963 resultados para Key recovery attack
Resumo:
Background: Extra corporeal membrane oxygenation (ECMO) is a complex rescue therapy used to provide cardiac and/or respiratory support for critically ill patients who have failed maximal conventional medical management. ECMO is based on a modified cardiopulmonary bypass (CPB) circuit, and can provide cardiopulmonary support for up-to several months. It can be used in a veno venous configuration for isolated respiratory failure, (VV-ECMO), or in a veno arterial configuration (VA-ECMO) where support is necessary for cardiac +/- respiratory failure. The ECMO circuit consists of five main components: large bore cannulae (access cannulae) for drainage of the venous system, and return cannulae to either the venous (in VV-ECMO) or arterial (in VA ECMO) system. An oxygenator, with a vast surface area of hollow filaments, allows addition of oxygen and removal of carbon dioxide; a centrifugal blood pump allows propulsion of blood through the circuit at upto 10 L/minute; a control module and a thermoregulatory unit, which allows for exact temperature control of the extra corporeal blood. Methods: The first successful use of ECMO for ARDS in adults occurred in 1972, and its use has become more commonplace over the last 30 years, supported by the improvement in design and biocompatibility of the equipment, which has reduced the morbidity associated with this modality. Whilst the use of ECMO in neonatal population has been supported by numerous studies, the evidence upon which ECMO was integrated into adult practice was substantially less robust. Results: Recent data, including the CESAR study (Conventional Ventilatory Support versus Extra corporeal membrane oxygenation for Severe Respiratory failure) has added a degree of evidence to the role of ECMO in such a patient population. The CESAR study analysed 180 patients, and confirmed that ECMO was associated with an improved rate of survival. More recently, ECMO has been utilized in numerous situations within the critical care area, including support in high-risk percutaneous interventions in cardiac catheter lab; the operating room, emergency department, as well in specialized inter-hospital retrieval services. The increased understanding of the risk:benefit profile of ECMO, along with a reduction in morbidity associated with its use will doubtless lead to a substantial rise in the utilisation of this modality. As with all extra-corporeal circuits, ECMO opposes the basic premises of the mammalian inflammation and coagulation cascade where blood comes into foreign circulation, both these cascades are activated. Anti-coagulation is readily dealt with through use of agents such as heparin, but the inflammatory excess, whilst less macroscopically obvious, continues un-abated. Platelet consumption and neutrophil activation occur rapidly, and the clinician is faced with balancing the need of anticoagulation for the circuit, against haemostasis in an acutely bleeding patient. Alterations in pharmacokinetics may result in inadequate levels of disease modifying therapeutics, such as antibiotics, hence paradoxically delaying recovery from conditions such as pneumonia. Key elements of nutrition and the innate immune system maysimilarly be affected. Summary: This presentation will discuss the basic features of ECMO to the nonspecialist, and review the clinical conundrum faced by the team treating these most complex cases.
Resumo:
The IEEE Wireless LAN standard has been a true success story by enabling convenient, efficient and low-cost access to broadband networks for both private and professional use. However, the increasing density and uncoordinated operation of wireless access points, combined with constantly growing traffic demands have started hurting the users' quality of experience. On the other hand, the emerging ubiquity of wireless access has placed it at the center of attention for network attacks, which not only raises users' concerns on security but also indirectly affects connection quality due to proactive measures against security attacks. In this work, we introduce an integrated solution to congestion avoidance and attack mitigation problems through cooperation among wireless access points. The proposed solution implements a Partially Observable Markov Decision Process (POMDP) as an intelligent distributed control system. By successfully differentiating resource hampering attacks from overload cases, the control system takes an appropriate action in each detected anomaly case without disturbing the quality of service for end users. The proposed solution is fully implemented on a small-scale testbed, on which we present our observations and demonstrate the effectiveness of the system to detect and alleviate both attack and congestion situations.
