic anterior instrumented fusion. Cobb angles of the major curve, instrumented levels, compensatory lumbar curve, and T5-T12 kyphosis were recorded, as well as coronal spinal balance, T1 tilt angle and shoulder balance. All radiographic parameters were measured before surgery and at 2, 6, 12 and 24 months after surgery. Results. Twenty-four female patients with right thoracic curves had a mean thoracic Cobb angle of 53.0° before surgery, decreasing to 24.9° two years after surgery. The mean lumbar compensatory Cobb angle was 43.5° before surgery, spontaneously correcting to 25.4° two years after surgery, indicating balance between the thoracic and lumbar scoliotic curves. The lumbar correction achieved (41.8%) compares favourably to previous studies. Conclusions. Selective thoracoscopic anterior fusion allows spontaneous lumbar curve correction and achieves coronal balance of main thoracic and compensatory lumbar curves, good cosmesis and patient satisfaction. Correction and balance are maintained 24 months after surgery.
Resumo:
PURPOSE: To examine the symmetry of corneal changes following near work in the fellow eyes of non-amblyopic myopic anisometropes. METHODS: Thirty-four non-amblyopic myopic anisometropes (minimum 1 D spherical equivalent anisometropia) were recruited. Corneal topography was measured with the Medmont E300 Videokeratoscope before and after a controlled near task. Subjects were positioned to minimise head movements and read continuous text on a computer monitor for 10 minutes at an angle of 25 degrees downward gaze and an accommodation demand of 2.5 D. Measures of palpebral aperture morphology during primary and downward gaze were also obtained using digital photography and analysed with customised software. RESULTS: Significant changes in corneal topography were observed after ten minutes of reading. Localised superior regions of corneal topographical change (a hyperopic shift in corneal power) were typically exhibited in both eyes following the near task. The mean change in the corneal sphero-cylinder was +0.02/-0.11 x 113 and +0.02/-0.06 x 68 for the more and less myopic eyes respectively for a 6 mm corneal diameter. A significantly greater change in corneal astigmatism power vector J0 (a larger increase in against the rule astigmatism) was observed in the more myopic eyes (p < 0.01 for a 6 mm diameter). The more and less myopic eyes exhibited a high degree of interocular symmetry for measures of palpebral aperture morphology during both primary and downward gaze. Changes in corneal power vectors following reading were associated with eyelid position during downward gaze. CONCLUSIONS: Changes in corneal topography observed following a controlled reading task were highly symmetrical between the fellow eyes of myopic anisometropes due to the interocular symmetry of the palpebral aperture. However, the more myopic eye did exhibit a small but significantly greater magnitude of change in corneal astigmatism compared to the less myopic eye following reading. These findings may have implications for understanding the mechanism of development of non-amblyopic myopic anisometropia.
Resumo:
Purpose: To examine the symmetry of corneal changes following near work in the fellow eyes of non-amblyopic myopic anisometropes. Methods: Thirty-four non-amblyopic, myopic anisometropes (minimum 1 D spherical equivalent anisometropia) had corneal topography measured before and after a controlled near work task. Subjects were positioned in a headrest to minimise head movements and read continuous text on a computer monitor for 10 minutes at an angle of 25 degrees downward gaze and an accommodation demand of 2.5 D. Measures of the morphology of the palpebral aperture during primary and downward gaze were also obtained. Results: The more and less myopic eyes exhibited a high degree of interocular symmetry for measures of palpebral aperture morphology during both primary and downward gaze. Following the near work task, fellow eyes also displayed a symmetrical change in superior corneal topography (hyperopic defocus) which correlated with the position of the upper eyelid during downward gaze. Greater changes in the spherical corneal power vector (M) following reading were associated with narrower palpebral aperture during downward gaze (p = 0.07 for more myopic and p = 0.03 for less myopic eyes). A significantly greater change in J0 (an increase in against the rule astigmatism) was observed in the more myopic eyes (-0.04 ± 0.04 D) compared to the less myopic eyes (-0.02 ± 0.06 D) over a 6 mm corneal diameter (p = 0.01). Conclusions: Changes in corneal topography following near work are highly symmetrical between the fellow eyes of myopic anisometropes due to the interocular symmetry of the palpebral aperture. However, the more myopic eye exhibits changes in corneal astigmatism of greater magnitude compared to the less myopic eye.
