992 resultados para Zero-one laws
Resumo:
A subfilter-scale (SFS) stress model is developed for large-eddy simulations (LES) and is tested on various benchmark problems in both wall-resolved and wall-modelled LES. The basic ingredients of the proposed model are the model length-scale, and the model parameter. The model length-scale is defined as a fraction of the integral scale of the flow, decoupled from the grid. The portion of the resolved scales (LES resolution) appears as a user-defined model parameter, an advantage that the user decides the LES resolution. The model parameter is determined based on a measure of LES resolution, the SFS activity. The user decides a value for the SFS activity (based on the affordable computational budget and expected accuracy), and the model parameter is calculated dynamically. Depending on how the SFS activity is enforced, two SFS models are proposed. In one approach the user assigns the global (volume averaged) contribution of SFS to the transport (global model), while in the second model (local model), SFS activity is decided locally (locally averaged). The models are tested on isotropic turbulence, channel flow, backward-facing step and separating boundary layer. In wall-resolved LES, both global and local models perform quite accurately. Due to their near-wall behaviour, they result in accurate prediction of the flow on coarse grids. The backward-facing step also highlights the advantage of decoupling the model length-scale from the mesh. Despite the sharply refined grid near the step, the proposed SFS models yield a smooth, while physically consistent filter-width distribution, which minimizes errors when grid discontinuity is present. Finally the model application is extended to wall-modelled LES and is tested on channel flow and separating boundary layer. Given the coarse resolution used in wall-modelled LES, near the wall most of the eddies become SFS and SFS activity is required to be locally increased. The results are in very good agreement with the data for the channel. Errors in the prediction of separation and reattachment are observed in the separated flow, that are somewhat improved with some modifications to the wall-layer model.
Resumo:
Rapid socioeconomic development in Saudi Arabia, as a result of oil revenues, has had profound effects on people’s lifestyles, including the transformation of people’s dietary habits. Such dietary transformations, known as the nutrition transition, are common in countries undergoing rapid socioeconomic changes. This transition is significant in Saudi Arabia as the traditional Saudi diet is considered a healthy one. Adoption of the Western diet has had negative health effects on the Saudi population, especially adolescents. As evidenced in many studies, adolescents are the most affected population when it comes to changes in dietary habits and physical activity. Adolescence is a vulnerable stage of life when dietary habits are developed, often lasting into adulthood, and may not be easily changed. In the case of Saudi Arabia, youth or adolescents represent almost 60% of the population; therefore, the eating habits they develop now could have profound consequences for population health in the future. To develop effective health promotion strategies, it is important to understand the sociocultural factors that influence the dietary habits and food choices of Saudi teens. I conducted two semi-structured, open-ended interviews, using photo-elicitation techniques, with 12 Saudi girls, aged 15-16 years. Analysis of the data shows four factors that pulled the participants toward eating home cooked traditional food and five factors that pushed participants away from eating home cooked traditional foods. The research suggests that despite the attractiveness of modern, Western ways of eating for Saudi teen girls, parents still play a key role in encouraging and supporting them to eat healthy food.
Resumo:
The question that I will explore in this research dissertation is whether one can defend the rights of homeland minorities as a progressive extension of the existing norms of human rights. This question calls for several deeper inquiries about the nature, the function and the underlying justifications for both human rights and minority rights. In particular, this research project will examine the following issues: on what normative grounds the available norms of human rights and minority rights are justified; if there is any methodic way to use the normative logic of human rights to support substantial forms of minority claims, such as the right to self-determination; whether human rights can take the form of group rights; and finally, whether there is any non-sectarian basis for justifying the minority norms, which can be acceptable from both liberal and non-liberal perspectives. This research project has some implications for both theories of minority rights and human rights. On the one hand, the research employs the topic of minority rights to shed light on deficiencies of the existing political theories of human rights. On the other hand, it uses the political theory to shed light on how existing theories of minority rights could be improved and amended. The inquiry will ultimately clarify how to judge the merit of the claim that minority rights are or should be a part of human rights norms.
Resumo:
Heat management in mines is a growing issue as mines expand physically in size and depth and as the infrastructure grows that is required to maintain them. Heat management is a concern as it relates to the health and safety of the workers as set by the regulations of governing bodies as well as the heat sensitive equipment that may be found throughout the mine workings. In order to reduce the exposure of working in hot environments there are engineering and management systems that can monitor and control the environmental conditions within the mine. The successful implementation of these methods can manage the downtime caused by heat stress environments, which can increase overall production. This thesis introduces an approach to monitoring and data based heat management. A case study is presented with an in depth approach to data collection. Data was collected for a period of up to and over one year. Continuous monitoring was conducted by equipment that was developed both commercially and within the mine site. The monitoring instrumentation was used to assess the environmental conditions found within the study area. Analysis of the data allowed for an engineering assessment of viable options in order to control and manage the environment heat stress. An option is developed and presented which allows for the greatest impact on the heat stress conditions within the case study area and is economically viable for the mine site.