Resumo:
Purpose: Within the context of high global competitiveness, knowledge management (KM) has proven to be one of the major factors contributing to enhanced business outcomes. Furthermore, knowledge sharing (KS) is one of the most critical of all KM activities. From a manufacturing industry perspective, supply chain management (SCM) and product development process (PDP) activities, require a high proportion of company resources such as budget and manpower. Therefore, manufacturing companies are striving to strengthen SCM, PDP and KS activities in order to accelerate rates of manufacturing process improvement, ultimately resulting in higher levels of business performance (BP). A theoretical framework along with a number of hypotheses are proposed and empirically tested through correlation, factor and path analyses. Design/methodology/approach: A questionnaire survey was administered to a sample of electronic manufacturing companies operating in Taiwan to facilitate testing the proposed relationships. More than 170 respondents from 83 organisations responded to the survey. The study identified top management commitment and employee empowerment, supplier evaluation and selection, and design simplification and modular design as the key business activities that are strongly associated with the business performance. Findings: The empirical study supports that key manufacturing business activities (i.e., SCM, PDP, and KS) are positively associated with BP. The findings also evealed that some specific business activities such as SCMF1,PDPF2, and KSF1 have the strongest influencing power on particular business outcomes (i.e., BPF1 and BPF2) within the context of electronic manufacturing companies operating in Taiwan. Practical implications: The finding regarding the relationship between SCM and BP identified the essential role of supplier evaluation and selection in improving business competitiveness and long term performance. The process of forming knowledge in companies, such as creation, storage/retrieval, and transfer do not necessarily lead to enhanced business performance; only through effectively applying knowledge to the right person at the right time does. Originality/value: Based on this finding it is recommended that companies should involve suppliers in partnerships to continuously improve operations and enhance product design efforts, which would ultimately enhance business performance. Business performance depends more on an employee’s ability to turn knowledge into effective action.
Resumo:
In wastewater treatment plants based on anaerobic digestion, supernatant and outflows from sludge dewatering systems contain significantly high amount of ammonium. Generally, these waters are returned to the head of wastewater treatment plant (WWTP), thereby increasing the total nitrogen load of the influent flow. Ammonium from these waters can be recovered and commercially utilised using novel ion-exchange materials. Mackinnon et al. have described an approach for removal and recovery of ammonium from side stream centrate returns obtained from anaerobic digester of a typical WWTP. Most of the ammonium from side streams can potentially be removed, which significantly reduces overall inlet demand at a WWTP. However, the extent of reduction achieved depends on the level of ammonium and flow-rate in the side stream. The exchange efficiency of the ion-exchange material, MesoLite, used in the ammonium recovery process deteriorates with long-term use due to mechanical degradation and use of regenerant. To ensure that a sustainable process is utilised a range of potential applications for this “spent” MesoLite have been evaluated. The primary focus of evaluations has been use of ammonium-loaded MesoLite as a source of nitrogen and growth medium for plants. A MesoLite fertiliser has advantage over soluble fertilisers in that N is held on an insoluble matrix and is gradually released according to exchange equilibria. Many conventional N fertilisers are water-soluble and thus, instantly release all applied N into the soil solution. Loss of nutrient commonly occurs through volatilisation and/or leaching. On average, up to half of the N delivered by a typical soluble fertiliser can be lost through these processes. In this context, use of ammonium-loaded MesoLite as a fertiliser has been evaluated using standard greenhouse and field-based experiments for low fertility soils. Rye grass, a suitable test species for greenhouse trials, was grown in 1kg pots over a period of several weeks with regular irrigation. Nitrogen was applied at a range of rates using a chemical fertiliser as a control and using two MesoLite fertilisers. All other nutrients were applied in adequate amounts. All treatments were replicated three times. Plants were harvested after four weeks, and dry plant mass and N concentrations were determined. At all nitrogen application rates, ammonium-loaded MesoLite produced higher plant mass than plants fertilised by the chemical fertiliser. The lower fertiliser effectiveness of the chemical fertliser is attributed to possible loss of some N through volatilisation. The MesoLite fertilisers did not show any adverse effect on availability of macro and trace nutrients, as shown by lack of deficiency symptoms, dry matter yield and plant analyses. Nitrogen loaded on to MesoLite in the form of exchanged ammonium is readily available to plants while remaining protected from losses via leaching and volatilisation. Spent MesoLite appears to be a suitable and effective fertiliser for a wide range of soils, particularly sandy soils with poor nutrient holding capacity.
