895 resultados para System verification and analysis
Resumo:
In this article, we analyze the stability and the associated bifurcations of several types of pulse solutions in a singularly perturbed three-component reaction-diffusion equation that has its origin as a model for gas discharge dynamics. Due to the richness and complexity of the dynamics generated by this model, it has in recent years become a paradigm model for the study of pulse interactions. A mathematical analysis of pulse interactions is based on detailed information on the existence and stability of isolated pulse solutions. The existence of these isolated pulse solutions is established in previous work. Here, the pulse solutions are studied by an Evans function associated to the linearized stability problem. Evans functions for stability problems in singularly perturbed reaction-diffusion models can be decomposed into a fast and a slow component, and their zeroes can be determined explicitly by the NLEP method. In the context of the present model, we have extended the NLEP method so that it can be applied to multi-pulse and multi-front solutions of singularly perturbed reaction-diffusion equations with more than one slow component. The brunt of this article is devoted to the analysis of the stability characteristics and the bifurcations of the pulse solutions. Our methods enable us to obtain explicit, analytical information on the various types of bifurcations, such as saddle-node bifurcations, Hopf bifurcations in which breathing pulse solutions are created, and bifurcations into travelling pulse solutions, which can be both subcritical and supercritical.
Resumo:
Knowledge of cable parameters has been well established but a better knowledge of the environment in which the cables are buried lags behind. Research in Queensland University of Technology has been aimed at obtaining and analysing actual daily field values of thermal resistivity and diffusivity of the soil around power cables. On-line monitoring systems have been developed and installed with a data logger system and buried spheres that use an improved technique to measure thermal resistivity and diffusivity over a short period. Results based on long term continuous field data are given. A probabilistic approach is developed to establish the correlation between the measured field thermal resistivity values and rainfall data from weather bureau records. This data from field studies can reduce the risk in cable rating decisions and provide a basis for reliable prediction of “hot spot” of an existing cable circuit
Resumo:
Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.
Resumo:
High power piezoelectric ultrasonic transducers have been widely exploited in a variety of applications. The critical behaviour of a piezoelectric device is encapsulated in its resonant frequencies because of its maximum transmission performance at these frequencies. Therefore power electronic converters should be tuned at those resonant frequencies to transfer electrical power to mechanical power efficiently. However, structural and environmental changes cause variations in the device resonant frequencies which can degrade the system performance. Hence, estimating the device resonant frequencies within the incorporated setup can significantly improve the system performance. This paper proposes an efficient resonant frequency estimation approach to maintain the performance of high power ultrasonic applications using the employed power converter. Experimental validations indicate the effectiveness of the proposed method.
Resumo:
Cell line array (CMA) and tissue microarray (TMA) technologies are high-throughput methods for analysing both the abundance and distribution of gene expression in a panel of cell lines or multiple tissue specimens in an efficient and cost-effective manner. The process is based on Kononen's method of extracting a cylindrical core of paraffin-embedded donor tissue and inserting it into a recipient paraffin block. Donor tissue from surgically resected paraffin-embedded tissue blocks, frozen needle biopsies or cell line pellets can all be arrayed in the recipient block. The representative area of interest is identified and circled on a haematoxylin and eosin (H&E)-stained section of the donor block. Using a predesigned map showing a precise spacing pattern, a high density array of up to 1,000 cores of cell pellets and/or donor tissue can be embedded into the recipient block using a tissue arrayer from Beecher Instruments. Depending on the depth of the cell line/tissue removed from the donor block 100-300 consecutive sections can be cut from each CMA/TMA block. Sections can be stained for in situ detection of protein, DNA or RNA targets using immunohistochemistry (IHC), fluorescent in situ hybridisation (FISH) or mRNA in situ hybridisation (RNA-ISH), respectively. This chapter provides detailed methods for CMA/TMA design, construction and analysis with in-depth notes on all technical aspects including tips to deal with common pitfalls the user may encounter. © Springer Science+Business Media, LLC 2011.
