989 resultados para 512
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Reversed bias Pt/nanostructured ZnO Schottky diode with enhanced electric field for hydrogen sensing
Resumo:
In this paper, the effect of electric field enhancement on Pt/nanostructured ZnO Schottky diode based hydrogen sensors under reverse bias condition has been investigated. Current-voltage characteristics of these diodes have been studied at temperatures from 25 to 620 °C and their free carrier density concentration was estimated by exposing the sensors to hydrogen gas. The experimental results show a significantly lower breakdown voltage in reversed bias current-voltage characteristics than the conventional Schottky diodes and also greater lateral voltage shift in reverse bias operation than the forward bias. This can be ascribed to the increased localized electric fields emanating from the sharp edges and corners of the nanostructured morphologies. At 620 °C, voltage shifts of 114 and 325 mV for 0.06% and 1% hydrogen have been recorded from dynamic response under the reverse bias condition. © 2010 Elsevier B.V. All rights reserved.
Resumo:
At NTCIR-9, we participated in the cross-lingual link discovery (Crosslink) task. In this paper we describe our approaches to discovering Chinese, Japanese, and Korean (CJK) cross-lingual links for English documents in Wikipedia. Our experimental results show that a link mining approach that mines the existing link structure for anchor probabilities and relies on the “translation” using cross-lingual document name triangulation performs very well. The evaluation shows encouraging results for our system.
Resumo:
The LiteSteel Beam (LSB) is a new cold-formed hollow flange channel section developed by OneSteel Australian Tube Mills using their patented dual electric resistance welding and automated continuous roll-forming process. It has a unique geometry consisting of torsionally rigid rectangular hollow flanges and a relatively slender web. In addition to this unique geometry, the LSB sections also have unique characteristics relating to their stress-strain curves, residual stresses, initial geometric imperfections and hollow flanges that are not encountered in conventional hot-rolled and cold-formed steel channel sections. An experimental study including 20 section moment capacity tests was therefore conducted to investigate the behaviour and strength of LSB flexural members. The presence of inelastic reserve bending capacity in these beams was investigated in detail although the current design rules generally limit the section moment capacities of cold-formed steel members to their first yield moments. The ultimate moment capacities from the tests were compared with the section moment capacities predicted by the current cold-formed and hot-rolled steel design standards. It was found that compact and non-compact LSB sections have greater moment capacities than their first yield moments. The current cold-formed steel design standards were found to be conservative in predicting the section moment capacities of compact and non-compact LSB sections while the hot-rolled steel design standards were able to better predict them. This paper has shown that suitable modifications are needed to the current design rules to allow the inclusion of available inelastic bending capacities of LSBs in design.
Resumo:
Client puzzles are cryptographic problems that are neither easy nor hard to solve. Most puzzles are based on either number theoretic or hash inversions problems. Hash-based puzzles are very efficient but so far have been shown secure only in the random oracle model; number theoretic puzzles, while secure in the standard model, tend to be inefficient. In this paper, we solve the problem of constucting cryptographic puzzles that are secure int he standard model and are very efficient. We present an efficient number theoretic puzzle that satisfies the puzzle security definition of Chen et al. (ASIACRYPT 2009). To prove the security of our puzzle, we introduce a new variant of the interval discrete logarithm assumption which may be of independent interest, and show this new problem to be hard under reasonable assumptions. Our experimental results show that, for 512-bit modulus, the solution verification time of our proposed puzzle can be up to 50x and 89x faster than the Karame-Capkum puzzle and the Rivest et al.'s time-lock puzzle respectively. In particular, the solution verification tiem of our puzzle is only 1.4x slower than that of Chen et al.'s efficient hash based puzzle.
Resumo:
The authors present a qualitative and quantitative comparison of various similarity measures that form the kernel of common area-based stereo-matching systems. The authors compare classical difference and correlation measures as well as nonparametric measures based on the rank and census transforms for a number of outdoor images. For robotic applications, important considerations include robustness to image defects such as intensity variation and noise, the number of false matches, and computational complexity. In the absence of ground truth data, the authors compare the matching techniques based on the percentage of matches that pass the left-right consistency test. The authors also evaluate the discriminatory power of several match validity measures that are reported in the literature for eliminating false matches and for estimating match confidence. For guidance applications, it is essential to have and estimate of confidence in the three-dimensional points generated by stereo vision. Finally, a new validity measure, the rank constraint, is introduced that is capable of resolving ambiguous matches for rank transform-based matching.
