1000 resultados para circular offering sites


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tubular members have become progressively more popular due to excellent structural properties, aesthetic appearance, corrosion and fire protection capability. However, a large number of such structures are found structurally deficient due to reduction of strength when they expose to severe environmental conditions such as marine environment, cold and hot weather. Hence strengthening and retrofitting of structural members are in high demands. In recent times Carbon Fibre Reinforced Polymers (CFRP) composites appears to be an excellent solution to enhance the load carrying capacity and serviceability of steel structures because of its superior physical and mechanical properties. However, the durability of such strengthening system under cold environmental condition has not yet been well documented to guide the engineers. This paper presents the findings of a study conducted to enhance the bond durability of CFRP strengthened steel tubular members by treating steel surface using epoxy based adhesion promoter under cold weather subjected to bending. The experimental program consisted of six number of CFRP strengthened specimens and one bare specimen. The sand blasted surface of the three specimens to be strengthened was pre-treated with MBrace primer and other three were remained untreated and then cured under ambient temperature and cold weather (3oC) for three and six months period of time. The beams were then loaded to failure under four point bending. The structural response of each specimen was predicted in terms of failure mode, failure load and mid-span deflection. The research findings show that the cold weather immersion had an adverse effect on durability of CFRP strengthened structures. Moreover, the epoxy based adhesion promoter was found to enhance the bond durability in elastic range.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs), have been identified as among the most common means of social engineering attacks. Owing to factors that reduce the ability of users to detect social engineering tricks and increase the ability of attackers to launch them, SNSs seem to be perfect breeding ground for exploiting the vulnerabilities of people, and the weakest link in security. This work will contribute to the knowledge of social engineering by identifying different entities and subentities that affect social engineering based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Genomic sequences are fundamentally text documents, admitting various representations according to need and tokenization. Gene expression depends crucially on binding of enzymes to the DNA sequence at small, poorly conserved binding sites, limiting the utility of standard pattern search. However, one may exploit the regular syntactic structure of the enzyme's component proteins and the corresponding binding sites, framing the problem as one of detecting grammatically correct genomic phrases. In this paper we propose new kernels based on weighted tree structures, traversing the paths within them to capture the features which underpin the task. Experimentally, we and that these kernels provide performance comparable with state of the art approaches for this problem, while offering significant computational advantages over earlier methods. The methods proposed may be applied to a broad range of sequence or tree-structured data in molecular biology and other domains.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Electrocatalytic processes will undoubtedly be at the heart of energising future transportation and technology with the added importance of being able to create the necessary fuels required to do so in an environmentally friendly and cost effective manner. For this to be successful two almost mutually exclusive surface properties need to be reconciled, namely producing highly active/reactive surface sites that exhibit long term stability. This article reviews the various approaches which have been undertaken to study the elusive nature of these active sites on metal surfaces which are considered as adatoms or clusters of adatoms with low coordination number. This includes the pioneering studies at extended well defined stepped single crystal surfaces using cyclic voltammetry up to the highly sophisticated in situ electrochemical imaging techniques used to study chemically synthesised nanomaterials. By combining the information attained from single crystal surfaces, individual nanoparticles of defined size and shape, density functional theory calculations and new concepts such as mesoporous multimetallic thin films and single atom electrocatalysts new insights into the design and fabrication of materials with highly active but stable active sites can be achieved. The area of electrocatalysis is therefore not only a fascinating and exciting field in terms of realistic technological and economical benefits but also from the fundamental understanding that can be acquired by studying such an array of interesting materials.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this chapter the authors discuss and informal learning settings such as fan fiction sites and their relations to teaching and learning within formal learning settings. Young people today spend a lot of time with social media built on user generated content. These media are often characterized by participatory culture which offers a good environment for developing skills and identity work. In this chapter the authors problematize fan fiction sites as informal learning settings where the possibilities to learn are powerful and significant. They also discuss the learning processes connected to the development of literacies. Here the rhetoric principle of “imitatio” plays a vital part as well as the co-production of texts on the sites, strongly supported by the beta reader and the power of positive feedback. They also display that some fans, through the online publication of fan fiction, are able to develop their craft in a way which previously have been impossible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this workshop proposal I discuss a case study physical computing environment named Talk2Me. This work was exhibited in February 2006 at The Block, Brisbane as an interactive installation in the early stages of its development. The major artefact in this work is a 10 metre wide X 3 metre high light-permeable white dome. There are other technologies and artefacts contained within the dome that make up this interactive environment. The dome artefact has impacted heavily on the design process, including shaping the types of interactions involved, the kinds of technologies employed, and the choice of other artefacts. In this workshop paper, I chart