Resumo:
This paper introduces a novel cage induction generator and presents a mathematical model, through which its behavior can be accurately predicted. The proposed generator system employs a three-phase cage induction machine and generates single-phase and constant-frequency electricity at varying rotor speeds without an intermediate inverter stage. The technique uses any one of the three stator phases of the machine as the excitation winding and the remaining two phases, which are connected in series, as the power winding. The two-series-connected-and-one-isolated (TSCAOI) phase winding configuration magnetically decouples the two sets of windings, enabling independent control. Electricity is generated through the power winding at both sub- and super-synchronous speeds with appropriate excitation to the isolated single winding at any frequency of generation. A dynamic mathematical model, which accurately predicts the behavior of the proposed generator, is also presented and implemented in MATLAB/Simulink. Experimental results of a 2-kW prototype generator under various operating conditions are presented, together with theoretical results, to demonstrate the viability of the TSCAOI power generation. The proposed generator is simple and capable of both storage and retrieval of energy through its excitation winding and is expected to be suitable for applications, such as small wind turbines and microhydro systems.
Resumo:
This thesis utilised mixed-methods study design to understand the factors that influence the translation and implementation of central human resources in health policy at the district and commune health levels. It provided recommendations for changes to enhance governance approaches to human resources for health policy implementation at local and national levels. This thesis has also contributed to the evolution of the theory on health staff motivation and performance through the description and testing of a new model, using data from a survey on 262 health staff and 43 in-depth interviews conducted in two northern mountainous provinces of Vietnam.
Resumo:
Supervisory Control and Data Acquisition (SCADA) systems are one of the key foundations of smart grids. The Distributed Network Protocol version 3 (DNP3) is a standard SCADA protocol designed to facilitate communications in substations and smart grid nodes. The protocol is embedded with a security mechanism called Secure Authentication (DNP3-SA). This mechanism ensures that end-to-end communication security is provided in substations. This paper presents a formal model for the behavioural analysis of DNP3-SA using Coloured Petri Nets (CPN). Our DNP3-SA CPN model is capable of testing and verifying various attack scenarios: modification, replay and spoofing, combined complex attack and mitigation strategies. Using the model has revealed a previously unidentified flaw in the DNP3-SA protocol that can be exploited by an attacker that has access to the network interconnecting DNP3 devices. An attacker can launch a successful attack on an outstation without possessing the pre-shared keys by replaying a previously authenticated command with arbitrary parameters. We propose an update to the DNP3-SA protocol that removes the flaw and prevents such attacks. The update is validated and verified using our CPN model proving the effectiveness of the model and importance of the formal protocol analysis.
Resumo:
In an earlier paper [1], it has been shown that velocity ratio, defined with reference to the analogous circuit, is a basic parameter in the complete analysis of a linear one-dimensional dynamical system. In this paper it is shown that the terms constituting velocity ratio can be readily determined by means of an algebraic algorithm developed from a heuristic study of the process of transfer matrix multiplication. The algorithm permits the set of most significant terms at a particular frequency of interest to be identified from a knowledge of the relative magnitudes of the impedances of the constituent elements of a proposed configuration. This feature makes the algorithm a potential tool in a first approach to a rational design of a complex dynamical filter. This algorithm is particularly suited for the desk analysis of a medium size system with lumped as well as distributed elements.
Resumo:
Detection and prevention of global network satellite system (GNSS) “spoofing” attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research interest. This survey aims to fill three gaps in the literature: first, to assess in detail the exact nature of threat scenarios posed by spoofing against the most commonly cited targets; second, to investigate the many practical impediments, often underplayed, to carrying out GNSS spoofing attacks in the field; and third, to survey and assess the effectiveness of a wide range of proposed defences against GNSS spoofing. Our conclusion lists promising areas of future research.