Resumo:
between mid 2010 and early 2011, Queensland road related infrastructures were devastated by flood and cyclone related natural disasters. Responding to these recent events and in preparing for more regular and intense climate-change induced events in future, the Queensland Government is now reviewing how post-disaster road infrastructure recovery projects are planned and delivered. In particular, there is awareness that rebuilding such infrastructure need sustainable strategies across economic, environmental and social dimensions. A comprehensive sustainability assessment framework for pre and post disaster situations can minimize negative impact on our communities, economy and environment. This research is underway to develop a comprehensive sustainability element frame work for post disaster management in road infrastructures in Queensland, Australia. Analyzing the implications of disruption to transport network and associated services is an important part of preparing local and regional responses to the impacts of natural disasters. This research can contribute to strategic planning, management leading to safe, efficient and integrated transport system that supports sustainable economic, social and environmental outcomes in Queensland. Within this context, this paper provides an overview of the qualitative mixed-method research approach involving literature reviews and case studies to explore and evaluate a number of sustainability elements with a view to develop operational strategies for disaster recovery road projects.
Resumo:
Advances in technology introduce new application areas for sensor networks. Foreseeable wide deployment of mission critical sensor networks creates concerns on security issues. Security of large scale densely deployed and infrastructure less wireless networks of resource limited sensor nodes requires efficient key distribution and management mechanisms. We consider distributed and hierarchical wireless sensor networks where unicast, multicast and broadcast type of communications can take place. We evaluate deterministic, probabilistic and hybrid type of key pre-distribution and dynamic key generation algorithms for distributing pair-wise, group-wise and network-wise keys.
Resumo:
This paper presents a formal methodology for attack modeling and detection for networks. Our approach has three phases. First, we extend the basic attack tree approach 1 to capture (i) the temporal dependencies between components, and (ii) the expiration of an attack. Second, using the enhanced attack trees (EAT) we build a tree automaton that accepts a sequence of actions from input stream if there is a traverse of an attack tree from leaves to the root node. Finally, we show how to construct an enhanced parallel automaton (EPA) that has each tree automaton as a subroutine and can process the input stream by considering multiple trees simultaneously. As a case study, we show how to represent the attacks in IEEE 802.11 and construct an EPA for it.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighbouring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighbouring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools. Comparison to probabilistic schemes shows that our combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.
Resumo:
Environmental Burkholderia pseudomallei isolated from sandy soil at Castle Hill, Townsville, in the dry tropic region of Queensland, Australia, was inoculated into sterile-soil laboratory microcosms subjected to variable soil moisture. Survival and sublethal injury of the B. pseudomallei strain were monitored by recovery using culture-based methods. Soil extraction buffer yielded higher recoveries as an extraction agent than sterile distilled water. B. pseudomallei was not recoverable when inoculated into desiccated soil but remained recoverable from moist soil subjected to 91 days desiccation and showed a growth response to increased soil moisture over at least 113 days. Results indicate that endemic dry tropic soil may act as a reservoir during the dry season, with an increase in cell number and potential for mobilization from soil into water in the wet season.
Resumo:
Video-based training combined with flotation tank recovery may provide an additional stimulus for improving shooting in basketball. A pre-post controlled trial was conducted to assess the effectiveness of a 3 wk intervention combining video-based training and flotation tank recovery on three-point shooting performance in elite female basketball players. Players were assigned to an experimental (n=10) and control group (n=9). A 3 wk intervention consisted of 2 x 30 min float sessions a week which included 10 min of video-based training footage, followed by a 3 wk retention phase. A total of 100 three-point shots were taken from 5 designated positions on the court at each week to assess three-point shooting performance. There was no clear difference in the mean change in the number of successful three-point shots between the groups (-3%; ±18%, mean; ±90% confidence limits). Video-based training combined with flotation recovery had little effect on three-point shooting performance.
Resumo:
Australian and international evidence suggests that, in the work-related driving context, road crashes account for a substantial number of occupational incidents. In the attempt to reduce injury and improve safety, organisations may implement an array of strategies and interventions ranging from policy development and implementation, vehicle selection and incident monitoring through to education and awareness-raising. This conceptual paper discusses aspects relating to the latter collection of interventions and, in particular, the role, and some key considerations with respect to the content and dissemination, of advertising campaigns and educational awareness workshops. In relation to advertising campaigns, this paper discusses how some of the overarching principles associated with advertising in the broader general community road safety strategy also apply within the work-related road safety context. Specifically, advertising campaigns/materials should be viewed as a key component within a dedicated organisational approach to road (driver) safety. This dedicated approach would need to comprise of a number, and varied array, of strategies. In addition, the content of, and medium/s (e.g., posters) by which to deliver such advertising campaigns, cannot be addressed by a one-size-fits all approach but, rather, requires careful consideration of the needs as well as characteristics of specific organisations and their driver fleet. The paper provides a summary of some key considerations when devising an advertising campaign, including the nature of campaign/message content as well as the processes by which to devise and refine such content. In relation to driver education awareness workshops, this paper outlines the key considerations for delivering a series of workshops specifically aimed at occupational driving within the organisational context. A case study approach will be utilised to demonstrate the manner in which educational awareness workshops can compliment successful advertising campaigns promoting safer work related driving through better risk management practice. Research underpinning the development of driver behaviour modification tools incorporated within the workshops will also be discussed along with the mechanisms utilised to encourage improvements in driver monitoring and behaviour. In an effort to assist organisations with their continual search for cost-effective approaches which may, ultimately, contribute to improvements in driver behaviour and safety, the current paper offers some clear and practical suggestions in relation to the development and dissemination of two types of interventions, advertising campaigns and education awareness workshops.
