7,982 research outputs found

    Flame front propagation velocity measurement and in-cylinder combustion reconstruction using POET

    Get PDF
    The objective of this thesis is to develop an intelligent diagnostic technique POET (Passive Optical Emission Tomography) for the investigation of in cylinder combustion chemiluminescence. As a non-intrusive optical system, the POET system employs 40 fibre optic cables connected to 40 PMTs (Photo Multiplier Tube) to monitor the combustion process and flame front propagation in a modified commercial OHV (Over Head Valve) Pro 206 IC engine. The POET approach overcomes several limitations of present combustion research methods using a combination of fibre optic detection probes, photomultipliers and a tomographic diagnostics. The fibre optic probes are placed on a specially designed cylinder head gasket for non-invasively inserting cylinder. Each independent probe can measure the turbulent chemiluminescence of combustion flame front at up to 20 kHz. The resultant intensities can then be gathered tomographically using MART (Multiplicative Algebraic Reconstruction Technique) software to reconstruct an image of the complete flame-front. The approach is essentially a lensless imaging technique, which has the advantage of not requiring a specialized engine construction with conventional viewing ports to visualize the combustion image. The fibre optic system, through the use of 40, 2m long thermally isolated fibre optic cables can withstand combustion temperatures and is immune from electronic noise, typically generated by the spark plug. The POET system uses a MART tomographic methodology to reconstruct the turbulent combustion process. The data collected has been reconstructed to produce a temporal and spatial image of the combustion flame front. The variations of lame turbulence are monitored by sequences of reconstructed images. Therefore, the POET diagnostic technique reduces the complications of classic flame front propagation measurement systems and successfully demonstrates the in-cylinder combustion process. In this thesis, a series of calibration exercises have been performed to ensure that the photomultipliers of the POET system have sufficient temporal and spatial resolution to quantitatively map the flow velocity turbulence and chemiluminescence of the flame front. In the results, the flame has been analyzed using UV filters and blue filters to monitor the modified natural gas fuel engine. The flame front propagation speed has been evaluated and it is, on average, 12 m/s at 2280 rpm. Sequences of images have been used to illustrate the combustion explosion process at different rpm

    Cloud Services Brokerage for Mobile Ubiquitous Computing

    Get PDF
    Recently, companies are adopting Mobile Cloud Computing (MCC) to efficiently deliver enterprise services to users (or consumers) on their personalized devices. MCC is the facilitation of mobile devices (e.g., smartphones, tablets, notebooks, and smart watches) to access virtualized services such as software applications, servers, storage, and network services over the Internet. With the advancement and diversity of the mobile landscape, there has been a growing trend in consumer attitude where a single user owns multiple mobile devices. This paradigm of supporting a single user or consumer to access multiple services from n-devices is referred to as the Ubiquitous Cloud Computing (UCC) or the Personal Cloud Computing. In the UCC era, consumers expect to have application and data consistency across their multiple devices and in real time. However, this expectation can be hindered by the intermittent loss of connectivity in wireless networks, user mobility, and peak load demands. Hence, this dissertation presents an architectural framework called, Cloud Services Brokerage for Mobile Ubiquitous Cloud Computing (CSB-UCC), which ensures soft real-time and reliable services consumption on multiple devices of users. The CSB-UCC acts as an application middleware broker that connects the n-devices of users to the multi-cloud services. The designed system determines the multi-cloud services based on the user's subscriptions and the n-devices are determined through device registration on the broker. The preliminary evaluations of the designed system shows that the following are achieved: 1) high scalability through the adoption of a distributed architecture of the brokerage service, 2) providing soft real-time application synchronization for consistent user experience through an enhanced mobile-to-cloud proximity-based access technique, 3) reliable error recovery from system failure through transactional services re-assignment to active nodes, and 4) transparent audit trail through access-level and context-centric provenance

    Development of a human cell model of amyloid β seeding and aggregation to investigate Alzheimer's Disease pathology