Resumo:
Security defects are common in large software systems because of their size and complexity. Although efficient development processes, testing, and maintenance policies are applied to software systems, there are still a large number of vulnerabilities that can remain, despite these measures. Some vulnerabilities stay in a system from one release to the next one because they cannot be easily reproduced through testing. These vulnerabilities endanger the security of the systems. We propose vulnerability classification and prediction frameworks based on vulnerability reproducibility. The frameworks are effective to identify the types and locations of vulnerabilities in the earlier stage, and improve the security of software in the next versions (referred to as releases). We expand an existing concept of software bug classification to vulnerability classification (easily reproducible and hard to reproduce) to develop a classification framework for differentiating between these vulnerabilities based on code fixes and textual reports. We then investigate the potential correlations between the vulnerability categories and the classical software metrics and some other runtime environmental factors of reproducibility to develop a vulnerability prediction framework. The classification and prediction frameworks help developers adopt corresponding mitigation or elimination actions and develop appropriate test cases. Also, the vulnerability prediction framework is of great help for security experts focus their effort on the top-ranked vulnerability-prone files. As a result, the frameworks decrease the number of attacks that exploit security vulnerabilities in the next versions of the software. To build the classification and prediction frameworks, different machine learning techniques (C4.5 Decision Tree, Random Forest, Logistic Regression, and Naive Bayes) are employed. The effectiveness of the proposed frameworks is assessed based on collected software security defects of Mozilla Firefox.
Resumo:
This research develops an econometric framework to analyze time series processes with bounds. The framework is general enough that it can incorporate several different kinds of bounding information that constrain continuous-time stochastic processes between discretely-sampled observations. It applies to situations in which the process is known to remain within an interval between observations, by way of either a known constraint or through the observation of extreme realizations of the process. The main statistical technique employs the theory of maximum likelihood estimation. This approach leads to the development of the asymptotic distribution theory for the estimation of the parameters in bounded diffusion models. The results of this analysis present several implications for empirical research. The advantages are realized in the form of efficiency gains, bias reduction and in the flexibility of model specification. A bias arises in the presence of bounding information that is ignored, while it is mitigated within this framework. An efficiency gain arises, in the sense that the statistical methods make use of conditioning information, as revealed by the bounds. Further, the specification of an econometric model can be uncoupled from the restriction to the bounds, leaving the researcher free to model the process near the bound in a way that avoids bias from misspecification. One byproduct of the improvements in model specification is that the more precise model estimation exposes other sources of misspecification. Some processes reveal themselves to be unlikely candidates for a given diffusion model, once the observations are analyzed in combination with the bounding information. A closer inspection of the theoretical foundation behind diffusion models leads to a more general specification of the model. This approach is used to produce a set of algorithms to make the model computationally feasible and more widely applicable. Finally, the modeling framework is applied to a series of interest rates, which, for several years, have been constrained by the lower bound of zero. The estimates from a series of diffusion models suggest a substantial difference in estimation results between models that ignore bounds and the framework that takes bounding information into consideration.
Resumo:
To find examples of effecient locomotion and manoeuvrability, one need only turn to the elegant solutions natural flyers and swimmers have converged upon. This dissertation is specifically motivated by processes of evolutionary convergence, which have led to the propulsors and body shapes in nature that exhibit strong geometric collapse over diverse scales. These body features are abstracted in the studies presented herein using low-aspect-ratio at plates and a three-dimensional body of revolution (a sphere). The highly-separated vortical wakes that develop during accelerations are systematically characterized as a function of planform shape, aspect ratio, Reynolds number, and initial boundary conditions. To this end, force measurements and time-resolved (planar) particle image velocimetry have been used throughout to quantify the instantaneous forces and vortex evolution in the wake of the bluff bodies. During rectilinear motions, the wake development for the flat plates is primarily dependent on plate aspect ratio, with edge discontinuities and curvature playing only a secondary role. Furthermore, the axisymmetric case, i.e. the circular plate, shows strong sensitivity to Reynolds number, while this sensitivity quickly diminishes with increasing aspect ratio. For rotational motions, global insensitivity to plate aspect ratio has been observed. For the sphere, it has been shown that accelerations play an important role in the mitigation of flow separation. These results - expounded upon in this dissertation - have begun to shed light on the specific vortex dynamics that may be coopted by flying and swimming species of all shapes and sizes towards efficient locomotion.