Resumo:
This paper describes the 3D Water Chemistry Atlas - an open source, Web-based system that enables the three-dimensional (3D) sub-surface visualization of ground water monitoring data, overlaid on the local geological model. Following a review of existing technologies, the system adopts Cesium (an open source Web-based 3D mapping and visualization interface) together with a PostGreSQL/PostGIS database, for the technical architecture. In addition a range of the search, filtering, browse and analysis tools were developed that enable users to interactively explore the groundwater monitoring data and interpret it spatially and temporally relative to the local geological formations and aquifers via the Cesium interface. The result is an integrated 3D visualization system that enables environmental managers and regulators to assess groundwater conditions, identify inconsistencies in the data, manage impacts and risks and make more informed decisions about activities such as coal seam gas extraction, waste water extraction and re-use.
Resumo:
The occurrence of gestational diabetes (GDM) during pregnancy is a powerful sign of a risk of later type 2 diabetes (T2D) and cardiovascular diseases (CVDs). The physiological basis for this disease progression is not yet fully understood, but increasing evidence exists on interplay of insulin resistance, subclinical inflammation, and more recently, on unbalance of the autonomic nervous system. Since the delay in development of T2D and CVD after GDM ranges from years to decades, better understanding of the pathophysiology of GDM could give us new tools for primary prevention. The present study was aimed at investigating the role of the sympathetic nervous system (SNS) in GDM and its associations with insulin and a variety of inflammatory cytokines and coagulation and fibrinolysis markers. This thesis covers two separate study lines. Firstly, we investigated 41 women with GDM and 22 healthy pregnant and 14 non-pregnant controls during the night in hospital. Blood samples were drawn at 24:00, 4:00 and 7:00 h to determine the concentrations of plasma glucose, insulin, noradrenaline (NA) and adrenomedullin, markers of subclinical inflammation, coagulation and fibrinolysis variables and platelet function. Overnight holter ECG recording was performed for analysis of heart rate variability (HRV). Secondly, we studied 87 overweight hypertensive women with natural menopause. They were randomised to use a central sympatholytic agent, moxonidine (0.3mg twice daily), the β-blocking agent atenolol (50 mg once daily+blacebo once daily) for 8 weeks. Inflammatory markers and adiponectin were analysed at the beginning and after 8 weeks. Activation of the SNS (increase in NA, decreased HRV) was seen in pregnant vs. non-pregnant women, but no difference existed between GDM and normal pregnancy. However, modulation (internal rhythm) of HRV was attenuated in GDM. Insulin and inflammatory cytokine levels were comparable in all pregnant women but nocturnal variation of concentrations of C-reactive protein, serum amyloid A and insulin were reduced in GDM. Levels of coagulation factor VIII were lower in GDM compared with normal pregnancy, whereas no other differences were seen in coagulation and fibrinolysis markers. No significant associations were seen between NA and the studied parameters. In the study of postmenopausal women, moxonidine treatment was associated with favourable changes in the inflammatory profile, seen as a decrease in TNFα concentrations (increase in atenolol group) and preservation of adiponectin levels (decrease in atenolol group). In conclusion, our results did not support our hypotheses of increased SNS activity in GDM or a marked association between NA and inflammatory and coagulation markers. Reduced biological variation of HRV, insulin and inflammatory cytokines suggests disturbance of autonomic and hormonal regulatory mechanisms in GDM. This is a novel finding. Further understanding of the regulatory mechanisms could allow earlier detection of risk women and the possibility of prevention. In addition, our results support consideration of the SNS as one of the therapeutic targets in the battle against metabolic diseases, including T2D and CVD.