    Get PDF
    Alzheimer’s disease (AD) is characterized by extracellular plaques of amyloid β (Aβ) and intracellular tangles of microtubular tau proteins. Aβ is produced through sequential cleavage of amyloid precursor protein (APP) by β-secretase (BACE1) and γ-secretase. Seeded aggregation of oligomeric Aβ (AβO) contributes to disease progression as demonstrated by intracerebral inoculation of transgenic mice with human-derived AD brain homogenates. To date, however, there is no high-throughput cell model for Aβ seeding and the present project investigated an approach to address this gap. Eleven human neuroblastoma lines were evaluated for their endogenous APP, BACE1, γ-secretase, and Aβ levels. Wild-type or mutant (Swedish, Iberian, or NL-F) APP695 was cloned with BACE1 into a retroviral vector and was stably overexpressed in two cell lines with opposite levels of APP and BACE1 expression, SK-N-BE(2) and GI-ME-N. The Aβ peptides secreted by each mutant were evaluated via mass spectrometry and relative amounts of Aβ1-38, 1-40, and 1-42, were quantified with a highly sensitive enzyme-linked immunosorbent assay (ELISA). Aβ levels were compared to those produced by 7PA2 cells, a wellcharacterized model of APP processing. APP-overexpressing SK-N-BE(2) cells secreted equivalent or higher Aβ amounts; the NL-F line had the highest levels of Aβ1-42, which is particularly prone to oligomerization. This line was inoculated with diluted homogenate from human AD brain with proven seeding ability, in parallel to 7PA2 and native GI-ME-N cells, in which Aβ was not detected. The lines were grown for several splits post-seeding. Cell supernatant from each split was evaluated for sustained AβO secretion post-seeding with an AβO-specific ELISA. Seed uptake and propagation was quantified at each split by immunocytochemistry. No AβOs were detected in cell supernatants due to assay sensitivity limitations and intracellular uptake was too variable. Hence, pilot experiments to explore seeded aggregation were not conclusive and further exploration of this system is needed

    Laser beam characterisation for industrial applications

    Get PDF
    This thesis describes the theory, development and applications of laser beam characterisation for industrial laser materials processing systems. Descriptions are given of novel forms of beam diagnostic systems and their integration into highly automated industrial tools. Work is also presented that has contributed to the new ISO standard on beam characterisation. Particular emphasis is given to excimer laser applications and UV micromachining. [Continues.

    Security and Privacy for IoT Ecosystems

    Get PDF
    Smart devices have become an integral part of our everyday life. In contrast to smartphones and laptops, Internet of Things (IoT) devices are typically managed by the vendor. They allow little or no user-driven customization. Users need to use and trust IoT devices as they are, including the ecosystems involved in the processing and sharing of personal data. Ensuring that an IoT device does not leak private data is imperative. This thesis analyzes security practices in popular IoT ecosystems across several price segments. Our results show a gap between real-world implementations and state-of-the-art security measures. The process of responsible disclosure with the vendors revealed further practical challenges. Do they want to support backward compatibility with the same app and infrastructure over multiple IoT device generations? To which extent can they trust their supply chains in rolling out keys? Mature vendors have a budget for security and are aware of its demands. Despite this goodwill, developers sometimes fail at securing the concrete implementations in those complex ecosystems. Our analysis of real-world products reveals the actual efforts made by vendors to secure their products. Our responsible disclosure processes and publications of design recommendations not only increase security in existing products but also help connected ecosystem manufacturers to develop secure products. Moreover, we enable users to take control of their connected devices with firmware binary patching. If a vendor decides to no longer offer cloud services, bootstrapping a vendor-independent ecosystem is the only way to revive bricked devices. Binary patching is not only useful in the IoT context but also opens up these devices as research platforms. We are the first to publish tools for Bluetooth firmware and lower-layer analysis and uncover a security issue in Broadcom chips affecting hundreds of millions of devices manufactured by Apple, Samsung, Google, and more. Although we informed Broadcom and customers of their technologies of the weaknesses identified, some of these devices no longer receive official updates. For these, our binary patching framework is capable of building vendor-independent patches and retrofit security. Connected device vendors depend on standards; they rarely implement lower-layer communication schemes from scratch. Standards enable communication between devices of different vendors, which is crucial in many IoT setups. Secure standards help making products secure by design and, thus, need to be analyzed as early as possible. One possibility to integrate security into a lower-layer standard is Physical-Layer Security (PLS). PLS establishes security on the Physical Layer (PHY) of wireless transmissions. With new wireless technologies emerging, physical properties change. We analyze how suitable PLS techniques are in the domain of mmWave and Visible Light Communication (VLC). Despite VLC being commonly believed to be very secure due to its limited range, we show that using VLC instead for PLS is less secure than using it with Radio Frequency (RF) communication. The work in this thesis is applied to mature products as well as upcoming standards. We consider security for the whole product life cycle to make connected devices and IoT ecosystems more secure in the long term

