244 resultados para Fracture mechanisms
Resumo:
Our understanding of the mechanisms of action of GH and its receptor, the GHR, has advanced significantly in the last decade and has provided some important surprises. It is now clear that the GH-GHR axis activates a number of inter-related signalling pathways, not all of which are dependent on the intracellular tyrosine kinase, JAK2 as originally postulated. JAK2-independent pathways, mediated via the Src family kinases, together with a number of negative regulators of GH signalling and emerging cross-talk mechanisms with other growth factor receptors, provide a complex array of mechanisms that are capable of fine-tuning responses to GH in a cell context dependent manner. Additionally, it is also now clear that GH and the GHR can translocate to the nucleus of target cells and initiate, as yet not well defined, nuclear responses. Continued emphasis on elucidation of these complex mechanisms is critical to provide further insights into the diverse physiological and pathophysiological effects of GH.
Resumo:
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.
Resumo:
Secure communications between large number of sensor nodes that are randomly scattered over a hostile territory, necessitate efficient key distribution schemes. However, due to limited resources at sensor nodes such schemes cannot be based on post deployment computations. Instead, pairwise (symmetric) keys are required to be pre-distributed by assigning a list of keys, (a.k.a. key-chain), to each sensor node. If a pair of nodes does not have a common key after deployment then they must find a key-path with secured links. The objective is to minimize the keychain size while (i) maximizing pairwise key sharing probability and resilience, and (ii) minimizing average key-path length. This paper presents a deterministic key distribution scheme based on Expander Graphs. It shows how to map the parameters (e.g., degree, expansion, and diameter) of a Ramanujan Expander Graph to the desired properties of a key distribution scheme for a physical network topology.
Resumo:
Herein the mechanical properties of graphene, including Young’s modulus, fracture stress and fracture strain have been investigated by molecular dynamics simulations. The simulation results show that the mechanical properties of graphene are sensitive to the temperature changes but insensitive to the layer numbers in the multilayer graphene. Increasing temperature exerts adverse and significant effects on the mechanical properties of graphene. However, the adverse effect produced by the increasing layer number is marginal. On the other hand, isotope substitutions in graphene play a negligible role in modifying the mechanical properties of graphene.
Resumo:
Intercalated Archean komatiites and dacites sit above a thick footwall dacite unit in the host rock succession at the Black Swan Nickel Mine, north of Kalgoorlie in the Yilgarn Craton, Western Australia. Both lithofacies occur in units that vary in scale from laterally extensive at the scale of the mine lease to localized, thin, irregular bodies, from > 100 m thick to only centimetres thick. Some dacites are only slightly altered and deformed, and are interpreted to post-date major deformation and alteration (late porphyries). However, the majority of the dacites display evidence of deformation, especially at contacts, and metamorphism, varying from silicification and chlorite alteration at contacts to pervasive low grade regional metamorphic alteration represented by common assemblages of chlorite, sericite and albite. Texturally, the dacites vary from entirely massive and coherent to partially brecciated to totally brecciated. Strangely, some dacites are coherent at the margins and brecciated internally. Breccia textures vary from cryptically defined, to blocky, closely packed, in situ jig-saw fit textures with secondary minerals in fractures between clasts, to more apparent matrix rich textures with round clast forms, giving apparent conglomerate textures. Some clast zones have multi-coloured clasts, giving the impression of varied provenance. Strangely however, all these textural variants have gradational relationships with each other, and no bedding or depositional structures are present. This indicates that all textures have an in situ origin. The komatiites are generally altered and pervasively carbonate veined. Preservation of original textures is patchy and local, but includes coarse adcumulate, mesocumulate, orthocumulate, crescumulate-harrisite and occasionally spinifex textures. Where original contacts between komatiites and dacites are preserved intact (i.e. not sheared or overprinted by alteration), the komatiites have chilled margins, whereas the dacites do not. The margins of the dacites are commonly silicified, and inclusions of dacite occur in komatiite, even at the top contacts of komatiite units, but komatiite clasts do not occur in the dacites. The komatiites therefore were emplaced as sills into the dacites, and the intercalated relationships are interpreted as intrusive. The brecciation and alteration in the dacites are interpreted as being largely due to hydraulic fracturing and alteration induced by contact metamorphic effects and hydrothermal alteration deriving from the intrusion of komatiites into the felsic pile. The absence of autobreccia and hyaloclastite textures in the dacites suggest that they were emplaced as an earlier intrusive (sill?) complex at a high level in the crust.
