896 resultados para segmental compression forces
Resumo:
• For the purposes of this chapter, “health law” encapsulates regulation of the medical and health professions, the administration of health services and the maintenance of public health to the extent that it is connected to the provision of health services. • There are diverging views as to whether health law can be regarded as a discrete “area of law”. • Health law draws on other areas of law such as tort law, criminal law and family law. It also draws upon other disciplines, most notably medical and health ethics. • Social and economic forces have influenced the development and direction of health law, and these forces may become even more influential in the future. • The increasingly globalised world has implications for Australia's health systems and raises questions and creates commitments in respect of the international community. • Technological developments, including in respect of treatment, diagnosis and information management, create ongoing challenges for health law. • Patient rights, human rights and consumerism are increasingly key drivers in the development of health law. • Health law is significant to contemporary Australian society because of the gravity of the topics that fall within its ambit, its social relevance to so many aspects of human existence and endeavour, the important role it plays in protecting the vulnerable, and the extent to which it engages with fundamental principles of justice.
Resumo:
Impact forces develop at the wheel/rail interface due to the presence of defects in the running surface of the wheel and/ or the railhead. This paper reports on wheel impacts, caused by permanently dipped rail joints, that are characterised by high-frequency impact forces generated by high amplifications of the static load that occur for a very short duration (P1 forces), followed by relatively low frequency, lower amplitude forces (P2 forces) that occur for a longer duration. These impact forces are affected by the design of components adjacent to the wheel and rail, namely the bogie’s primary suspension and rail seat pads; the influences of stiffness and damping characteristics of these components are investigated. A modified three-dimensional simulation model of the dynamics of the wagon/track system that includes defects in the track is created and is used to obtain the time series of the impact force. This is converted into impact force factors that are compared with a set of field-measured data reported in the literature. A simplified equation for the determination of impact force factors due to dipped rail joints is also proposed and validated.
Resumo:
Finite element (FE) model studies have made important contributions to our understanding of functional biomechanics of the lumbar spine. However, if a model is used to answer clinical and biomechanical questions over a certain population, their inherently large inter-subject variability has to be considered. Current FE model studies, however, generally account only for a single distinct spinal geometry with one set of material properties. This raises questions concerning their predictive power, their range of results and on their agreement with in vitro and in vivo values. Eight well-established FE models of the lumbar spine (L1-5) of different research centres around the globe were subjected to pure and combined loading modes and compared to in vitro and in vivo measurements for intervertebral rotations, disc pressures and facet joint forces. Under pure moment loading, the predicted L1-5 rotations of almost all models fell within the reported in vitro ranges, and their median values differed on average by only 2° for flexion-extension, 1° for lateral bending and 5° for axial rotation. Predicted median facet joint forces and disc pressures were also in good agreement with published median in vitro values. However, the ranges of predictions were larger and exceeded those reported in vitro, especially for the facet joint forces. For all combined loading modes, except for flexion, predicted median segmental intervertebral rotations and disc pressures were in good agreement with measured in vivo values. In light of high inter-subject variability, the generalization of results of a single model to a population remains a concern. This study demonstrated that the pooled median of individual model results, similar to a probabilistic approach, can be used as an improved predictive tool in order to estimate the response of the lumbar spine.
Resumo:
Current design rules for the member capacities of cold-formed steel columns are based on the same non-dimensional strength curve for both fixed and pinned-ended columns at ambient temperature. This research has investigated the accuracy of using current ambient temperature design rules in Australia/New Zealand (AS/NZS 4600), American (AISI S100) and European (Eurocode 3 Part 1.3) standards in determining the flexural–torsional buckling capacities of cold-formed steel columns at uniform elevated temperatures using appropriately reduced mechanical properties. It was found that these design rules accurately predicted the member capacities of pin ended lipped channel columns undergoing flexural torsional buckling at elevated temperatures. However, for fixed ended columns with warping fixity undergoing flexural–torsional buckling, the current design rules significantly underestimated the column capacities as they disregard the beneficial effect of warping fixity. This paper has therefore recommended the use of improved design rules developed for ambient temperature conditions to predict the axial compression capacities of fixed ended columns subject to flexural–torsional buckling at elevated temperatures within AS/NZS 4600 and AISI S100 design provisions. The accuracy of the proposed fire design rules was verified using finite element analysis and test results of cold-formed lipped channel columns at elevated temperatures except for low strength steel columns with intermediate slenderness whose behaviour was influenced by the increased nonlinearity in the stress–strain curves at elevated temperatures. Further research is required to include these effects within AS/NZS 4600 and AISI S100 design rules. However, Eurocode 3 Part 1.3 design rules can be used for this purpose by using suitable buckling curves as recommended in this paper.
Resumo:
This research treated the response of underground transportation tunnels to surface blast loads using advanced computer simulation techniques. The influences of important parameters, such as tunnel material, geometrical configuration of segments and surrounding soil were investigated. The findings of this research offer significant new information on the blast performance of underground tunnels and will contribute towards future civil engineering applications.
Resumo:
This thesis is a comprehensive study of microalgae biodiesel for the compression ignition engine. It examines microalgae growing conditions, the extraction process and physiochemical properties with a wide range of microalgae species. It also evaluates microalgae biodiesel with regards to engine performance and emission characteristics and explains the difficulties and potentiality of microalgae as a biodiesel. In doing so, an extensive analysis of different extraction methods and engine testing was conducted and a comprehensive study on microalgae biodiesel is presented.