Resumo:
Salmonella are Gram-negative, intracellular food-borne pathogens that cause pregnancy complications. In pregnant mice, Salmonella enterica serovar Typhimurium (S.Tm) infection results in placental bacterial replication, inflammation, necrosis, and fetal loss by unknown mechanisms. Necroptosis, or programmed necrosis mediated by RIPK3 (receptor-interacting protein kinase 3), an inflammatory cell death pathway, is implicated in the pathogenesis of S.Tm in non-pregnant mice. This goal of this thesis was to investigate the role of necroptosis in the pathogenesis of S.Tm infection during mouse pregnancy. I hypothesized that elimination of the key necroptotic cell death protein RIPK3 would decrease placental inflammation and trophoblast cell death, and increase conceptus survival compared to controls. Mice expressing a functional Slc11a1 (encodes the natural resistance-associated macrophage protein 1, NRAMP1) gene with or without RIPK3 function (Ripk3-/-Slc11a1+/+ compared to Slc11a1+/+) were infected with 103 S.Tm by tail vein injection on gestational day (GD) 12. Mice were euthanized on GD 14 (48h post-infection) or GD 15 (72h post-infection) and implantation sites (IS) and maternal serum were harvested for analyses. In nearly all challenged mice (except one outlier), S.Tm were detected in most IS within a litter but there was limited immune cell infiltration, placental damage or cell death in Slc11a1 competent mice regardless of Ripk3 gene deletion. Maternal serum cytokine analyses confirmed lack of maternal immune responses to S.Tm infection. IS amongst the litter of a single dam (Ripk3-/-Slc11a1+/+ at 72h postinfection) displayed heavy but not universal placental S.Tm infection of decidual tissues and spongiotrophoblast, associated with elevated maternal serum pro-inflammatory cytokines. S.Tm infection of the fetal yolk sac (YS) was observed in 54.5% of IS from this dam. YS infection was confirmed in archival samples in mice expressing Ripk3 with intact Slc11a1 and in mice lacking functional Slc11a1. In Slc11a1 incompetent mice, S.Tm were detected in placental labyrinthine trophoblast. Based on the available data, this thesis suggests that Ripk3 and necroptosis have no significant roles in either promotion or prevention of progressive Salmonella infection during mouse pregnancy. It also provides pilot data that NRAMP1 controls placental localization and lethality due to YS infection.
Resumo:
Today more than ever, with the recent war in Ukraine and the increasing number of attacks that affect systems of nations and companies every day, the world realizes that cybersecurity can no longer be considered just as a “cost”. It must become a pillar for our infrastructures that involve the security of our nations and the safety of people. Critical infrastructure, like energy, financial services, and healthcare, have become targets of many cyberattacks from several criminal groups, with an increasing number of resources and competencies, putting at risk the security and safety of companies and entire nations. This thesis aims to investigate the state-of-the-art regarding the best practice for securing Industrial control systems. We study the differences between two security frameworks. The first is Industrial Demilitarized Zone (I-DMZ), a perimeter-based security solution. The second one is the Zero Trust Architecture (ZTA) which removes the concept of perimeter to offer an entirely new approach to cybersecurity based on the slogan ‘Never Trust, always verify’. Starting from this premise, the Zero Trust model embeds strict Authentication, Authorization, and monitoring controls for any access to any resource. We have defined two architectures according to the State-of-the-art and the cybersecurity experts’ guidelines to compare I-DMZ, and Zero Trust approaches to ICS security. The goal is to demonstrate how a Zero Trust approach dramatically reduces the possibility of an attacker penetrating the network or moving laterally to compromise the entire infrastructure. A third architecture has been defined based on Cloud and fog/edge computing technology. It shows how Cloud solutions can improve the security and reliability of infrastructure and production processes that can benefit from a range of new functionalities, that the Cloud could offer as-a-Service.We have implemented and tested our Zero Trust solution and its ability to block intrusion or attempted attacks.