Resumo:
Due to the propensity of fleet incidents, poor organisational survey results and a lack of fleet safety systems, it was evident that Redland City Council were underperforming, experiencing a variety of work related road safety issues and possessed a low fleet safety culture. As a result of an audit process, and the identification of gaps in organisational process within the fleet safety area Redland City Council embarked upon the enormous task of strategically implementing initiatives and improving fleet safety across the organisation. The strategies utilised within the Redland City Council Fleet Safety Initiative were implemented utilising a systematic process and adopted a multi-disciplinary approach to improve overall fleet safety. Organisational initiatives targeting fleet safety aspects have benefited the Council by the development of an improved organisational culture, including safer driver attitudes and behaviour. This paper outlines the road to recovery for Redland City Council in relation to its fleet safety initiatives.
Resumo:
Mesenchymal stem cells (MSCs) are multi-potent cells that can differentiate into various cell types and have been used widely in tissue engineering application. In tissue engineering, a scaffold, MSCs and growth factors are used as essential components and their interactions have been regarded to be important for regeneration of tissues. A critical problem for MSCs in tissue engineering is their low survival ability and functionality. Most MSCs are going to be apoptotic after transplantation. Therefore, increasing MSC survival ability and functionalities is the key for potential applications of MSCs. Several approaches have been studied to increase MSC tissue forming capacity including application of growth factors, overexpression of stem cell regulatory genes and improvement of biomaterials for scaffolds. The effects of these approaches on MSCs have been associated with the activation of the PI3K/Akt signaling pathway. The pathway plays central regulatory roles in MSC survival, proliferation, migration, angiogenesis, cytokine production and differentiation. In this review, we summarize and discuss the literatures related to the roles of the PI3K/Akt pathway in the functionalities of MSCs and the involvement of the pathway in biomaterials-increased MSC functinalities. Biomaterials have been modified in their properties, surface structure and loaded with growth factors to increase MSC functionalities. Several studies demonstrated that the biomaterials-increased MSC functionalities are mediated by the activation of the PI3K/Akt pathway.
Resumo:
Objective To evaluate the time course of the recovery of transverse strain in the Achilles and patellar tendon following a bout of resistance exercise. Methods Seventeen healthy adults underwent sonographic examination of the right patellar (n=9) and Achilles (n=8) tendons immediately prior to and following 90 repetitions of weight-bearing quadriceps and gastrocnemius-resistance exercise performed against an effective resistance of 175% and 250% body weight, respectively. Sagittal tendon thickness was determined 20 mm from the enthesis and transverse strain, as defined by the stretch ratio, was repeatedly monitored over a 24 h recovery period. Results Resistance exercise resulted in an immediate decrease in Achilles (t7=10.6, p<0.01) and patellar (t8=8.9, p<0.01) tendon thickness, resulting in an average transverse stretch ratio of 0.86±0.04 and 0.82±0.05, which was not significantly different between tendons. The magnitude of the immediate transverse strain response, however, was reduced with advancing age (r=0.63, p<0.01). Recovery in transverse strain was prolonged compared with the duration of loading and exponential in nature. The average primary recovery time was not significantly different between the Achilles (6.5±3.2 h) and patellar (7.1±3.2 h) tendons. Body weight accounted for 62% and 64% of the variation in recovery time, respectively. Conclusions Despite structural and biochemical differences between the Achilles and patellar tendon, the mechanisms underlying transverse creep recovery in vivo appear similar and are highly time dependent. These novel findings have important implications concerning the time required for the mechanical recovery of high-stress tendons following an acute bout of exercise.