795 resultados para Consecutive Analysis of Variants


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Scoliosis is a deformity of the spine which affects children and adolescents, and remains a challenge to treat. This study measured the forces used during surgery to correct scoliosis and studied changes to spinal mechanics from the implantation of metal rods used to hold the spine straight. The results of this study will help surgeons and engineers understand how to straighten the spine more efficiently to provide patients with better outcomes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Aiming at the large scale numerical simulation of particle reinforced materials, the concept of local Eshelby matrix has been introduced into the computational model of the eigenstrain boundary integral equation (BIE) to solve the problem of interactions among particles. The local Eshelby matrix can be considered as an extension of the concepts of Eshelby tensor and the equivalent inclusion in numerical form. Taking the subdomain boundary element method as the control, three-dimensional stress analyses are carried out for some ellipsoidal particles in full space with the proposed computational model. Through the numerical examples, it is verified not only the correctness and feasibility but also the high efficiency of the present model with the corresponding solution procedure, showing the potential of solving the problem of large scale numerical simulation of particle reinforced materials.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An accumulator based on bilinear pairings was proposed at CT-RSA'05. Here, it is first demonstrated that the security model proposed by Lan Nguyen does lead to a cryptographic accumulator that is not collision resistant. Secondly, it is shown that collision-resistance can be provided by updating the adversary model appropriately. Finally, an improvement on Nguyen's identity escrow scheme, with membership revocation based on the accumulator, by removing the trusted third party is proposed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

E-mail spam has remained a scourge and menacing nuisance for users, internet and network service operators and providers, in spite of the anti-spam techniques available; and spammers are relentlessly circumventing these anti-spam techniques embedded or installed in form of software products on both client and server sides of both fixed and mobile devices to their advantage. This continuous evasion degrades the capabilities of these anti-spam techniques as none of them provides a comprehensive reliable solution to the problem posed by spam and spammers. Major problem for instance arises when these anti-spam techniques misjudge or misclassify legitimate emails as spam (false positive); or fail to deliver or block spam on the SMTP server (false negative); and the spam passes-on to the receiver, and yet this server from where it originates does not notice or even have an auto alert service to indicate that the spam it was designed to prevent has slipped and moved on to the receiver’s SMTP server; and the receiver’s SMTP server still fail to stop the spam from reaching user’s device and with no auto alert mechanism to inform itself of this inability; thus causing a staggering cost in loss of time, effort and finance. This paper takes a comparative literature overview of some of these anti-spam techniques, especially the filtering technological endorsements designed to prevent spam, their merits and demerits to entrench their capability enhancements, as well as evaluative analytical recommendations that will be subject to further research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The basic reproduction number of a pathogen, R 0, determines whether a pathogen will spread (R0>1R 0>1), when introduced into a fully susceptible population or fade out (R0<1R 0<1), because infected hosts do not, on average, replace themselves. In this paper we develop a simple mechanistic model for the basic reproduction number for a group of tick-borne pathogens that wholly, or almost wholly, depend on horizontal transmission to and from vertebrate hosts. This group includes the causative agent of Lyme disease, Borrelia burgdorferi, and the causative agent of human babesiosis, Babesia microti, for which transmission between co-feeding ticks and vertical transmission from adult female ticks are both negligible. The model has only 19 parameters, all of which have a clear biological interpretation and can be estimated from laboratory or field data. The model takes into account the transmission efficiency from the vertebrate host as a function of the days since infection, in part because of the potential for this dynamic to interact with tick phenology, which is also included in the model. This sets the model apart from previous, similar models for R0 for tick-borne pathogens. We then define parameter ranges for the 19 parameters using estimates from the literature, as well as laboratory and field data, and perform a global sensitivity analysis of the model. This enables us to rank the importance of the parameters in terms of their contribution to the observed variation in R0. We conclude that the transmission efficiency from the vertebrate host to Ixodes scapularis ticks, the survival rate of Ixodes scapularis from fed larva to feeding nymph, and the fraction of nymphs finding a competent host, are the most influential factors for R0. This contrasts with other vector borne pathogens where it is usually the abundance of the vector or host, or the vector-to-host ratio, that determine conditions for emergence. These results are a step towards a better understanding of the geographical expansion of currently emerging horizontally transmitted tick-borne pathogens such as Babesia microti, as well as providing a firmer scientific basis for targeted use of acaricide or the application of wildlife vaccines that are currently in development.