Resumo:
Introduction Gene expression profiling has enabled us to demonstrate the heterogeneity of breast cancers. The potential of a tumour to grow and metastasise is partly dependant on its ability to initiate angiogenesis or growth and remodelling of new blood vessels, usually from a pre-existing vascular network, to ensure delivery of oxygen, nutrients, and growth factors to rapidly dividing transformed cells along with access to the systemic circulation. Cell–cell signalling of semaphorin ligands through interaction with their plexin receptors is important for the homeostasis and morphogenesis of many tissues and has been widely studied for a role in neural connectivity, cancer, cell migration and immune responses. This study investigated the role of four semaphorin/plexin signalling genes in human breast cancers in vivo and in vitro. Materials and methods mRNA was extracted from formalin fixed paraffin embedded archival breast invasive ductal carcinoma tissue samples of progressive grades (grades I–III) and compared to tissue from benign tumours. Gene expression profiles were determined by microarray using the Affymetrix GeneChip® Human Genome U133 Plus 2.0 Arrays and validated by Q-PCR using a Corbett RotorGene 6000. Following validation, the gene expression profile of the identified targets was correlated with those of the human breast cancer cell lines MCF-7 and MDA-MD-231. Results The array data revealed that 888 genes were found to be significantly (p ≤ 0.05) differentially expressed between grades I and II tumours and 563 genes between grade III and benign tumours. From these genes, we identified four genes involved in semaphorin–plexin signalling including SEMA4D which has previously been identified as being involved in increased angiogenesis in breast cancers, and three other genes, SEMA4F, PLXNA2 and PLXNA3, which in the literature were associated with tumourigenesis, but not directly in breast tumourigenesis. The microarray analysis revealed that SEMA4D was significantly (P = 0.0347) down-regulated in the grade III tumours compared to benign tumours; SEMA4F, was significantly (P = 0.0159) down-regulated between grades I and II tumours; PLXNA2 was significantly (P = 0.036) down-regulated between grade III and benign tumours and PLXNA3 significantly (P = 0.042) up-regulated between grades I and II tumours. Gene expression of SEMA4D was validated using Q-PCR, demonstrating the same expression profile in both data sets. When the sample set was increased to incorporate more cases, SEMA4D continued to follow the same expression profile, including statistical significance for the differences observed and small standard deviations. In vitro the same pattern was present where expression for SEMA4D was significantly higher in MDA-MB-231 cells when compared to MCF-7 cells. The expression of SEMA4F, PLXNA2 and PLXNA3 could not be validated using Q-PCR, however in vitro analysis of these three genes revealed that both SEMA4F and PLXNA3 followed the microarray trend in expression, although they did not reach significance. In contrast, PLXNA2 demonstrated statistical significance and was in concordance with the literature. Discussion We, and others, have proposed SEMA4D to be a gene with a potentially protective effect in benign tumours that contributes to tumour growth and metastatic suppression. Previous data supports a role for SEMA4F as a tumour suppressor in the peripheral nervous system but our data seems to indicate that the gene is involved in tumour progression in breast cancer. Our in vitro analysis of PLXNA2 revealed that the gene has higher expression in more aggressive breast cancer cell types. Finally, our in vitro analysis on PLXNA3 also suggest that this gene may have some form of growth suppressive role in breast cancer, in addition to a similar role for the gene previously reported in ovarian cancer. From the data obtained in this study, SEMA4D may have a role in more aggressive and potentially metastatic breast tumours. Conclusions Semaphorins and their receptors, the plexins, have been implicated in numerous aspects of neural development, however their expression in many other epithelial tissues suggests that the semaphorin–plexin signalling system also contributes to blood vessel growth and development. These findings warrant further investigation of the role of semaphorins and plexins and their role in normal and tumour-induced angiogenesis in vivo and in vitro. This may represent a new front of attack in anti-angiogenic therapies of breast and other cancers.
