995 resultados para Fieldbus networks
Resumo:
Tailoring the density of random single-walled carbon nanotube (SWCNT) networks is of paramount importance for various applications, yet it remains a major challenge due to the insufficient catalyst activation in most growth processes. Here we report on a simple and effective method to maximise the number of active catalyst nanoparticles using catalytic chemical vapor deposition (CCVD). By modulating short pulses of acetylene into a methane-based CCVD growth process, the density of SWCNTs is dramatically increased by up to three orders of magnitude without increasing the catalyst density and degrading the nanotube quality. In the framework of a vapor-liquid-solid model, we attribute the enhanced growth to the high dissociation rate of acetylene at high temperatures at the nucleation stage, which can be effective in both supersaturating the larger catalyst nanoparticles and overcoming the nanotube nucleation energy barrier of the smaller catalyst nanoparticles. These results are highly relevant to numerous applications of random SWCNT networks in next-generation energy, sensing and biomedical devices. © 2011 The Royal Society of Chemistry.
Resumo:
Controlled synthesis of both single-walled carbon nanotube and carbon nanowire networks using the same CVD reactor and Fe/Al2O3 catalyst by slightly altering the hydrogenation and temperature conditions is demonstrated. Structural, bonding and electrical characterization using SEM, TEM, Raman spectroscopy, and temperature-dependent resistivity measurements suggest that the nanotubes are of a high quality and a large fraction (well above the common 33% and possibly up to 75%) of them are metallic. On the other hand, the carbon nanowires are amorphous and semiconducting and feature a controlled sp2/sp3 ratio. The growth mechanism which is based on the catalyst nanoisland analysis by AFM and takes into account the hydrogenation and temperature control effects explains the observed switch-over of the nanostructure growth modes. These results are important to achieve the ultimate control of chirality, structure, and conductivity of one-dimensional all-carbon networks.
Resumo:
The electronic transport in both intrinsic and acid-treated single-walled carbon nanotube networks containing more than 90% semiconducting nanotubes is investigated using temperature-dependent resistance measurements. The semiconducting behavior observed in the intrinsic network is attributed to the three-dimensional electron hopping mechanism. In contrast, the chemical doping mechanism in the acid-treated network is found to be responsible for the revealed metal-like linear resistivity dependence in a broad temperature range. This effective method to control the electrical conductivity of single-walled carbon nanotube networks is promising for future nanoscale electronics, thermometry, and bolometry. © 2010 American Institute of Physics.
Resumo:
Using advanced visualization techniques, a comprehensive visualization of all the stages of the self-organized growth of internetworked nanostructures on plasma-exposed surface has been made. Atomistic kinetic Monte Carlo simulation for the initial stage of deposition, with 3-D visualization of the whole system and half-tone visualization of the density field of the adsorbed atoms, makes it possible to implement a multiscale predictive modeling of the development of the nanoscale system.
Resumo:
The fields of molecular biology and cell biology are being flooded with complex genomic and proteomic datasets of large dimensions. We now recognize that each molecule in the cell and tissue can no longer be viewed as an isolated entity. Instead, each molecule must be considered as one member of an interacting network. Consequently, there is an urgent need for mathematical models to understand the behavior of cell signaling networks in health and in disease.
Resumo:
Molecular interactions that underlie pathophysiological states are being elucidated using techniques that profile proteomicend points in cellular systems. Within the field of cancer research, protein interaction networks play pivotal roles in the establishment and maintenance of the hallmarks of malignancy, including cell division, invasion, and migration. Multiple complementary tools enable a multifaceted view of how signal protein pathway alterations contribute to pathophysiological states.One pivotal technique is signal pathway profiling of patient tissue specimens. This microanalysis technology provides a proteomic snapshot at one point in time of cells directly procured from the native context of a tumor micro environment. To study the adaptive patterns of signal pathway events over time, before and after experimental therapy, it is necessary to obtain biopsies from patients before, during, and after therapy. A complementary approach is the profiling of cultured cell lines with and without treatment. Cultured cell models provide the opportunity to study short-term signal changes occurring over minutes to hours. Through this type of system, the effects of particular pharmacological agents may be used to test the effects of signal pathway inhibition or activation on multiple endpoints within a pathway. The complexity of the data generated has necessitated the development of mathematical models for optimal interpretation of interrelated signaling pathways. In combination,clinical proteomic biopsy profiling, tissue culture proteomic profiling, and mathematical modeling synergistically enable a deeper understanding of how protein associations lead to disease states and present new insights into the design of therapeutic regimens.
Resumo:
We propose a reliable and ubiquitous group key distribution scheme that is suitable for ad hoc networks. The scheme has self-initialisation and self-securing features. The former feature allows a cooperation of an arbitrary number of nodes to initialise the system, and it also allows node admission to be performed in a decentralised fashion. The latter feature allows a group member to determine the group key remotely while maintaining the system security. We also consider a decentralised solution of establishing secure point-to-point communication. The solution allows a new node to establish a secure channel with every existing node if it has pre-existing secure channels with a threshold number of the existing nodes.
Resumo:
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.