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper provides a detailed description of the current Australian e-passport implementation and makes a formal verification using model checking tools CASPER/CSP/FDR. We highlight security issues present in the current e-passport implementation and identify new threats when an e-passport system is integrated with an automated processing systems like SmartGate. Because the current e-passport specification does not provide adequate security goals, to perform a rational security analysis we identify and describe a set of security goals for evaluation of e-passport protocols. Our analysis confirms existing security issues that were previously informally identified and presents weaknesses that exists in the current e-passport implementation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The use of dual growing rods is a fusionless surgical approach to the treatment of early onset scoliosis (EOS) which aims to harness potential growth in order to correct spinal deformity. This study compared through in-vitro experiments the biomechanical response of two different rod designs under axial rotation loading. The study showed that a new design of telescoping growing rod preserved the rotational flexibility of the spine in comparison with rigid rods indicating them to be a more physiological way to improve the spinal deformity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A nonlinear finite element analysis was carried out to investigate the viscoplastic deformation of solder joints in a ball grid array (BGA) package under temperature cycle. The effects of constraint on print circuit board (PCB) and stiffness of substrate on the deformation behaviour of the solder joints were also studied. A relative damage stress was adopted to analyze the potential failure sites in the solder joints. The results indicated that high inelastic strain and strain energy density were developed in the joints close to the package center. On the other hand, high constraint and high relative damage stress were associated with the joint closest to the edge of the silicon chip. The joint closest to the edge of the silicon chip was regarded as the most susceptible failure site if cavitation instability is the dominant failure mechanism. Increase the external constraint on the print circuit board (PCB) causes a slight increase in stress triaxiality (m/eq) and relative damage stress in the joint closest to the edge of silicon die. The relative damage stress is not sensitive to the Young’s modulus of the substrate.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The catalytic action of putrescine specific amine oxidases acting in tandem with 4-aminobutyraldehyde dehydrogenase is explored as a degradative pathway in Rhodococcus opacus. By limiting the nitrogen source, increased catalytic activity was induced leading to a coordinated response in the oxidative deamination of putrescine to 4-aminobutyraldehyde and subsequent dehydrogenation to 4-aminobutyrate. Isolating the dehydrogenase by ion exchange chromatography and gel filtration revealed that the enzyme acts principally on linear aliphatic aldehydes possessing an amino moiety. Michaelis-Menten kinetic analysis delivered a Michaelis constant (KM=0.014mM) and maximum rate (Vmax=11.2μmol/min/mg) for the conversion of 4-aminobutyraldehyde to 4-aminobutyrate. The dehydrogenase identified by MALDI-TOF mass spectrometric analysis (E value=0.031, 23% coverage) belongs to a functionally related genomic cluster that includes the amine oxidase, suggesting their association in a directed cell response. Key regulatory, stress and transport encoding genes have been identified, along with candidate dehydrogenases and transaminases for the further conversion of 4-aminobutyrate to succinate. Genomic analysis has revealed highly similar metabolic gene clustering among members of Actinobacteria, providing insight into putrescine degradation notably among Micrococcaceae, Rhodococci and Corynebacterium by a pathway that was previously uncharacterised in bacteria.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Two native copper-containing amine oxidases (EC 1.4.3.21) have been isolated from Rhodococcus opacus and reveal phenotypic plasticity and catalytic activity with respect to structurally diverse natural and synthetic amines. Altering the amine growth substrate has enabled tailored and targeted oxidase upreg-ulation, which with subsequent treatment by precipitation, ion exchange and gel filtration, achieved a 90–150 fold purification. MALDI-TOF mass spectrometric and genomic analysis has indicated multiple gene activation with complex biodegradation pathways and regulatory mechanisms. Additional post-purification characterisation has drawn on the use of carbonyl reagent and chelating agent inhibitors. Michaelis–Menten kinetics for common aliphatic and aromatic amine substrates and several structural analogues demonstrated a broad specificity and high affinity with Michaelis constants (K M) ranging from 0.1 to 0.9 mM for C 1 –C 5 aliphatic mono-amines and <0.2 mM for a range of aromatic amines. Potential exploitation of the enzymatic versatility of the two isolated oxidases in biosensing and bioprocessing is discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

