127 resultados para Micro-aggregation
em Queensland University of Technology - ePrints Archive
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Resumo:
Current routine cell culture techniques are only poorly suited to capture the physiological complexity of tumor microenvironments, wherein tumor cell function is affected by intricate three-dimensional (3D), integrin-dependent cell-cell and cell-extracellular matrix (ECM) interactions. 3D cell cultures allow the investigation of cancer-associated proteases like kallikreins as they degrade ECM proteins and alter integrin signaling, promoting malignant cell behaviors. Here, we employed a hydrogel microwell array platform to probe using a high-throughput mode how ovarian cancer cell aggregates of defined size form and survive in response to the expression of kallikreins and treatment with paclitaxel, by performing microscopic, quantitative image, gene and protein analyses dependent on the varying microwell and aggregate sizes. Paclitaxel treatment increased aggregate formation and survival of kallikrein-expressing cancer cells and levels of integrins and integrin-related factors. Cancer cell aggregate formation was improved with increasing aggregate size, thereby reducing cell death and enhancing integrin expression upon paclitaxel treatment. Therefore, hydrogel microwell arrays are a powerful tool to screen the viability of cancer cell aggregates upon modulation of protease expression, integrin engagement and anti-cancer treatment providing a micro-scaled yet high-throughput technique to assess malignant progression and drug-resistance.
Resumo:
Various reasons have been proffered for female under-representation in tertiary information technology (IT) courses and the IT industry with most relating to cultural moirés. The 2006 Geek Goddess calendar was designed to alter IT’s “geeky image” and the term is used here to represent young women enrolled in pre-service IT teaching courses. Their special mix of IT and teaching draws on conflicting stereotypes and represents a micro-climate which is typically lost in studies of IT occupations because of the aggregation of all IT roles. This paper will report on a small-scale investigation of female students (N=25) at a university in Queensland (Australia) studying to become teachers of secondary IT subjects. They are entering the IT industry, gendered as a “male” occupation, through the safe space of teaching a discipline allied to feminine qualities of nurturing. They are “geek goddesses” who – perhaps to balance the masculine and feminine of these occupations - have decided to go to school rather than into corporations or government.
Resumo:
SEM observations of the aqueous suspensions of kaolinite from Birdwood (South Australia) and Georgia (USA) show noticeable differences in number of physical behaviour which has been explained by different microstructure constitution.. Birdwood kaolinite dispersion gels are observed at very low solid loadings in comparison with Georgia KGa-1 kaolinite dispersions which remain fluid at higher solids loading. To explain this behaviour, the specific particle interactions of Birdwood kaolinite, different from interaction in Georgia kaolinite have been proposed. These interactions may be brought about by the presence of nano-bubbles on clay crystal edges and may force clay particles to aggregate by bubble coalescence. This explains the predominance of stair step edge-edge like (EE) contacts in suspension of Birdwood kaolinite. Such EE linked particles build long strings that form a spacious cell structure. Hydrocarbon contamination of colloidal kaolinite particles and low aspect ratio are discussed as possible explanations of this unusual behaviour of Birdwood kaolinite. In Georgia KGa-1 kaolinite dispersions instead of EE contact between platelets displayed in Birdwood kaolinite, most particles have edge to face (EF) contacts building a cardhouse structure. Such an arrangement is much less voluminous in comparison with the Birdwood kaolinite cellular honeycomb structure observed previously in smectite aqueous suspensions. Such structural characteristics of KGa-1 kaolinite particles enable higher solid volume fractions pulps to form before significantly networked gel consistency is attained.