988 resultados para strengthening mechanisms
Resumo:
Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.
Resumo:
Secure communications between large number of sensor nodes that are randomly scattered over a hostile territory, necessitate efficient key distribution schemes. However, due to limited resources at sensor nodes such schemes cannot be based on post deployment computations. Instead, pairwise (symmetric) keys are required to be pre-distributed by assigning a list of keys, (a.k.a. key-chain), to each sensor node. If a pair of nodes does not have a common key after deployment then they must find a key-path with secured links. The objective is to minimize the keychain size while (i) maximizing pairwise key sharing probability and resilience, and (ii) minimizing average key-path length. This paper presents a deterministic key distribution scheme based on Expander Graphs. It shows how to map the parameters (e.g., degree, expansion, and diameter) of a Ramanujan Expander Graph to the desired properties of a key distribution scheme for a physical network topology.
Resumo:
The focus of knowledge management (KM) in the construction industry is moving towards capability building for value creation. The study reported by this paper is motivated by recent assertions about the genesis and evolution of knowledge management capability (KMC) in the strategic management field. It attempts to shed light on the governance of learning mechanisms that develop KMC within the context of construction firms. A questionnaire survey was administered to a sample of construction contractors operating in the very dynamic Hong Kong market to elicit opinions on the learning mechanisms and business outcomes of targeted firms. On the basis of a total of 149 usable responses, structural equation modeling (SEM) analysis identified relationships among knowledge-governance mechanisms, knowledge processes, and business performance, thereby supporting the existence of strategic learning loops. The study findings provide evidence from the construction context for capability assertions that knowledge-governance mechanisms and processes form learning mechanisms that carry out strategic learning to create value, effect performance outcomes, and ultimately drive the evolution of KMC. The findings imply that it is feasible for managing construction firms to govern learning mechanisms through managing the capability-based holistic KM system, thereby reconfiguring KMC to match needs in the dynamic market environment over time.
Resumo:
Staphylococcus aureus, one of the major pathogenic bacteria, is associated with substantial morbidity and mortality. The disease burden of staphylococcal infections is significant, which is primarily attributed to its adaptability and resistance to environmental stresses. S. aureus has the ability to develop multiple resistances to antimicrobial agents. These high resistances make pathogenicity of S. aureus one of the most complex mechanisms to understand and manage. Proteomic and bioinformatics approaches show great potential in exploring microbial adaptation strategies, ability to cause disease by pathogenic bacteria and the development of diagnostic tools. A summary of the latest developments in the application of ‘omics’ technologies to understand resistance mechanisms in S. aureus and their future role in antistaphylococcal vaccine and/or drug discovery is given here.
Resumo:
Manufacturing companies have strived to enhance managerial and technical capabilities to improve business performance. Building these capabilities requires effective share of knowledge - the strategic resource. Specifically, knowledge sharing (KS) between different manufacturing departments can improve manufacturing processes since leveraging organisational knowledge plays an enssential role in achieving competitive advantage. This paper presents an empirical investigation into the impact of KS on the effectiveness of supply chain management (SCM) and the product development process (PDP) in achieving desired business performance (BP). A questionnaire survey was administered from electronic manufacturing companies operating in Taiwan. 168 valid responses were received and used to statistically examine the relationships between the concepts (SCM, PDP, KS, BP). The study findings reveal that within the Taiwanese electronic manufacturing companies KS is an essential enabler for facilitating the effectiveness of SCM and PDP in achieving desired BP.
Resumo:
Advances in technology introduce new application areas for sensor networks. Foreseeable wide deployment of mission critical sensor networks creates concerns on security issues. Security of large scale densely deployed and infrastructure less wireless networks of resource limited sensor nodes requires efficient key distribution and management mechanisms. We consider distributed and hierarchical wireless sensor networks where unicast, multicast and broadcast type of communications can take place. We evaluate deterministic, probabilistic and hybrid type of key pre-distribution and dynamic key generation algorithms for distributing pair-wise, group-wise and network-wise keys.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighbouring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighbouring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools. Comparison to probabilistic schemes shows that our combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Structural framing systems and mechanisms designed for normal use rarely possess adequate robustness to withstand the effects of large impacts, blasts and extreme earthquakes that have been experienced in recent times. Robustness is the property of systems that enables them to survive unforeseen or unusual circumstances (Knoll & Vogel, 2009). Queensland University of Technology with industry collaboration is engaged in a program of research that commenced 15 years ago to study the impact of such unforeseeable phenomena and investigate methods of improving robustness and safety with protective mechanisms embedded or designed in structural systems. This paper highlights some of the research pertaining to seismic protection of building structures, rollover protective structures and effects of vehicular impact and blast on key elements in structures that could propagate catastrophic and disproportionate collapse.
