81,573 research outputs found
Determination of strength and debonding energy of a glass-concrete interface for encapsulation-based self-healing concrete
This paper presents a combined experimental-numerical analysis to assess the strength and fracture toughness of a glass-concrete interface. This interface is present in encapsulation-based self-healing concrete. There is absence of published results of these two properties, despite their important role in the correct working of this self-healing strategy. Two setups are used: uniaxial tensile tests to assess the bonding strength and four point bending tests to get the interfacial energy. The complementary numerical models for each setup are conducted using the finite element method. Two approaches are used: cohesive zone model to study the interface strength and the virtual crack closure technique to analyze the interfacial toughness. The models are validated and used to verify the experimental interpretations. It is found that a glass-concrete interface can develop a maximum strength of approximately 1 N/mm^2 with fracture energy of 0.011 J/m^2
Exploring hypotheses of the actions of TGF-beta 1 in epidermal wound healing using a 3D computational multiscale model of the human epidermis
In vivo and in vitro studies give a paradoxical picture of the actions of the key regulatory factor TGF-beta 1 in epidermal wound healing with it stimulating migration of keratinocytes but also inhibiting their proliferation. To try to reconcile these into an easily visualized 3D model of wound healing amenable for experimentation by cell biologists, a multiscale model of the formation of a 3D skin epithelium was established with TGF-beta 1 literature-derived rule sets and equations embedded within it. At the cellular level, an agent-based bottom-up model that focuses on individual interacting units ( keratinocytes) was used. This was based on literature-derived rules governing keratinocyte behavior and keratinocyte/ECM interactions. The selection of these rule sets is described in detail in this paper. The agent-based model was then linked with a subcellular model of TGF-beta 1 production and its action on keratinocytes simulated with a complex pathway simulator. This multiscale model can be run at a cellular level only or at a combined cellular/subcellular level. It was then initially challenged ( by wounding) to investigate the behavior of keratinocytes in wound healing at the cellular level. To investigate the possible actions of TGF-beta 1, several hypotheses were then explored by deliberately manipulating some of these rule sets at subcellular levels. This exercise readily eliminated some hypotheses and identified a sequence of spatial-temporal actions of TGF-beta 1 for normal successful wound healing in an easy-to-follow 3D model. We suggest this multiscale model offers a valuable, easy-to-visualize aid to our understanding of the actions of this key regulator in wound healing, and provides a model that can now be used to explore pathologies of wound healing
Autonomous Fault Detection in Self-Healing Systems using Restricted Boltzmann Machines
Autonomously detecting and recovering from faults is one approach for
reducing the operational complexity and costs associated with managing
computing environments. We present a novel methodology for autonomously
generating investigation leads that help identify systems faults, and extends
our previous work in this area by leveraging Restricted Boltzmann Machines
(RBMs) and contrastive divergence learning to analyse changes in historical
feature data. This allows us to heuristically identify the root cause of a
fault, and demonstrate an improvement to the state of the art by showing
feature data can be predicted heuristically beyond a single instance to include
entire sequences of information.Comment: Published and presented in the 11th IEEE International Conference and
Workshops on Engineering of Autonomic and Autonomous Systems (EASe 2014
Community and Social Interaction in Digital Religious Discourse in Nigeria, Ghana and Cameroon
Since the advent of the Internet, religion has maintained a very strong online presence. This study examines how African Christianity is negotiated and practised on the Internet. The main objectives are to investigate to what extent online worshippers in Nigeria, Ghana and Cameroon constitute (online) communities and how interactive the social networks of the churches are. This study shows that some important criteria for community are met by African digital worshippers. However, interaction flow is more of one to many, thus members do not regularly interact with one another as they would in offline worship. Worshippers view the forums as a sacred space solely for spiritual matters and not for sharing social or individual feelings and problems. However, the introduction of social media networks such as Facebook, Twitter, YouTube and interactive forums is an interesting and promising new development in religious worship in Africa
Continuous maintenance and the future – Foundations and technological challenges
High value and long life products require continuous maintenance throughout their life cycle to achieve required performance with optimum through-life cost. This paper presents foundations and technologies required to offer the maintenance service. Component and system level degradation science, assessment and modelling along with life cycle ‘big data’ analytics are the two most important knowledge and skill base required for the continuous maintenance. Advanced computing and visualisation technologies will improve efficiency of the maintenance and reduce through-life cost of the product. Future of continuous maintenance within the Industry 4.0 context also identifies the role of IoT, standards and cyber security
OnionBots: Subverting Privacy Infrastructure for Cyber Attacks
Over the last decade botnets survived by adopting a sequence of increasingly
sophisticated strategies to evade detection and take overs, and to monetize
their infrastructure. At the same time, the success of privacy infrastructures
such as Tor opened the door to illegal activities, including botnets,
ransomware, and a marketplace for drugs and contraband. We contend that the
next waves of botnets will extensively subvert privacy infrastructure and
cryptographic mechanisms. In this work we propose to preemptively investigate
the design and mitigation of such botnets. We first, introduce OnionBots, what
we believe will be the next generation of resilient, stealthy botnets.
OnionBots use privacy infrastructures for cyber attacks by completely
decoupling their operation from the infected host IP address and by carrying
traffic that does not leak information about its source, destination, and
nature. Such bots live symbiotically within the privacy infrastructures to
evade detection, measurement, scale estimation, observation, and in general all
IP-based current mitigation techniques. Furthermore, we show that with an
adequate self-healing network maintenance scheme, that is simple to implement,
OnionBots achieve a low diameter and a low degree and are robust to
partitioning under node deletions. We developed a mitigation technique, called
SOAP, that neutralizes the nodes of the basic OnionBots. We also outline and
discuss a set of techniques that can enable subsequent waves of Super
OnionBots. In light of the potential of such botnets, we believe that the
research community should proactively develop detection and mitigation methods
to thwart OnionBots, potentially making adjustments to privacy infrastructure.Comment: 12 pages, 8 figure
- …