111 resultados para Cs-natrolite
Resumo:
Advances in technology introduce new application areas for sensor networks. Foreseeable wide deployment of mission critical sensor networks creates concerns on security issues. Security of large scale densely deployed and infrastructure less wireless networks of resource limited sensor nodes requires efficient key distribution and management mechanisms. We consider distributed and hierarchical wireless sensor networks where unicast, multicast and broadcast type of communications can take place. We evaluate deterministic, probabilistic and hybrid type of key pre-distribution and dynamic key generation algorithms for distributing pair-wise, group-wise and network-wise keys.
Resumo:
This paper presents a formal methodology for attack modeling and detection for networks. Our approach has three phases. First, we extend the basic attack tree approach 1 to capture (i) the temporal dependencies between components, and (ii) the expiration of an attack. Second, using the enhanced attack trees (EAT) we build a tree automaton that accepts a sequence of actions from input stream if there is a traverse of an attack tree from leaves to the root node. Finally, we show how to construct an enhanced parallel automaton (EPA) that has each tree automaton as a subroutine and can process the input stream by considering multiple trees simultaneously. As a case study, we show how to represent the attacks in IEEE 802.11 and construct an EPA for it.
Resumo:
We consider the problem of how to maximize secure connectivity of multi-hop wireless ad hoc networks after deployment. Two approaches, based on graph augmentation problems with nonlinear edge costs, are formulated. The first one is based on establishing a secret key using only the links that are already secured by secret keys. This problem is in NP-hard and does not accept polynomial time approximation scheme PTAS since minimum cutsets to be augmented do not admit constant costs. The second one is based of increasing the power level between a pair of nodes that has a secret key to enable them physically connect. This problem can be formulated as the optimal key establishment problem with interference constraints with bi-objectives: (i) maximizing the concurrent key establishment flow, (ii) minimizing the cost. We show that both problems are NP-hard and MAX-SNP (i.e., it is NP-hard to approximate them within a factor of 1 + e for e > 0 ) with a reduction to MAX3SAT problem. Thus, we design and implement a fully distributed algorithm for authenticated key establishment in wireless sensor networks where each sensor knows only its one- hop neighborhood. Our witness based approaches find witnesses in multi-hop neighborhood to authenticate the key establishment between two sensor nodes which do not share a key and which are not connected through a secure path.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighbouring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighbouring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools. Comparison to probabilistic schemes shows that our combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Simulation has been widely used to estimate the benefits of Cooperative Systems (CS) based on Inter-Vehicular Communications (IVC). This paper presents a new architecture built with the SiVIC simulator and the RTMaps™ multisensors prototyping platform. We introduce several improvements from a previous similar architecture, regarding IVC modelisation and vehicles’ control. It has been tuned with on-road measurements to improve fidelity. We discuss the results of a freeway emergency braking scenario (EEBL) implemented to validate our architecture’s capabilities.
Resumo:
Cooperative Systems provide, through the multiplication of information sources over the road, a lot of potential to improve the safety of road users, especially drivers. However, developing cooperative ITS applications requires additional resources compared to non-cooperative applications which are both time consuming and expensive. In this paper, we present a simulation architecture aimed at prototyping cooperative ITS applications in an accurate and detailed, close-to-reality environment; the architecture is designed to be modular and generalist. It can be used to simulate any type of CS applications as well as augmented perception. Then, we discuss the results of two applications deployed with our architecture, using a common freeway emergency braking scenario. The first application is Emergency Electronic Brake Light (EEBL); we discuss improvements in safety in terms of the number of crashes and the severity of crashes. The second application compares the performance of a cooperative risk assessment using an augmented map against a non-cooperative approach based on local-perception only. Our results show a systematic improvement of forward warning time for most vehicles in the string when using the augmented-map-based risk assessment.