Resumo:
Advanced composite materials offer remarkable potential in the strengthening of Civil Engineering structures. This research is targeted to provide in depth knowledge and understanding of bond characteristics of advanced and corrosion resistant material carbon fibre reinforced polymer (CFRP) that has a unique design tailor-ability and cost effective nature. The objective of this research is to investigate and compare the bonding mechanism between CFRP strengthened single and double strap steel joints. Investigations have been made in regards to failure mode, ultimate load and effective bond length for CFRP strengthened double and single strap joints. A series of tensile tests were conducted with different bond lengths for both type of joints. The bond behaviour of these specimens was further investigated by using nonlinear finite element analysis. Finally a bilinear relationship of shear stress-slip has been proposed by using the Finite element model for single and double strap joints.
Resumo:
Neutrophils constitute 50-60% of all circulating leukocytes; they present the first line of microbicidal defense and are involved in inflammatory responses. To examine immunocompetence in athletes, numerous studies have investigated the effects of exercise on the number of circulating neutrophils and their response to stimulation by chemotactic stimuli and activating factors. Exercise causes a biphasic increase in the number of neutrophils in the blood, arising from increases in catecholamine and cortisol concentrations. Moderate intensity exercise may enhance neutrophil respiratory burst activity, possibly through increases in the concentrations of growth hormone and the inflammatory cytokine IL-6. In contrast, intense or long duration exercise may suppress neutrophil degranulation and the production of reactive oxidants via elevated circulating concentrations of epinephrine (adrenaline) and cortisol. There is evidence of neutrophil degranulation and activation of the respiratory burst following exercise-induced muscle damage. In principle, improved responsiveness of neutrophils to stimulation following exercise of moderate intensity could mean that individuals participating in moderate exercise may have improved resistance to infection. Conversely, competitive athletes undertaking regular intense exercise may be at greater risk of contracting illness. However, there are limited data to support this concept. To elucidate the cellular mechanisms involved in the neutrophil responses to exercise, researchers have examined changes in the expression of cell membrane receptors, the production and release of reactive oxidants and more recently, calcium signaling. The investigation of possible modifications of other signal transduction events following exercise has not been possible because of current methodological limitations. At present, variation in exercise-induced alterations in neutrophil function appears to be due to differences in exercise protocols, training status, sampling points and laboratory assay techniques.
Resumo:
The general aim of this book is to provide a comprehensive summary of the characteristics of exercise-induced muscle damage and the mechanisms of tissue inflammation. The authors present a large amount of our own original data and have summarised the research of others.
Resumo:
Context: Very few authors have investigated the relationship between hip-abductor muscle strength and frontal-plane knee mechanics during running. Objective: To investigate this relationship using a 3-week hip-abductor muscle-strengthening program to identify changes in strength, pain, and biomechanics in runners with patellofemoral pain syndrome (PFPS). Design: Cohort study. Setting: University-based clinical research laboratory. Patients or Other Participants: Fifteen individuals (5 men, 10 women) with PFPS and 10 individuals without PFPS (4 men, 6 women) participated. Intervention(s): The patients with PFPS completed a 3-week hip-abductor strengthening protocol; control participants did not. Main Outcome Measure(s): The dependent variables of interest were maximal isometric hip-abductor muscle strength, 2-dimensional peak knee genu valgum angle, and stride-to-stride knee-joint variability. All measures were recorded at baseline and 3 weeks later. Between-groups differences were compared using repeated-measures analyses of variance. Results: At baseline, the PFPS group exhibited reduced strength, no difference in peak genu valgum angle, and increased stride-to-stride knee-joint variability compared with the control group. After the 3-week protocol, the PFPS group demonstrated increased strength, less pain, no change in peak genu valgum angle, and reduced stride-to-stride knee-joint variability compared with baseline. Conclusions: A 3-week hip-abductor muscle-strengthening protocol was effective in increasing muscle strength and decreasing pain and stride-to-stride knee-joint variability in individuals with PFPS. However, concomitant changes in peak knee genu valgum angle were not observed.