Resumo:
The aim of the doctoral dissertation was to further our theoretical and empirical understanding of media education as practised in the context of Finnish basic education. The current era of intensive use of the Internet is recognised too. The doctoral dissertation presents the subject didactic dimension of media education as one of the main results of the conceptual analysis. The theoretical foundation is based on the idea of dividing the concept of media education into media and education (Vesterinen et al., 2006). As two ends of the dimension, these two can be understood didactically as content and pedagogy respectively. In the middle, subject didactics is considered to have one form closer to content matter (Subject Didactics I learning about media) and another closer to general pedagogical questions (Subject Didactics II learning with/through media). The empirical case studies of the dissertation are reported with foci on media literacy in the era of Web 2.0 (Kynäslahti et al., 2008), teacher reasoning in media educational situations (Vesterinen, Kynäslahti - Tella, 2010) and the research methodological implications of the use of information and communication technologies in the school (Vesterinen, Toom - Patrikainen, 2010). As a conclusion, Media-Based Media Education and Cross-Curricular Media Education are presented as two subject didactic modes of media education in the school context. Episodic Media Education is discussed as the third mode of media education where less organised teaching, studying and learning related to media takes place, and situations (i.e. episodes, if you like) without proper planning or thorough reflection are in focus. Based on the theoretical and empirical understanding gained in this dissertation, it is proposed that instead of occupying a corner of its own in the school curriculum, media education should lead the wider change in Finnish schools.
Resumo:
Foreign compounds, such as drugs are metabolised in the body in numerous reactions. Metabolic reactions are divided into phase I (functionalisation) and phase II (conjugation) reactions. Uridine diphosphoglucuronosyltransferase enzymes (UGTs) are important catalysts of phase II metabolic system. They catalyse the transfer of glucuronic acid to small lipophilic molecules and convert them to hydrophilic and polar glucuronides that are readily excreted from the body. Liver is the main site of drug metabolism. Many drugs are racemic mixtures of two enantiomers. Glucuronidation of a racemic compound yields a pair of diastereomeric glucuronides. Stereoisomers are interesting substrates in glucuronidation studies since some UGTs display stereoselectivity. Diastereomeric glucuronides of O-desmethyltramadol (M1) and entacapone were selected as model compounds in this work. The investigations of the thesis deal with enzymatic glucuronidation and the development of analytical methods for drug metabolites, particularly diastereomeric glucuronides. The glucuronides were analysed from complex biological matrices, such as urine or from in vitro incubation matrices. Various pretreatment techniques were needed to purify, concentrate and isolate the analytes of interest. Analyses were carried out by liquid chromatography (LC) with ultraviolet (UV) or mass spectrometric (MS) detection or with capillary electromigration techniques. Commercial glucuronide standards were not available for the studies. Enzyme-assisted synthesis with rat liver microsomes was therefore used to produce M1 glucuronides as reference compounds. The glucuronides were isolated by LC/UV and ultra performance liquid chromatography (UPLC)/MS, while tandem mass spectrometry (MS/MS) and nuclear magnetic resonance (NMR) spectroscopy were employed in structural characterisation. The glucuronides were identified as phenolic O-glucuronides of M1. To identify the active UGT enzymes in (±)-M1 glucuronidation recombinant human UGTs and human tissue microsomes were incubated with (±)-M1. The study revealed that several UGTs can catalyse (±)-M1 glucuronidation. Glucuronidation in human liver microsomes like in rat liver microsomes is stereoselective. The results of the studies showed that UGT2B7, most probably, is the main UGT responsible for (±)-M1 glucuronidation in human liver. Large variation in stereoselectivity of UGTs toward (±)-M1 enantiomers was observed. Formation of M1 glucuronides was monitored with a fast and selective UPLC/MS method. Capillary electromigration techniques are known for their high resolution power. A method that relied on capillary electrophoresis (CE) with UV detection was developed for the separation of tramadol and its free and glucuronidated metabolites. The suitability of the method to identify tramadol metabolites in an authentic urine samples was tested. Unaltered tramadol and four of its main metabolites were detected in the electropherogram. A micellar electrokinetic chromatography (MEKC) /UV method was developed for the separation of the glucuronides of entacapone in human urine. The validated method was tested in the analysis of urine samples of patients. The glucuronides of entacapone could be quantified after oral entacapone dosing.