Resumo:
Background Women undergoing Cesarean Section (CS) are vulnerable to the adverse effects associated with perioperative core temperature drop, in part due to the tendency for CS to be performed under neuraxial anesthesia, blood and fluid loss, and vasodilation. Inadvertent perioperative hypothermia (IPH) is a common condition that affects patients undergoing surgery of all specialties and is detrimental to all age groups, including neonates. Previous systematic reviews on IPH prevention largely focus on either adult or all ages populations, and have mainly overlooked pregnant or CS patients as a distinct group. Not all recommendations made by systematic reviews targeting all adult patients may be transferable to CS patients. Alternative, effective methods for preventing or managing hypothermia in this group would be valuable. Objectives To synthesize the best available evidence in relation to preventing and/or treating hypothermia in mothers after CS surgery. Types of participants Adult patients over the age of 18 years, of any ethnic background, with or without co-morbidities, undergoing any mode of anesthesia for any type of CS (emergency or planned) at healthcare facilities who have received interventions to limit or manage perioperative core heat loss were included. Types of intervention(s) Active or passive warming methods versus usual care or placebo, that aim to limit or manage core heat loss as applied to women undergoing CS were included. Types of studies Randomized controlled trials (RCTs) that met the inclusion criteria, with reduction of perioperative hypothermia a primary or secondary outcome were considered. Types of outcomes Primary outcome: maternal core temperature measured during the preoperative, intraoperative and postoperative phases of care Secondary outcomes: newborn core temperature at birth, umbilical pH obtained immediately after birth, Apgar scores, length of Post Anesthetic Care Unit (PACU) stay, maternal thermal comfort. Search strategy A comprehensive search was undertaken of the following databases from their inception until May 2012: ProQuest, Web of Science, Scopus, Dissertation and Theses PQDT (via ProQuest), Current Contents, CENTRAL, Mednar, OpenGrey, Clinical Trials. There were no language restrictions. Methodological quality Retrieved papers were assessed for methodological quality by two independent reviewers prior to inclusion using JBI software. Disagreements were resolved via consultation with the third reviewer. An assessment of quality of the included papers was also made in relation to five key quality factors. Data collection Two independent reviewers extracted data from the included papers using a previously piloted customized data extraction tool. Results 12 studies with a combined total of 719 participants were included. Three broad intervention groups were identified; intravenous (IV) fluid warming, warming devices, leg wrapping. IV fluid warming, whether administered intraoperatively or preoperatively, was found to be effective at maintaining maternal (but not neonatal) temperature and preventing shivering, but does not improve thermal comfort. The effectiveness of IV fluid warming on Apgar scores and umbilical pH remains unclear. Warming devices, including forced air warming and under body carbon polymer mattresses, were effective at preventing hypothermia and reduced shivering, however were most effective if applied preoperatively. The effectiveness of warming devices to improve thermal comfort remains unclear. Preoperative forced air warming appears to aid maintenance of neonatal temperature, while intraoperative forced air warming does not. Forced air warming was not effective at improving Apgar scores and the effects for umbilical pH remain unclear. Conclusions Intravenous fluid warming, by any method, improves maternal temperature and reduces shivering for women undergoing CS. Preoperative body warming devices also improve maternal temperature, in addition to reducing shivering.
Resumo:
Recent road safety statistics show that the decades-long fatalities decreasing trend is stopping and stagnating. Statistics further show that crashes are mostly driven by human error, compared to other factors such as environmental conditions and mechanical defects. Within human error, the dominant error source is perceptive errors, which represent about 50% of the total. The next two sources are interpretation and evaluation, which accounts together with perception for more than 75% of human error related crashes. Those statistics show that allowing drivers to perceive and understand their environment better, or supplement them when they are clearly at fault, is a solution to a good assessment of road risk, and, as a consequence, further decreasing fatalities. To answer this problem, currently deployed driving assistance systems combine more and more information from diverse sources (sensors) to enhance the driver's perception of their environment. However, because of inherent limitations in range and field of view, these systems' perception of their environment remains largely limited to a small interest zone around a single vehicle. Such limitations can be overcomed by increasing the interest zone through a cooperative process. Cooperative Systems (CS), a specific subset of Intelligent Transportation Systems (ITS), aim at compensating for local systems' limitations by associating embedded information technology and intervehicular communication technology (IVC). With CS, information sources are not limited to a single vehicle anymore. From this distribution arises the concept of extended or augmented perception. Augmented perception allows extending an actor's perceptive horizon beyond its "natural" limits not only by fusing information from multiple in-vehicle sensors but also information obtained from remote sensors. The end result of an augmented perception and data fusion chain is known as an augmented map. It is a repository where any relevant information about objects in the environment, and the environment itself, can be stored in a layered architecture. This thesis aims at demonstrating that augmented perception has better performance than noncooperative