some of the various iterations Talk2Me has undergone in the design process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Management of the industrial nations' hazardous waste is a current and exponentially increasing, global threatening situation. Improved environmental information must be obtained and managed concerning the current status, temporal dynamics and potential future status of these critical sites. To test the application of spatial environmental techniques to the problem of hazardous waste sites, as Superfund (CERCLA) test site was chosen in an industrial/urban valley experiencing severe TCE, PCE, and CTC ground water contamination. A paradigm is presented for investigating spatial/environmental tools available for the mapping, monitoring and modelling of the environment and its toxic contaminated plumes. This model incorporates a range of technical issues concerning the collection of data as augmented by remotely sensed tools, the format and storage of data utilizing geographic information systems, and the analysis and modelling of environment through the use of advance GIS analysis algorithms and geophysic models of hydrologic transport including statistical surface generation. This spatial based approach is evaluated against the current government/industry standards of operations. Advantages and lessons learned of the spatial approach are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we examine the combined azimuthal and axial shear of a compressible isotropic elastic circular cylindrical tube of finite extent, otherwise referred to as helical shear (which is an isochoric deformation). The equilibrium equations are formulated in terms of the principal stretches, and explicit necessary and sufficient conditions on the strain-energy function for the material to support this deformation are obtained and compared with those obtained previously for this problem. Several classes of strain-energy functions are derived and in some general cases complete solutions of the equilibrium equations are obtained. Existing results are recovered as special cases and some new results for the strain-energy functions derived are determined and discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we examine the combined extension and torsion of a compressible isotropic elastic cylinder of finite extent. The equilibrium equations are formulated in terms of the principal stretches and then applied to the special case of pure torsion superimposed on a uniform extension (an isochoric deformation). Explicit necessary and sufficient conditions on the strain-energy function for the material to support this deformation with vanishing traction on the lateral surfaces of the cylinder are obtained. Some strain-energy functions satisfying these conditions are considered, existing results are recovered as special cases and new results are obtained. We also point out how the strain-energy functions generated from the considered isochoric deformation considered (of a compressible material) can be used to generate energy functions and corresponding solutions for the incompressible theory.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Here we report on an unconventional Ni-P alloy-catalyzed, high-throughput, highly reproducible chemical vapor deposition of ultralong carbon microcoils using acetylene precursor in the temperature range 700-750 °C. Scanning electron microscopy analysis reveals that the carbon microcoils have a unique double-helix structure and a uniform circular cross-section. It is shown that double-helix carbon microcoils have outstanding superelastic properties. The microcoils can be extended up to 10-20 times of their original coil length, and quickly recover the original state after releasing the force. A mechanical model of the carbon coils with a large spring index is developed to describe their extension and contraction. Given the initial coil parameters, this mechanical model can successfully account for the geometric nonlinearity of the spring constants for carbon micro- and nanocoils, and is found in a good agreement with the experimental data in the whole stretching process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2001, the red imported fire ant (Solenopsis invicta Buren) was identified in Brisbane, Australia. An eradication program involving broadcast bait treatment with two insect growth regulators and a metabolic inhibitor began in September of that year and is currently ongoing. To gauge the impacts of these treatments on local ant populations, we examined long-term monitoring data and quantified abundance patterns of S. invicta and common local ant genera using a linear mixed-effects model. For S. invicta, presence in pitfalls reduced over time to zero on every site. Significantly higher numbers of S. invicta workers were collected on high-density polygyne sites, which took longer to disinfest compared with monogyne and low-density polygyne sites. For local ants, nine genus groups of the 10 most common genera analyzed either increased in abundance or showed no significant trend. Five of these genus groups were significantly less abundant at the start of monitoring on high-density polygyne sites compared with monogyne and low-density polygyne sites. The genus Pheidole significantly reduced in abundance over time, suggesting that it was affected by treatment efforts. These results demonstrate that the treatment regime used at the time successfully removed S. invicta from these sites in Brisbane, and that most local ant genera were not seriously impacted by the treatment. These results have important implications for current and future prophylactic treatment efforts, and suggest that native ants remain in treated areas to provide some biological resistance to S. invicta.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current models of HIV-1 morphogenesis hold that newly synthesized viral Gag polyproteins traffic to and assemble at the cell membrane into spherical protein shells. The resulting late-budding structure is thought to be released by the cellular ESCRT machinery severing the membrane tether connecting it to the producer cell. Using electron tomography and scanning transmission electron microscopy, we find that virions have a morphology and composition distinct from late-budding sites. Gag is arranged as a continuous but incomplete sphere in the released virion. In contrast, late-budding sites lacking functional ESCRT exhibited a nearly closed Gag sphere. The results lead us to propose that budding is initiated by Gag assembly, but is completed in an ESCRT-dependent manner before the Gag sphere is complete. This suggests that ESCRT functions early in HIV-1 release-akin to its role in vesicle formation-and is not restricted to severing the thin membrane tether.