Resumo:
Generally wireless sensor networks rely of many-to-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding or change the data that carry through it. A sinkhole attack causes an important threat to sensor networks and it should be considered that the sensor nodes are mostly spread out in open areas and of weak computation and battery power. In order to detect the intruder in a sinkhole attack this paper suggests an algorithm which firstly finds a group of suspected nodes by analyzing the consistency of data. Then, the intruder is recognized efficiently in the group by checking the network flow information. The proposed algorithm's performance has been evaluated by using numerical analysis and simulations. Therefore, accuracy and efficiency of algorithm would be verified.
Resumo:
Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ communication in using WSNs can cause difficulty in use of security and protection in WSNs. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such networks require security plan due to various limitations of resources and the prominent characteristics of a wireless sensor network which is a considerable challenge. This article is an extensive review about problems of WSNs security, which examined recently by researchers and a better understanding of future directions for WSN security.
Resumo:
Large arrays and networks of carbon nanotubes, both single- and multi-walled, feature many superior properties which offer excellent opportunities for various modern applications ranging from nanoelectronics, supercapacitors, photovoltaic cells, energy storage and conversation devices, to gas- and biosensors, nanomechanical and biomedical devices etc. At present, arrays and networks of carbon nanotubes are mainly fabricated from the pre-fabricated separated nanotubes by solution-based techniques. However, the intrinsic structure of the nanotubes (mainly, the level of the structural defects) which are required for the best performance in the nanotube-based applications, are often damaged during the array/network fabrication by surfactants, chemicals, and sonication involved in the process. As a result, the performance of the functional devices may be significantly degraded. In contrast, directly synthesized nanotube arrays/networks can preclude the adverse effects of the solution-based process and largely preserve the excellent properties of the pristine nanotubes. Owing to its advantages of scale-up production and precise positioning of the grown nanotubes, catalytic and catalyst-free chemical vapor depositions (CVD), as well as plasma-enhanced chemical vapor deposition (PECVD) are the methods most promising for the direct synthesis of the nanotubes.
Resumo:
Service mismatches involve the adaptation of structural and behavioural interfaces of services, which in practice incurs long lead times through manual, coding e ort. We propose a framework, complementary to conventional service adaptation, to extract comprehensive and seman- tically normalised service interfaces, useful for interoperability in large business networks and the Internet of Services. The framework supports introspection and analysis of large and overloaded operational signa- tures to derive focal artefacts, namely the underlying business objects of services. A more simpli ed and comprehensive service interface layer is created based on these, and rendered into semantically normalised in- terfaces, given an ontology accrued through the framework from service analysis history. This opens up the prospect of supporting capability comparisons across services, and run-time request backtracking and ad- justment, as consumers discover new features of a service's operations through corresponding features of similar services. This paper provides a rst exposition of the service interface synthesis framework, describing patterns having novel requirements for unilateral service adaptation, and algorithms for interface introspection and business object alignment. A prototype implementation and analysis of web services drawn from com- mercial logistic systems are used to validate the algorithms and identify open challenges and future research directions.
Resumo:
Effective control of morphology and electrical connectivity of networks of single-walled carbon nanotubes (SWCNTs) by using rough, nanoporous silica supports of Fe catalyst nanoparticles in catalytic chemical vapor deposition is demonstrated experimentally. The very high quality of the nanotubes is evidenced by the G-to-D Raman peak ratios (>50) within the range of the highest known ratios. Transitions from separated nanotubes on smooth SiO2 surface to densely interconnected networks on the nanoporous SiO2 are accompanied by an almost two-order of magnitude increase of the nanotube density. These transitions herald the hardly detectable onset of the nanoscale connectivity and are confirmed by the microanalysis and electrical measurements. The achieved effective nanotube interconnection leads to the dramatic, almost three-orders of magnitude decrease of the SWCNT network resistivity compared to networks of similar density produced by wet chemistry-based assembly of preformed nanotubes. The growth model, supported by multiscale, multiphase modeling of SWCNT nucleation reveals multiple constructive roles of the porous catalyst support in facilitating the catalyst saturation and SWCNT nucleation, consistent with the observed higher density of longer nanotubes. The associated mechanisms are related to the unique surface conditions (roughness, wettability, and reduced catalyst coalescence) on the porous SiO2 and the increased carbon supply through the supporting porous structure. This approach is promising for the direct integration of SWCNT networks into Si-based nanodevice platforms and multiple applications ranging from nanoelectronics and energy conversion to bio- and environmental sensing.
Resumo:
This thesis focuses on providing reliable data transmissions in large-scale industrial wireless sensor networks through improving network layer protocols. It addresses three major problems: scalability, dynamic industrial environments and coexistence of multiple types of data traffic in a network. Theoretical developments are conducted, followed by simulation studies for verification of theoretic results. The approach proposed in this thesis has been shown to be effective for large-scale network implementation and to provide improved data transmission reliability for both periodic and sporadic traffic.
Resumo:
(Figure Presented) Unusual conductivity effects: Suitably functionalized dendrimers (see picture) are capable of forming truly covalent three-dimensional networks with remarkably high conductivity on electrochemical doping. Depending on the charging level of the electroactive components used as building blocks for the dendrimer core and the perimeter, two separated regimes of electrical conductivity can be observed.