Resumo:
There is a growing interest in the use of megavoltage cone-beam computed tomography (MV CBCT) data for radiotherapy treatment planning. To calculate accurate dose distributions, knowledge of the electron density (ED) of the tissues being irradiated is required. In the case of MV CBCT, it is necessary to determine a calibration-relating CT number to ED, utilizing the photon beam produced for MV CBCT. A number of different parameters can affect this calibration. This study was undertaken on the Siemens MV CBCT system, MVision, to evaluate the effect of the following parameters on the reconstructed CT pixel value to ED calibration: the number of monitor units (MUs) used (5, 8, 15 and 60 MUs), the image reconstruction filter (head and neck, and pelvis), reconstruction matrix size (256 by 256 and 512 by 512), and the addition of extra solid water surrounding the ED phantom. A Gammex electron density CT phantom containing EDs from 0.292 to 1.707 was imaged under each of these conditions. The linear relationship between MV CBCT pixel value and ED was demonstrated for all MU settings and over the range of EDs. Changes in MU number did not dramatically alter the MV CBCT ED calibration. The use of different reconstruction filters was found to affect the MV CBCT ED calibration, as was the addition of solid water surrounding the phantom. Dose distributions from treatment plans calculated with simulated image data from a 15 MU head and neck reconstruction filter MV CBCT image and a MV CBCT ED calibration curve from the image data parameters and a 15 MU pelvis reconstruction filter showed small and clinically insignificant differences. Thus, the use of a single MV CBCT ED calibration curve is unlikely to result in any clinical differences. However, to ensure minimal uncertainties in dose reporting, MV CBCT ED calibration measurements could be carried out using parameter-specific calibration measurements.
Resumo:
Wound debridement refers to the removal of necrotic, devitalized, or contaminated tissue and/or foreign material to promote wound healing. Surgical debridement uses sharp instruments to cut dead tissue from a wound and it is the quickest and most efficient method of debridement. A wound debridement simulator [1,2] can ensure that a medical trainee is competent prior to performing a procedure on a genuine patient. Irrigation is performed at different stages of debridement in order to remove debris and reduce the bacteria count through rinsing the wound. This paper presents a novel approach for realistic irrigation visualization based on texture representations of debris. This approach applies image processing techniques to a series of images, which model the cleanliness of the wound. The active texture is generated and updated dynamically based on the irrigation state, location, and range. Presented results demonstrate that texture mapping and image processing techniques can provide effective and efficient solutions for irrigation visualization in the wound debridement simulator.
Resumo:
Compared the different patterns of stress reported by mothers of children (aged 5–12 yrs) with either a chronic physical illness (cystic fibrosis) or a chronic psychological disorder (autism), and children without a physical or psychological disorder. 24 mothers from each of these 3 groups completed a short form of the Questionnaire on Resources and Stress. Each clinical group exhibited different patterns of stressful response consistent with the nature of the disorder and the requirements of care imposed on the families. Autism contributed significantly more to family stress than did cystic fibrosis. The number of children in the family was not a significant variable. Implications for the development of family intervention programs are discussed
Resumo:
This collaborative project by Daniel Mafe and Andrew Brown, one of a number in they have been involved in together, conjoins painting and digital sound into a single, large scale, immersive exhibition/installation. The work as a whole acts as an interstitial point between contrasting approaches to abstraction: the visual and aural, the digital and analogue are pushed into an alliance and each works to alter perceptions of the other. For example, the paintings no longer mutely sit on the wall to be stared into. The sound seemingly emanating from each work shifts the viewer’s typical visual perception and engages their aural sensibilities. This seems to make one more aware of the objects as objects – the surface of each piece is brought into scrutiny – and immerses the viewer more viscerally within the exhibition. Similarly, the sonic experience is focused and concentrated spatially by each painted piece even as the exhibition is dispersed throughout the space. The sounds and images are similar in each local but not identical, even though they may seem to be the same from casual interaction, closer attention will quickly show this is not the case. In preparing this exhibition each artist has had to shift their mode of making to accommodate the other’s contribution. This was mainly done by a process of emptying whereby each was called upon to do less to the works they were making and to iterate the works toward a shared conception, blurring notions of individual imagination while maintaining material authorship. Empting was necessary to enable sufficient porosity where each medium allowed the other entry to its previously gated domain. The paintings are simple and subtle to allow the odd sonic textures a chance to work on the viewer’s engagement with them. The sound remains both abstract, using noise-like textures, and at a low volume to allow the audience’s attention to wander back and forth between aspects of the works.