    Pulse Morphology of the Galactic Center Magnetar PSR J1745-2900

    Get PDF
    We present results from observations of the Galactic Center magnetar, PSR J1745-2900, at 2.3 and 8.4 GHz with the NASA Deep Space Network 70 m antenna, DSS-43. We study the magnetar's radio profile shape, flux density, radio spectrum, and single pulse behavior over a ~1 year period between MJDs 57233 and 57621. In particular, the magnetar exhibits a significantly negative average spectral index of ⟨α⟩\langle\alpha\rangle = -1.86 ±\pm 0.02 when the 8.4 GHz profile is single-peaked, which flattens considerably when the profile is double-peaked. We have carried out an analysis of single pulses at 8.4 GHz on MJD 57479 and find that giant pulses and pulses with multiple emission components are emitted during a significant number of rotations. The resulting single pulse flux density distribution is incompatible with a log-normal distribution. The typical pulse width of the components is ~1.8 ms, and the prevailing delay time between successive components is ~7.7 ms. Many of the single pulse emission components show significant frequency structure over bandwidths of ~100 MHz, which we believe is the first observation of such behavior from a radio magnetar. We report a characteristic single pulse broadening timescale of ⟨τd⟩\langle\tau_{d}\rangle = 6.9 ±\pm 0.2 ms at 8.4 GHz. We find that the pulse broadening is highly variable between emission components and cannot be explained by a thin scattering screen at distances ≳\gtrsim 1 kpc. We discuss possible intrinsic and extrinsic mechanisms for the magnetar's emission and compare our results to other magnetars, high magnetic field pulsars, and fast radio bursts.Comment: 18 pages, 12 figures, Accepted for publication in ApJ on 2018 August 30. v2: Updated to match published versio

    Factors that Contribute to de novo Protein Misfolding and Prion Formation in Saccharomyces cerevisiae

    Get PDF
    Protein misfolding is a common phenomenon that can have severe consequences on cellular and organismal health. Despite this, the causes of protein misfolding remain poorly understood. Prions are a class of proteins that, when misfolded, can convert other molecules into a heritable, non-native conformation. The yeast Saccharomyces cerevisiae naturally harbors several diverse prion-forming proteins; thus, it is an ideal model with which to investigate the factors that influence misfolding and aggregation.This thesis utilizes the yeast prions [PSI+] and [RNQ+] to investigate two distinct steps of the protein misfolding pathway: interactions with chaperones and their cofactors, and heterologous templating by other misfolded proteins. Chaperones are proteins that help other proteins fold correctly, yet we have found that chaperones can have non-intuitive effects upon cells that harbor the prion [PSI+]. An overabundance of the Hsp70 chaperone Ssa1 relative to the Hsp70 Ssb1 exacerbates [PSI+]-related toxicity. This toxicity can be rescued by overexpressing a Hsp70 nucleotide exchange factor, Sse1, that may improve Ssb1 functionality in the presence of excess available Ssa1. Our results imply that the balance of molecular chaperones is finely tuned and is crucial to maintaining protein homeostasis.Interestingly, the [PSI+] prion cannot form without the presence of an inducing factor, which is most commonly the [RNQ+] prion. The nature of the interaction between [PSI+] and [RNQ+] was previously unknown. Here, we have demonstrated that the two proteins undergo cross-seeding reaction, wherein the prion-forming proteins bind to one another to template the formation of [PSI+]. Blocking or restoring a binding site can have significant impacts upon the frequency of prion formation. As cross-seeding has been implicated in several human pathologies, these results may inform key principles that can be utilized to research disease prevention
    • …
    corecore