Resumo:
Amphibians have been declining worldwide and the comprehension of the threats that they face could be improved by using mark-recapture models to estimate vital rates of natural populations. Recently, the consequences of marking amphibians have been under discussion and the effects of toe clipping on survival are debatable, although it is still the most common technique for individually identifying amphibians. The passive integrated transponder (PIT tag) is an alternative technique, but comparisons among marking techniques in free-ranging populations are still lacking. We compared these two marking techniques using mark-recapture models to estimate apparent survival and recapture probability of a neotropical population of the blacksmith tree frog, Hypsiboas faber. We tested the effects of marking technique and number of toe pads removed while controlling for sex. Survival was similar among groups, although slightly decreased from individuals with one toe pad removed, to individuals with two and three toe pads removed, and finally to PIT-tagged individuals. No sex differences were detected. Recapture probability slightly increased with the number of toe pads removed and was the lowest for PIT-tagged individuals. Sex was an important predictor for recapture probability, with males being nearly five times more likely to be recaptured. Potential negative effects of both techniques may include reduced locomotion and high stress levels. We recommend the use of covariates in models to better understand the effects of marking techniques on frogs. Accounting for the effect of the technique on the results should be considered, because most techniques may reduce survival. Based on our results, but also on logistical and cost issues associated with PIT tagging, we suggest the use of toe clipping with anurans like the blacksmith tree frog.
Resumo:
In the title compound, C17H15NO4, the conformation about the C=C double bond [1.348 (2) Å] is E with the ketone group almost co-planar [C-C-C-C torsion angle = 7.2 (2)°] but the phenyl group twisted away [C-C-C-C = 160.93 (17)°]. The terminal aromatic rings are almost perpendicular to each other [dihedral angle = 81.61 (9)°] giving the mol-ecule an overall U-shape. The crystal packing feature benzene-C-H⋯O(ketone) contacts that lead to supra-molecular helical chains along the b axis. These are connected by π-π inter-actions between benzene and phenyl rings [inter-centroid distance = 3.6648 (14) Å], resulting in the formation of a supra-molecular layer in the bc plane.
Resumo:
In the title compound, C17H14N2O6, the conformation about the C=C double bond [1.345 (2) Å] is E, with the ketone moiety almost coplanar [C-C-C-C torsion angle = 9.5 (2)°] along with the phenyl ring [C-C-C-C = 5.9 (2)°]. The aromatic rings are almost perpendicular to each other [dihedral angle = 86.66 (7)°]. The 4-nitro moiety is approximately coplanar with the benzene ring to which it is attached [O-N-C-C = 4.2 (2)°], whereas the one in the ortho position is twisted [O-N-C-C = 138.28 (13)°]. The mol-ecules associate via C-H⋯O inter-actions, involving both O atoms from the 2-nitro group, to form a helical supra-molecular chain along [010]. Nitro-nitro N⋯O inter-actions [2.8461 (19) Å] connect the chains into layers that stack along [001].
Resumo:
In this work we report new silicon and germanium tubular nanostructures with no corresponding stable carbon analogues. The electronic and mechanical properties of these new tubes were investigated through ab initio methods. Our results show that these structures have lower energy than their corresponding nanoribbon structures and are stable up to high temperatures (500 and 1000 K, for silicon and germanium tubes, respectively). Both tubes are semiconducting with small indirect band gaps, which can be significantly altered by both compressive and tensile strains. Large bandgap variations of almost 50% were observed for strain rates as small as 3%, suggesting their possible applications in sensor devices. They also present high Young's modulus values (0.25 and 0.15 TPa, respectively). TEM images were simulated to help in the identification of these new structures.
Resumo:
Often in biomedical research, we deal with continuous (clustered) proportion responses ranging between zero and one quantifying the disease status of the cluster units. Interestingly, the study population might also consist of relatively disease-free as well as highly diseased subjects, contributing to proportion values in the interval [0, 1]. Regression on a variety of parametric densities with support lying in (0, 1), such as beta regression, can assess important covariate effects. However, they are deemed inappropriate due to the presence of zeros and/or ones. To evade this, we introduce a class of general proportion density, and further augment the probabilities of zero and one to this general proportion density, controlling for the clustering. Our approach is Bayesian and presents a computationally convenient framework amenable to available freeware. Bayesian case-deletion influence diagnostics based on q-divergence measures are automatic from the Markov chain Monte Carlo output. The methodology is illustrated using both simulation studies and application to a real dataset from a clinical periodontology study.
Resumo:
The function of lipids in human nutrition has been intensively debated in the last decade.This context reinforces the concern about controlling the trans fat ingestion, due to its negative implications on health. Interesterification provides an important alternative to modify the consistency of oils and fats without causing formation of trans isomers. This article reports research done towards production of zero trans fats by chemical interesterification, for different industrial purposes. Aspects related to the effect of trans fats on diet, their impact on health and modifications in Brazilian legislation are also covered.