Resumo:
The focus of knowledge management (KM) in the construction industry is moving towards capability building for value creation. The study reported by this paper is motivated by recent assertions about the genesis and evolution of knowledge management capability (KMC) in the strategic management field. It attempts to shed light on the governance of learning mechanisms that develop KMC within the context of construction firms. A questionnaire survey was administered to a sample of construction contractors operating in the very dynamic Hong Kong market to elicit opinions on the learning mechanisms and business outcomes of targeted firms. On the basis of a total of 149 usable responses, structural equation modeling (SEM) analysis identified relationships among knowledge-governance mechanisms, knowledge processes, and business performance, thereby supporting the existence of strategic learning loops. The study findings provide evidence from the construction context for capability assertions that knowledge-governance mechanisms and processes form learning mechanisms that carry out strategic learning to create value, effect performance outcomes, and ultimately drive the evolution of KMC. The findings imply that it is feasible for managing construction firms to govern learning mechanisms through managing the capability-based holistic KM system, thereby reconfiguring KMC to match needs in the dynamic market environment over time.
Resumo:
PURPOSE. To evaluate the utility of blood cultures in the assessment of early postoperative fever in hip fracture patients with no other indicators of sepsis. METHODS. 101 blood cultures were drawn on postoperative days 0 to 5 to investigate 84 febrile episodes in 31 women and 30 men (mean age, 80 years) whose body temperature measured via the tympanic route was ≥38ºC. Culture results of these 61 patients were divided into culture-positive and culture-negative groups for comparison. RESULTS. Of the 101 blood cultures, only 2 were positive: one was obtained 5 days after dynamic hip screw fixation, and the other 4 days after hemiarthroplasty. Both blood cultures grew coagulase-negative staphylococcal species, which were deemed to be skin contaminants not requiring change of patient management. 44 of these patients were treated with oral or intravenous antibiotics for a period of time. CONCLUSION. The risk of bacteraemia in patients with postoperative fever but no other symptoms of infection is low. Routine procurement of blood cultures in such patients is ineffective and of limited utility.
Resumo:
Staphylococcus aureus, one of the major pathogenic bacteria, is associated with substantial morbidity and mortality. The disease burden of staphylococcal infections is significant, which is primarily attributed to its adaptability and resistance to environmental stresses. S. aureus has the ability to develop multiple resistances to antimicrobial agents. These high resistances make pathogenicity of S. aureus one of the most complex mechanisms to understand and manage. Proteomic and bioinformatics approaches show great potential in exploring microbial adaptation strategies, ability to cause disease by pathogenic bacteria and the development of diagnostic tools. A summary of the latest developments in the application of ‘omics’ technologies to understand resistance mechanisms in S. aureus and their future role in antistaphylococcal vaccine and/or drug discovery is given here.
Resumo:
Cu/Ni/W nanolayered composites with individual layer thickness ranging from 5nm to 300nm were prepared by a magnetron sputtering system. Microstructures and strength of the nanolayered composites were investigated by using the nanoindentation method combined with theoretical analysis. Microstructure characterization revealed that the Cu/Ni/W composite consists of a typical Cu/Ni coherent interface and Cu/W and Ni/W incoherent interfaces. Cu/Ni/W composites have an ultrahigh strength and a large strengthening ability compared with bi-constituent Cu–X(X¼Ni, W, Au, Ag, Cr, Nb, etc.) nanolayered composites. Summarizing the present results and those reported in the literature, we systematically analyze the origin of the ultrahigh strength and its length scale dependence by taking into account the constituent layer properties, layer scales and heterogeneous layer/layer interface characteristics, including lattice and modulus mismatch as well as interface structure.
Resumo:
Advances in technology introduce new application areas for sensor networks. Foreseeable wide deployment of mission critical sensor networks creates concerns on security issues. Security of large scale densely deployed and infrastructure less wireless networks of resource limited sensor nodes requires efficient key distribution and management mechanisms. We consider distributed and hierarchical wireless sensor networks where unicast, multicast and broadcast type of communications can take place. We evaluate deterministic, probabilistic and hybrid type of key pre-distribution and dynamic key generation algorithms for distributing pair-wise, group-wise and network-wise keys.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighbouring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighbouring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools. Comparison to probabilistic schemes shows that our combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Structural framing systems and mechanisms designed for normal use rarely possess adequate robustness to withstand the effects of large impacts, blasts and extreme earthquakes that have been experienced in recent times. Robustness is the property of systems that enables them to survive unforeseen or unusual circumstances (Knoll & Vogel, 2009). Queensland University of Technology with industry collaboration is engaged in a program of research that commenced 15 years ago to study the impact of such unforeseeable phenomena and investigate methods of improving robustness and safety with protective mechanisms embedded or designed in structural systems. This paper highlights some of the research pertaining to seismic protection of building structures, rollover protective structures and effects of vehicular impact and blast on key elements in structures that could propagate catastrophic and disproportionate collapse.