approaches, and that it can be used to successfully identify road risk. We found it was necessary to evaluate the performance of augmented perception, in order to obtain a better knowledge on their limitations. Indeed, while many promising results have already been obtained, the feasibility of building an augmented map from exchanged local perception information and, then, using this information beneficially for road users, has not been thoroughly assessed yet. The limitations of augmented perception, and underlying technologies, have not be thoroughly assessed yet. Most notably, many questions remain unanswered as to the IVC performance and their ability to deliver appropriate quality of service to support life-saving critical systems. This is especially true as the road environment is a complex, highly variable setting where many sources of imperfections and errors exist, not only limited to IVC. We provide at first a discussion on these limitations and a performance model built to incorporate them, created from empirical data collected on test tracks. Our results are more pessimistic than existing literature, suggesting IVC limitations have been underestimated. Then, we develop a new CS-applications simulation architecture. This architecture is used to obtain new results on the safety benefits of a cooperative safety application (EEBL), and then to support further study on augmented perception. At first, we confirm earlier results in terms of crashes numbers decrease, but raise doubts on benefits in terms of crashes' severity. In the next step, we implement an augmented perception architecture tasked with creating an augmented map. Our approach is aimed at providing a generalist architecture that can use many different types of sensors to create the map, and which is not limited to any specific application. The data association problem is tackled with an MHT approach based on the Belief Theory. Then, augmented and single-vehicle perceptions are compared in a reference driving scenario for risk assessment,taking into account the IVC limitations obtained earlier; we show their impact on the augmented map's performance. Our results show that augmented perception performs better than non-cooperative approaches, allowing to almost tripling the advance warning time before a crash. IVC limitations appear to have no significant effect on the previous performance, although this might be valid only for our specific scenario. Eventually, we propose a new approach using augmented perception to identify road risk through a surrogate: near-miss events. A CS-based approach is designed and validated to detect near-miss events, and then compared to a non-cooperative approach based on vehicles equiped with local sensors only. The cooperative approach shows a significant improvement in the number of events that can be detected, especially at the higher rates of system's deployment.
Resumo:
Facial cues of racial outgroup or anger mediate fear learning that is resistant to extinction. Whether this resistance is potentiated if fear is conditioned to angry, other race faces has not been established. Two groups of Caucasian participants were conditioned with two happy and two angry face conditional stimuli (CSs). During acquisition, one happy and one angry face were paired with an aversive unconditional stimulus whereas the second happy and angry faces were presented alone. CS face race (Caucasian, African American) was varied between groups. During habituation, electrodermal responses were larger to angry faces regardless of race and declined less to other race faces. Extinction was immediate for Caucasian happy faces, delayed for angry faces regardless of race, and slowest for happy racial outgroup faces. Combining the facial cues of other race and anger does not enhance resistance to extinction of fear.
Resumo:
Pavlovian auditory fear conditioning involves the integration of information about an acoustic conditioned stimulus (CS) and an aversive unconditioned stimulus in the lateral nucleus of the amygdala (LA). The auditory CS reaches the LA subcortically via a direct connection from the auditory thalamus and also from the auditory association cortex itself. How neural modulators, especially those activated during stress, such as norepinephrine (NE), regulate synaptic transmission and plasticity in this network is poorly understood. Here we show that NE inhibits synaptic transmission in both the subcortical and cortical input pathway but that sensory processing is biased toward the subcortical pathway. In addition binding of NE to β-adrenergic receptors further dissociates sensory processing in the LA. These findings suggest a network mechanism that shifts sensory balance toward the faster but more primitive subcortical input
Resumo:
The development of hydrogels tailored for cartilage tissue engineering has been a research and clinical goal for over a decade. Directing cells towards a chondrogenic phenotype and promoting new matrix formation are significant challenges that must be overcome for the successful application of hydrogels in cartilage tissue therapies. Gelatin-methacrylamide (Gel-MA) hydrogels have shown promise for the repair of some tissues, but they have not been extensively investigated for cartilage tissue engineering. We encapsulated human chondrocytes in gel-MA based hydrogels, and show that with the incorporation of small quantities of photo-crosslinkable hyaluronic acid methacrylate (HA-MA), and to a lesser extent chondroitin sulfate methacrylate (CS-MA), chondrogenesis and mechanical properties can be enhanced. The addition of HA-MA to Gel-MA constructs resulted in more rounded cell morphologies, enhanced chondrogenesis as assessed by gene expression and immunofluorescence, and increased quantity and distribution of the newly synthesised ECM throughout the construct. Consequently, while the compressive moduli of control Gel-MA constructs increased by 26 kPa after 8 weeks culture, constructs with HA-MA and CS-MA increased by 96 kPa. The enhanced chondrogenic differentiation, distribution of ECM, and improved mechanical properties make these materials potential candidates for cartilage tissue engineering applications.
