81,573 research outputs found

    Determination of strength and debonding energy of a glass-concrete interface for encapsulation-based self-healing concrete

    Get PDF
    This paper presents a combined experimental-numerical analysis to assess the strength and fracture toughness of a glass-concrete interface. This interface is present in encapsulation-based self-healing concrete. There is absence of published results of these two properties, despite their important role in the correct working of this self-healing strategy. Two setups are used: uniaxial tensile tests to assess the bonding strength and four point bending tests to get the interfacial energy. The complementary numerical models for each setup are conducted using the finite element method. Two approaches are used: cohesive zone model to study the interface strength and the virtual crack closure technique to analyze the interfacial toughness. The models are validated and used to verify the experimental interpretations. It is found that a glass-concrete interface can develop a maximum strength of approximately 1 N/mm^2 with fracture energy of 0.011 J/m^2

    Exploring hypotheses of the actions of TGF-beta 1 in epidermal wound healing using a 3D computational multiscale model of the human epidermis

    Get PDF
    In vivo and in vitro studies give a paradoxical picture of the actions of the key regulatory factor TGF-beta 1 in epidermal wound healing with it stimulating migration of keratinocytes but also inhibiting their proliferation. To try to reconcile these into an easily visualized 3D model of wound healing amenable for experimentation by cell biologists, a multiscale model of the formation of a 3D skin epithelium was established with TGF-beta 1 literature-derived rule sets and equations embedded within it. At the cellular level, an agent-based bottom-up model that focuses on individual interacting units ( keratinocytes) was used. This was based on literature-derived rules governing keratinocyte behavior and keratinocyte/ECM interactions. The selection of these rule sets is described in detail in this paper. The agent-based model was then linked with a subcellular model of TGF-beta 1 production and its action on keratinocytes simulated with a complex pathway simulator. This multiscale model can be run at a cellular level only or at a combined cellular/subcellular level. It was then initially challenged ( by wounding) to investigate the behavior of keratinocytes in wound healing at the cellular level. To investigate the possible actions of TGF-beta 1, several hypotheses were then explored by deliberately manipulating some of these rule sets at subcellular levels. This exercise readily eliminated some hypotheses and identified a sequence of spatial-temporal actions of TGF-beta 1 for normal successful wound healing in an easy-to-follow 3D model. We suggest this multiscale model offers a valuable, easy-to-visualize aid to our understanding of the actions of this key regulator in wound healing, and provides a model that can now be used to explore pathologies of wound healing

    Autonomous Fault Detection in Self-Healing Systems using Restricted Boltzmann Machines

    Get PDF
    Autonomously detecting and recovering from faults is one approach for reducing the operational complexity and costs associated with managing computing environments. We present a novel methodology for autonomously generating investigation leads that help identify systems faults, and extends our previous work in this area by leveraging Restricted Boltzmann Machines (RBMs) and contrastive divergence learning to analyse changes in historical feature data. This allows us to heuristically identify the root cause of a fault, and demonstrate an improvement to the state of the art by showing feature data can be predicted heuristically beyond a single instance to include entire sequences of information.Comment: Published and presented in the 11th IEEE International Conference and Workshops on Engineering of Autonomic and Autonomous Systems (EASe 2014

    Community and Social Interaction in Digital Religious Discourse in Nigeria, Ghana and Cameroon

    Get PDF
    Since the advent of the Internet, religion has maintained a very strong online presence. This study examines how African Christianity is negotiated and practised on the Internet. The main objectives are to investigate to what extent online worshippers in Nigeria, Ghana and Cameroon constitute (online) communities and how interactive the social networks of the churches are. This study shows that some important criteria for community are met by African digital worshippers. However, interaction flow is more of one to many, thus members do not regularly interact with one another as they would in offline worship. Worshippers view the forums as a sacred space solely for spiritual matters and not for sharing social or individual feelings and problems. However, the introduction of social media networks such as Facebook, Twitter, YouTube and interactive forums is an interesting and promising new development in religious worship in Africa

    Continuous maintenance and the future – Foundations and technological challenges

    Get PDF
    High value and long life products require continuous maintenance throughout their life cycle to achieve required performance with optimum through-life cost. This paper presents foundations and technologies required to offer the maintenance service. Component and system level degradation science, assessment and modelling along with life cycle ‘big data’ analytics are the two most important knowledge and skill base required for the continuous maintenance. Advanced computing and visualisation technologies will improve efficiency of the maintenance and reduce through-life cost of the product. Future of continuous maintenance within the Industry 4.0 context also identifies the role of IoT, standards and cyber security

    OnionBots: Subverting Privacy Infrastructure for Cyber Attacks

    Full text link
    Over the last decade botnets survived by adopting a sequence of increasingly sophisticated strategies to evade detection and take overs, and to monetize their infrastructure. At the same time, the success of privacy infrastructures such as Tor opened the door to illegal activities, including botnets, ransomware, and a marketplace for drugs and contraband. We contend that the next waves of botnets will extensively subvert privacy infrastructure and cryptographic mechanisms. In this work we propose to preemptively investigate the design and mitigation of such botnets. We first, introduce OnionBots, what we believe will be the next generation of resilient, stealthy botnets. OnionBots use privacy infrastructures for cyber attacks by completely decoupling their operation from the infected host IP address and by carrying traffic that does not leak information about its source, destination, and nature. Such bots live symbiotically within the privacy infrastructures to evade detection, measurement, scale estimation, observation, and in general all IP-based current mitigation techniques. Furthermore, we show that with an adequate self-healing network maintenance scheme, that is simple to implement, OnionBots achieve a low diameter and a low degree and are robust to partitioning under node deletions. We developed a mitigation technique, called SOAP, that neutralizes the nodes of the basic OnionBots. We also outline and discuss a set of techniques that can enable subsequent waves of Super OnionBots. In light of the potential of such botnets, we believe that the research community should proactively develop detection and mitigation methods to thwart OnionBots, potentially making adjustments to privacy infrastructure.Comment: 12 pages, 8 figure
    corecore