566 research outputs found
Recommended from our members
Influence of Multi-cycle Loading on Structure and Mechanics of Marine Mussel Plaques
The proteinaceous byssal plaque-thread structures created by marine mussels exhibit extraordinary load-bearing capability. Although the nanoscopic protein interactions that support interfacial adhesion are increasingly understood, major mechanistic questions about how mussel plaques maintain toughness on supramolecular scales remain unanswered. This study explores the mechanical properties of whole mussel plaques subjected to repetitive loading cycles, with varied recovery periods. Mechanical measurements were complemented with scanning electron microscopy to investigate strain-induced structural changes after yield. Multicyclic loading of plaques decreases their low-strain stiffness and introduces irreversible, strain-dependent plastic damage within the plaque microstructure. However, strain history does not compromise critical strength or maximum extension compared with plaques monotonically loaded to failure. These results suggest that a multiplicity of force transfer mechanisms between the thread and plaque-substrate interface allow the plaque-thread structure to accommodate a wide range of extensions as it continues to bear load. This improved understanding of the mussel system at the micron- to-millimeter lengthscale offers strategies for including similar fail-safe mechanisms in the design of soft, tough and resilient synthetic structures
War in Purananuru
When hear the word war, we always remember the destruction caused by it, the majority of damages and it brings happiness to a few and misery to many. Thus, war has threatened the people over time. Earlier, Moovendar kings are always remembered in Tamil Nadu during war. Mankind's war with nature has spawned civilizational development and cultural maturity. The wars fought by people among themselves are considered historic on the basis of valor. A man's basic need is to be fulfilled by himself and the society around him, by the government and the rulers. When this situation does not continue, a king steals the resources of another country and gives it to his countrymen since then. The purpose of this study is to find out the news about the war in Purananuru
Contradictions of Freedom in The Tempest and The Brief Wondrous Life of Oscar Wao
In William Shakespeare’s The Tempest (1610-1611) and Junot Diaz’s The Brief Wondrous Life of Oscar Wao (2007) the character negotiate contradictions of freedom: the entitlements that justify violence as well as oppression on the one hand and rights that grant access to emancipation from violence and imposition on the other
Using Web services choreography to model business process in e-commerce
Web modeling languages like WebML (Web modeling Language), OOHDM (Object Oriented Hypermedia design) are evolved from hypermedia models. And they pay attention only to hypermedia modeling and model business rules as a form of navigation, this is called business process emulation. Our approach is to use web service peer-peer language, such as WS-CDL to model business process in an e-commerce application. In this way we introduce a new layer that models all the business rules using WS-CDL In this approach the hypermedia model models only navigation using WebML and once business process is initiated from simple navigation the process layer defined using WS-CDL will execute the business rules. By constructing a case study to test this hybrid-modeling framework, we hypothesise that this newly released peer-peer collaborative language for web-services can be used to model the concepts of business process. Thus we get a unique approach to model business process along with navigation. This approach is a proposed solution to the issues of business process emulation. Paper copy at Leddy Library: Theses & Major Papers - Basement, West Bldg. / Call Number: Thesis2006 .S86. Source: Masters Abstracts International, Volume: 45-01, page: 0366. Thesis (M.Sc.)--University of Windsor (Canada), 2006
Word fiction in Kurunthokai
Sangam literature is a mirror of time that expresses the life of the ancient Tamil people. This is literature dealing with the love genre, which passionately describes the feelings of such a man, as well as external literature dealing with the country, city, king, and society, which relates to man's external life. Love is the reason a man and a woman seek each other out of love between domestic and public morality. The environment plays an important role in the lives of these lovers. When the poets respect the feelings of the natural environment around a man, such as trees, plants, vines, animals, and birds, and produce them in conjunction with the domestic life of the chieftains, he employs a variety of imaginative skills. In that sense, etymology is the technique of explaining the idea that comes to be expressed by governing the idea of a word, which is an effective vocabulary. Words are the beauty of poetry. It is in the way it is set that poetry becomes special. The creation of immortal literature depends on the way the poet manipulates words and the manner in which words govern poetry. Capital is words for the poet. The poet is identified by those words. The poet emerges through words. The evidence for this is scattered in many ways in the Sangam literature. When the creator takes and explains the subtle meaning of the words buried in literature, they give them a taste. The purpose of this study is to examine the aesthetic messages revealed through fiction in the personalities of those words