Resumo:
For a decade, embedded driving assistance systems were mainly dedicated to the management of short time events (lane departure, collision avoidance, collision mitigation). Recently a great number of projects have been focused on cooperative embedded devices in order to extend environment perception. Handling an extended perception range is important in order to provide enough information for both path planning and co-pilot algorithms which need to anticipate events. To carry out such applications, simulation has been widely used. Simulation is efficient to estimate the benefits of Cooperative Systems (CS) based on Inter-Vehicular Communications (IVC). This paper presents a new and modular architecture built with the SiVIC simulator and the RTMaps™ multi-sensors prototyping platform. A set of improvements, implemented in SiVIC, are introduced in order to take into account IVC modelling and vehicles’ control. These 2 aspects have been tuned with on-road measurements to improve the realism of the scenarios. The results obtained from a freeway emergency braking scenario are discussed.
Resumo:
IEEE 802.11p is the new standard for intervehicular communications (IVC) using the 5.9 GHz frequency band; it is planned to be widely deployed to enable cooperative systems. 802.11p uses and performance have been studied theoretically and in simulations over the past years. Unfortunately, many of these results have not been confirmed by on-tracks experimentation. In this paper, we describe field trials of 802.11p technology with our test vehicles; metrics such as maximum range, latency and frame loss are examined. Then, we propose a detailed modelisation of 802.11p that can be used to accurately simulate its performance within Cooperative Systems (CS) applications.
Resumo:
Along with the tri-lineage of bone, cartilage and fat, human mesenchymal stem cells (hMSCs) retain neural lineage potential. Multiple factors have been described that influence lineage fate of hMSCs including the extracellular microenvironment or niche. The niche includes the extracellular matrix (ECM) providing structural composition, as well as other associated proteins and growth factors, which collectively influence hMSC stemness and lineage specification. As such, lineage specific differentiation of MSCs is mediated through interactions including cell–cell and cell–matrix, as well as through specific signalling pathways triggering downstream events. Proteoglycans (PGs) are ubiquitous within this microenvironment and can be localised to the cell surface or embedded within the ECM. In addition, the heparan sulfate (HS) and chondroitin sulfate (CS) families of PGs interact directly with a number of growth factors, signalling pathways and ECM components including FGFs, Wnts and fibronectin. With evidence supporting a role for HSPGs and CSPGs in the specification of hMSCs down the osteogenic, chondrogenic and adipogenic lineages, along with the localisation of PGs in development and regeneration, it is conceivable that these important proteins may also play a role in the differentiation of hMSCs toward the neuronal lineage. Here we summarise the current literature and highlight the potential for HSPG directed neural lineage fate specification in hMSCs, which may provide a new model for brain damage repair.
Resumo:
The presence of spam in a document ranking is a major issue for Web search engines. Common approaches that cope with spam remove from the document rankings those pages that are likely to contain spam. These approaches are implemented as post-retrieval processes, that filter out spam pages only after documents have been retrieved with respect to a user’s query. In this paper we suggest to remove spam pages at indexing time, therefore obtaining a pruned index that is virtually “spam-free”. We investigate the benefits of this approach from three points of view: indexing time, index size, and retrieval performances. Not surprisingly, we found that the strategy decreases both the time required by the indexing process and the space required for storing the index. Surprisingly instead, we found that by considering a spam-pruned version of a collection’s index, no difference in retrieval performance is found when compared to that obtained by traditional post-retrieval spam filtering approaches.