Resumo:
Preneel, Govaerts and Vandewalle (PGV) analysed the security of single-block-length block cipher based compression functions assuming that the underlying block cipher has no weaknesses. They showed that 12 out of 64 possible compression functions are collision and (second) preimage resistant. Black, Rogaway and Shrimpton formally proved this result in the ideal cipher model. However, in the indifferentiability security framework introduced by Maurer, Renner and Holenstein, all these 12 schemes are easily differentiable from a fixed input-length random oracle (FIL-RO) even when their underlying block cipher is ideal. We address the problem of building indifferentiable compression functions from the PGV compression functions. We consider a general form of 64 PGV compression functions and replace the linear feed-forward operation in this generic PGV compression function with an ideal block cipher independent of the one used in the generic PGV construction. This modified construction is called a generic modified PGV (MPGV). We analyse indifferentiability of the generic MPGV construction in the ideal cipher model and show that 12 out of 64 MPGV compression functions in this framework are indifferentiable from a FIL-RO. To our knowledge, this is the first result showing that two independent block ciphers are sufficient to design indifferentiable single-block-length compression functions.
Resumo:
Due to its ability to represent intricate systems with material nonlinearities as well as irregular loading, boundary, geometrical and material domains, the finite element (FE) method has been recognized as an important computational tool in spinal biomechanics. Current FE models generally account for a single distinct spinal geometry with one set of material properties despite inherently large inter-subject variability. The uncertainty and high variability in tissue material properties, geometry, loading and boundary conditions has cast doubt on the reliability of their predictions and comparability with reported in vitro and in vivo values. A multicenter study was undertaken to compare the results of eight well-established models of the lumbar spine that have been developed, validated and applied for many years. Models were subjected to pure and combined loading modes and their predictions were compared to in vitro and in vivo measurements for intervertebral rotations, disc pressures and facet joint forces. Under pure moment loading, the predicted L1-5 rotations of almost all models fell within the reported in vitro ranges; their median values differed on average by only 2° for flexion-extension, 1° for lateral bending and 5° for axial rotation. Predicted median facet joint forces and disc pressures were also in good agreement with previously published median in vitro values. However, the ranges of predictions were larger and exceeded the in vitro ranges, especially for facet joint forces. For all combined loading modes, except for flexion, predicted median segmental intervertebral rotations and disc pressures were in good agreement with in vivo values. The simulations yielded median facet joint forces of 0 N in flexion, 38 N in extension, 14 N in lateral bending and 60 N in axial rotation that could not be validated due to the paucity of in vivo facet joint forces. In light of high inter-subject variability, one must be cautious when generalizing predictions obtained from one deterministic model. This study demonstrates however that the predictive power increases when FE models are combined together. The median of individual numerical results can hence be used as an improved tool in order to estimate the response of the lumbar spine.
Resumo:
Red blood cells (RBCs) are the most common type of cells in human blood and they exhibit different types of motions and deformed shapes in capillary flows. The behaviour of the RBCs should be studied in order to explain the RBC motion and deformation mechanism. This article presents a numerical simulation method for RBC deformation in microvessels. A two dimensional spring network model is used to represent the RBC membrane, where the elastic stretch/compression energy and the bending energy are considered with the constraint of constant RBC surface area. The forces acting on the RBC membrane are obtained from the principle of virtual work. The whole fluid domain is discretized into a finite number of particles using smoothed particle hydrodynamics concepts and the motions of all the particles are solved using Navier--Stokes equations. Minimum energy concepts are used to simulate the deformed shape of the RBC model. To verify the model, the motion of a single RBC is simulated in a Poiseuille flow and the characteristic parachute shape of the RBC is observed. Further simulations reveal that the RBC shows a tank treading motion when it flows in a linear shear flow.
Resumo:
Compression is desirable for network applications as it saves bandwidth; however, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to successful CRIME and BREACH attacks on web traffic protected by the Transport Layer Security (TLS) protocol. The general guidance in light of these attacks has been to disable compression, preserving confidentiality but sacrificing bandwidth. In this paper, we examine two techniques - heuristic separation of secrets and fixed-dictionary compression|for enabling compression while protecting high-value secrets, such as cookies, from attack. We model the security offered by these techniques and report on the amount of compressibility that they can achieve.
Resumo:
Profiled steel roof claddings in Australia and its neighbouring countries are commonly made of very thin high tensile steel and are crest-fixed intermittently with screw fasteners. The failure of the roof cladding systems was due to a local failure (dimpling of crests I pull-through) at the fasteners under wind uplift Cyclic wind uplift during cyclones causes fatigue cracking to occur at the fastener holes which leads to pull-through failures at lower load levels. At present the design of these claddings is entirely based on testing. In order to improve the understanding of the behaviour and the design and test methods of these claddings under wind uplift loading during storms and cyclones, a detailed investigation consisting of finite element analyses, static and fatigue experiments and cyclonic wind modelling was carried out on two-span roofing assemblies of three common roofing profiles. This paper presents the details of this investigation and its important results.
Resumo:
The security of permutation-based hash functions in the ideal permutation model has been studied when the input-length of compression function is larger than the input-length of the permutation function. In this paper, we consider permutation based compression functions that have input lengths shorter than that of the permutation. Under this assumption, we propose a permutation based compression function and prove its security with respect to collision and (second) preimage attacks in the ideal permutation model. The proposed compression function can be seen as a generalization of the compression function of MD6 hash function.
Resumo:
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of the hash function SHAvite-3-512, and on the full 14 round compression function of SHAvite-3-512. We show a second preimage attack on the hash function reduced to 10 rounds with a complexity of 2497 compression function evaluations and 216 memory. For the full 14-round compression function, we give a chosen counter, chosen salt preimage attack with 2384 compression function evaluations and 2128 memory (or complexity 2448 without memory), and a collision attack with 2192 compression function evaluations and 2128 memory.
Resumo:
Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.