Resumo:
Purpose To investigate hyperopic shifts and the oblique (or 45-degree/135-degree) component of astigmatism at large angles in the horizontal visual field using the Hartmann-Shack technique. Methods The adult participants consisted of 6 hypermetropes, 13 emmetropes and 11 myopes. Measurements were made with a modified COAS-HD Hartmann-Shack aberrometer across T60 degrees along the horizontal visual field in 5-degree steps. Eyes were dilated with 1% cyclopentolate. Peripheral refraction was estimated as mean spherical (or spherical equivalent) refraction, with/against the rule of astigmatism and oblique astigmatism components, and as horizontal and vertical refraction components based on 3-mm major diameter elliptical pupils. Results Thirty percent of eyes showed a pattern that was a combination of type IV and type I patterns of Rempt et al. (Rempt F, Hoogerheide J, Hoogenboom WP. Peripheral retinoscopy and the skiagram. Ophthalmologica 1971;162:1Y10), which shows the characteristics of type IV (relative hypermetropia along the vertical meridian and relative myopia along the horizontal meridian) out to an angle of between 40 and 50 degrees before behaving like type I (both meridians show relative hypermetropia). We classified this pattern as type IV/I. Seven of 13 emmetropes had this pattern. As a group, there was no significant variation of the oblique component of astigmatism with angle, but about one-half of the eyes showed significant positive slopes (more positive or less negative values in the nasal field than in the temporal field) and one-fourth showed significant negative slopes. Conclusions It is often considered that a pattern of relative peripheral hypermetropia predisposes to the development of myopia. In this context, the finding of a considerable portion of emmetropes with the IV/I pattern suggests that it is unlikely that refraction at visual field angles beyond 40 degrees from fixation contributes to myopia development.
Resumo:
This paper presents a model for the generation of a MAC tag using a stream cipher. The input message is used indirectly to control segments of the keystream that form the MAC tag. Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. However, they use slightly different processes in the message preparation and finalisation phases. We examine the security of this model for different options and against different types of attack, and conclude that the indirect injection model can be used to generate MAC tags securely for certain combinations of options. Careful consideration is required at the design stage to avoid combinations of options that result in susceptibility to forgery attacks. Additionally, some implementations may be vulnerable to side-channel attacks if used in Authenticated Encryption (AE) algorithms. We give design recommendations to provide resistance to these attacks for proposals following this model.
Resumo:
This paper presents a vulnerability within the generic object oriented substation event (GOOSE) communication protocol. It describes an exploit of the vulnerability and proposes a number of attack variants. The attacks sends GOOSE frames containing higher status numbers to the receiving intelligent electronic device (IED). This prevents legitimate GOOSE frames from being processed and effectively causes a hijacking of the communication channel, which can be used to implement a denial–of–service (DoS) or manipulate the subscriber (unless a status number roll-over occurs). The authors refer to this attack as a poisoning of the subscriber. A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful.
Resumo:
There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.
Resumo:
Recently, botnet, a network of compromised computers, has been recognized as the biggest threat to the Internet. The bots in a botnet communicate with the botnet owner via a communication channel called Command and Control (C & C) channel. There are three main C & C channels: Internet Relay Chat (IRC), Peer-to-Peer (P2P) and web-based protocols. By exploiting the flexibility of the Web 2.0 technology, the web-based botnet has reached a new level of sophistication. In August 2009, such botnet was found on Twitter, one of the most popular Web 2.0 services. In this paper, we will describe a new type of botnet that uses Web 2.0 service as a C & C channel and a temporary storage for their stolen information. We will then propose a novel approach to thwart this type of attack. Our method applies a unique identifier of the computer, an encryption algorithm with session keys and a CAPTCHA verification.