Resumo:
The drawdown of reservoirs can significantly affect the stability of upstream slopes of earth dams. This is due to the removal of the balancing hydraulic forces acting on the dams and the undrained condition within the upstream slope soils. In such scenarios, the stability of the slopes can be influenced by a range of factors including drawdown rates, slope inclination and soil properties. This paper investigates the effects of drawdown rate, saturated hydraulic conductivity and unsaturated shear strength of dam materials on the stability of the upstream slope of an earth dam. In this study, the analysis of pore-water pressure changes within the upstream slope during reservoir drawdown was coupled with the slope stability analysis using the general limit equilibrium method. The results of the analysis suggested that a decrease in the reservoir water level caused the stability of the upstream slope to decrease. The dam embankment constructed with highly permeable soil was found to be more stable during drawdown scenarios, compared to others. Further, lower drawdown rates resulted in a higher safety factor for the upstream slope. Also, the safety factor of the slope calculated using saturated shear strength properties of the dam materials was slightly higher than that calculated using unsaturated shear strength properties. In general, for all the scenarios analysed, the lowest safety factor was found to be at the reservoir water level of about 2/3 of drawdown regime.
Resumo:
Purpose – The purpose of this paper is to contribute to the sociology-of-science type of accounting literature, addressing how accounting knowledge is established, advanced and extended. Design/methodology/approach – The research question is answered through the example of research into linkages between accounting and religion. Adopting an actor-network theory (ANT) approach, the paper follows the actors involved in the construction of accounting as an academic discipline through the controversies in which they engage to develop knowledge. Findings – The paper reveals that accounting knowledge is established, advanced and developed through the ongoing mobilisation of nonhumans (journals) who can enrol other humans and nonhumans. It shows that knowledge advancement, establishment and development is more contingent on network breadth than on research paradigms, which appear as side-effects of positioning vis-a-vis a community. Originality/value – The originality of this paper is twofold. First, ANT is applied to accounting knowledge, whereas the accounting literature applies it to the spread of management accounting ideas, methods and practices. Second, an original methodology for data collection is developed by inviting authors from the network to give a reflexive account of their writings at the time they joined the network. Well diffused in sociology and philosophy, such an approach is, albeit, original in accounting research.
Resumo:
In this paper, the influence of the impact energy on the initial fabrication of thin films formed by low energy cluster deposition was investigated by molecular dynamics simulation of All 3 clusters depositing on Ni(0 0 1) substrate. In the case of soft-landing, (0.01 eV/atom), clusters are rearranged from I-h symmetry into fcc-like clusters on the surface. Then they aggregate each other, which result in thin film growing in 3D island mode. While, growth will be in layer-by-layer mode at the impact energy of a few electron volt due to the transient lateral spread of cluster atoms induced by dense collision cascade. This effect has been traced to collision cascade inside the cluster. which is enhanced by collision with a hard Ni substrate. (C) 2002 Elsevier Science B.V. All rights reserved.
Resumo:
Climate change is expected to increase earth’s temperatures and consequently result in more frequent extreme weather events such as cyclones, storms, droughts and floods and rising global sea levels. This phenomenon will affect all assets. This paper discusses the impact of climate change and its consequences on public buildings. Public building management encompasses the building life cycle from planning, procurement, operation, repair and maintenance and building disposal. This paper recommends climate change adaptation strategies to be integrated into public building management. The roles and responsibilities of asset managers and users are discussed within the framework of planning and implementation of public building management and the integration of climate change adaptation strategies. A key point is that climate change can induce premature obsolescence of public buildings and services, which will increase the maintenance and refurbishment costs. This in turn will affect the life cycle cost of the building. Furthermore, a business continuity plan is essential for public building management in the context of disasters. The paper also highlights the significant role that the occupants of public buildings can play in the development and implementation of climate change adaptation strategies.