L-Amino acid oxidases (LAAOs) are useful catalysts for the deracemisation of racemic amino acid sub-strates when combined with abiotic reductants. The gene nadB encoding the L-aspartate amino acid oxidase from Pseudomonas putida (PpLASPO) has been cloned and expressed in E. coli. The purified PpLASPO enzyme displayed a K M for l-aspartic acid of 2.26 mM and a k cat = 10.6 s −1 , with lower activity also displayed towards L-asparagine, for which pronounced substrate inhibition was also observed. The pH optimum of the enzyme was recorded at pH 7.4. The enzyme was stable for 60 min at up to 40 • C, but rapid losses in activity were observed at 50 • C. A mutational analysis of the enzyme, based on its sequence homology with the LASPO from E. coli of known structure, appeared to confirm roles in substrate binding or catalysis for residues His244, His351, Arg386 and Arg290 and also for Thr259 and Gln242. The high activity of the enzyme, and its promiscuous acceptance of both L-asparagine and L-glutamate as substrates, if with low activity, suggests that PpLASPO may provide a good model enzyme for evolution studies towards AAOs of altered or improved properties in the future.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The binding kinetics of NF-kappaB p50 to the Ig-kappaB site and to a DNA duplex with no specific binding site were determined under varying conditions of potassium chloride concentration using a surface plasmonresonance biosensor. Association and dissociation rate constants were measured enabling calculation of the dissociation constants. Under previously established high affinity buffer conditions, the k a for both sequences was in the order of 10(7) M-1s-1whilst the k d values varied 600-fold in a sequence-dependent manner between 10(-1) and 10(-4 )s-1, suggesting that the selectivity of p50 for different sequences is mediated primarily through sequence-dependent dissociation rates. The calculated K D value for the Ig-kappaB sequence was 16 pM, whilst the K D for the non-specific sequence was 9.9 nM. As the ionic strength increased to levels which are closer to that of the cellular environment, the binding of p50 to the non-specific sequence was abolished whilst the specific affinity dropped to nanomolar levels. From these results, a mechanism is proposed in which p50 binds specific sequences with high affinity whilst binding non-specific sequences weakly enough to allow efficient searching of the DNA.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Technoeconomic analysis of renewable aviatin fuels has not been widely considered, despite the increasing global attention that the field has received. We present three process models for production of aviation fuel from microalgae, Pongamia pinnata, and sugarcane molasses. The models and assumptions have been deposited on a wiki (http://qsafi.aibn.uq.edu.au) and are open and accessible to the community. Based on currently available long-term reputable technological data, this analysis indicates that the biorefinieries processing the microalgae, Pongamia seeds, and sugarcane feedstocks would be competitive with crude oil at $1343, $374, and $301/bbl, respectively. Sensitivity analyses of the major economic drivers suggest technological and market developments that would bring the corresponding figures down to $385, $255, and $168/bbl. The dynamic nature of the freely accessible models will allow the community to track progress toward economic competitiveness of aviation fuels from these renewable feedstocks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research analyses the extent of damage to buildings in Brisbane, Ipswich and Grantham during the recent Eastern Australia flooding and explore the role planning and design/construction regulations played in these failures. It highlights weaknesses in the current systems and propose effective solutions to mitigate future damage and financial loss under current or future climates. 2010 and early 2011 saw major flooding throughout much of Eastern Australia. Queensland and Victoria were particularly hard hit, with insured losses in these states reaching $2.5 billion and many thousands of homes inundated. The Queensland cities of Brisbane and Ipswich were the worst affected; around two-thirds of all inundated property/buildings were in these two areas. Other local government areas to record high levels of inundation were Central Highlands and Rockhampton Regional Councils in Queensland, and Buloke, Campaspe, Central Gold Fields and Loddon in Victoria. Flash flooding was a problem in a number of Victorian councils, but the Lockyer Valley west of Ipswich suffered the most extensive damage with 19 lives lost and more than 100 homes completely destroyed. In all more than 28,000 properties were inundated in Queensland and around 2,500 buildings affected in Victoria. Of the residential properties affected in Brisbane, around 90% were in areas developed prior to the introduction of floodplain development controls, with many also suffering inundation during the 1974 floods. The project developed a predictive model for estimating flood loss and occupant displacement. This model can now be used for flood risk assessments or rapid assessment of impacts following a flood event.