Resumo:
Background Adolescent Idiopathic Scoliosis is the most common type of spinal deformity whose aetiology remains unclear. Studies suggest that gravitational forces in the standing position play an important role in scoliosis progression, therefore anthropometric data are required to develop biomechanical models of the deformity. Few studies have analysed the trunk by vertebral level and none have performed investigations of the scoliotic trunk. The aim of this study was to determine the centroid, thickness, volume and estimated mass, for sections of the trunk in Adolescent Idiopathic Scoliosis patients. Methods Existing low-dose Computed Tomography scans were used to estimate vertebral level-by-level torso masses for 20 female Adolescent Idiopathic Scoliosis patients. ImageJ processing software was used to analyse the Computed Tomography images and enable estimation of the segmental torso mass corresponding to each vertebral level. Findings The patients’ mean age was 15.0 (SD 2.7) years with mean major Cobb Angle of 52° (SD 5.9) and mean patient weight of 58.2 (SD 11.6) kg. The magnitude of torso segment mass corresponding to each vertebral level increased by 150% from 0.6kg at T1 to 1.5kg at L5. Similarly, the segmental thickness corresponding to each vertebral level from T1-L5 increased inferiorly from a mean 18.5 (SD 2.2) mm at T1 to 32.8 (SD 3.4) mm at L5. The mean total trunk mass, as a percentage of total body mass, was 27.8 (SD 0.5) % which was close to values reported in previous literature. Interpretation This study provides new anthropometric reference data on segmental (vertebral level-by-level) torso mass in Adolescent Idiopathic Scoliosis patients, useful for biomechanical models of scoliosis progression and treatment.
Resumo:
This paper presents algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two different attacks are implemented. In the first attack, we obtain multivariate equations of degree 10. Then, an algebraic attack is developed using a collection of output bits whose relation to the initial state of the LFSR can be described by low-degree equations. The resulting system of equations contains 2^69 equations and monomials, which can be solved using the Gaussian elimination with the complexity of 2^196.5. For the second attack, we build a multivariate equation of degree 14. We focus on the property of the equation that the monomials which are combined with output bit are linear. By applying the Berlekamp-Massey algorithm, we can obtain a system of linear equations and the initial states of the LFSR can be recovered. The complexity of attack is around O(2^100) with 2^92 keystream observations. The second algebraic attack is applicable to SOBER-t16 without stuttering. The attack takes around O(2^85) CPU clocks with 2^78 keystream observations.
Resumo:
Purpose: To determine i) the reliability of two-dimensional ultrasonography for the assessment of biceps femoris long head (BFlh) architectural characteristics; ii) if limbs with a history of strain injury in the BFlh display different architecture and eccentric strength compared to uninjured limbs. Methods: This case-control study (control [n=20], injured group [n=16], males) assessed the BFlh architecture at rest and during graded isometric contractions using two-dimensional ultrasonography. The control group were assessed three times (>24hrs apart) to determine reliability. Previously injured individuals were evaluated once. Results The assessment of BFlh architecture was highly reliable (intraclass correlations >0.90). Fascicle length (p<0.001; d range: 0.67 to 1.34) and fascicle length relative to muscle thickness (p<0.001; d range: 0.58 to 0.85) of the previously injured BFlh were significantly less than the contralateral uninjured BFlh at all intensities. Pennation angle of the previously injured BFlh was significantly greater (p<0.001; d range: 0.62 to 0.88) than the contralateral uninjured BFlh at all intensities. Eccentric strength in the previously injured limb was significantly lower than the contralateral limb (-15.4%; -52.5N; 95% CI=-28.45 to -76.23; p<0.001, d=0.56). Conclusion These data indicate that two-dimensional ultrasonography is reliable for assessing BFlh architecture at rest and during graded isometric contractions. Fascicle length, fascicle length relative to muscle thickness and pennation angle are significantly different in previously injured BFlh compared to an uninjured contralateral BFlh. Eccentric strength of the previously injured limb is also significantly lower than the uninjured contralateral limb. These findings have implications for rehabilitation and injury prevention practices which should consider altered architectural characteristics.