Labour Market Adjustment in the Construction Industry 2001-2006
The construction industry experienced heightened activity from 2001 to 2006 concurrent with low interest rates, high population growth, strong wage and job growth, and property investments from overseas. Following this heightened demand, there was a 41.4 percent increase in employment in the construction industry over the six-year period. This compared with a 15.5 percent increase across all other industries excluding construction. This study, uses the Linked Employer-Employee Data (LEED) to investigate how the market adjusted to the higher level of employment. Across the construction industry from 2001 to 2006, relative average wage growth was subdued. However, a change in the composition o f labour hired was evident. The majority of inflows into the construction industry came from alternative industries, with every six in ten workers previously engaged in an alternative industry in the past year. The construction industry continued to source its workers from the same industries. However, the composition o f workers flowing from these industries into construction shifted towards younger and hence less experienced workers. This shift suggests that there were concessions on quality in adjusting to the higher level of employment. The increased inflow of younger and less experienced individuals, together with the relatively higher inflow of self- employed individuals into the construction industry, explains the comparatively subdued growth in average wages across the construction industry at a time of strong employment growth
Roheliste alade arendamine Katmandus
Master's Thesis
Curriculum in Landscape ArchitectureIn developing nations, the urban population is expanding quicker than the rural
population due to more possibilities and a higher standard of living, which results in
urbanisation. Kathmandu, the capital city of Nepal, has 1.57 million residents, with
an annual growth rate of 3.29%. Such urbanisation pressure results in rapid changes
in the urban landscape pattern of the region. Also, Kathmandu's current state of green
spaces is challenging due to the increasing urbanisation and population expansion of
the city. This thesis is about studying parks in Kathmandu and their current situation
and uses. For this purpose, I looked at five different parks in Kathmandu. The
selection was the result of online survey questions conducted with 45 residents of
Kathmandu. Parks in Kathmandu have been examined based on online survey
questions in the following cases: activities preferred, like in the park, problems facing,
facilities, benefits and improvement needed. Also, each survey park has been assessed
according to the location of the parks, history of the parks, types of greenery,
facilities, accessibility, and safety. In the end, discussion and conclusion are provided,
where results and literature review are discussed, compared, and concluded with the
conclusion.Arengumaades laieneb linnaelanikkond tänu suurematele võimalustele ja kõrgemale
elatustasemele kiiremini kui maarahvastik, mille tulemuseks on linnastumine. Nepali
pealinnas Katmandus elab 1,57 miljonit elanikku, aastane kasvumäär on 3,29%.
Selline linnastumise surve põhjustab kiireid muutusi piirkonna linnamaastikus. Ka
Katmandu rohealade praegune olukord on linna kasvava linnastumise ja elanikkonna
suurenemise tõttu keeruline. See lõputöö käsitleb Katmandu parkide ning nende
hetkeolukorra ja kasutusvõimaluste uurimist. Selleks vaatasin Katmandus viit
erinevat parki. Valik tehti veebiküsitluse küsimustega, mis viidi läbi 45 Katmandu
elanikuga. Katmandu parke on veebiküsitluse küsimuste põhjal uuritud järgmistel
juhtudel: eelistatud tegevused, nagu pargis, probleemid, rajatised, eelised ja
parendusvajadus. Samuti on iga uuringuparki hinnatud parkide asukoha, parkide
ajaloo, haljastuse liikide, rajatiste, ligipääsetavuse ja ohutuse alusel. Lõpus on arutelu
ja järeldus, kus arutatakse tulemusi ja kirjanduse ülevaadet, võrreldakse neid ja
lõpetatakse järeldusega
Optimising a defence-aware threat modelling diagram incorporating a defence-in-depth approach for the internet-of-things
Modern technology has proliferated into just about every aspect of life while improving the quality of life. For instance, IoT technology has significantly improved over traditional systems, providing easy life, time-saving, financial saving, and security aspects. However, security weaknesses associated with IoT technology can pose a significant threat to the human factor. For instance, smart doorbells can make household life easier, save time, save money, and provide surveillance security. Nevertheless, the security weaknesses in smart doorbells could be exposed to a criminal and pose a danger to the life and money of the household. In addition, IoT technology is constantly advancing and expanding and rapidly becoming ubiquitous in modern society. In that case, increased usage and technological advancement create security weaknesses that attract cybercriminals looking to satisfy their agendas.
Perfect security solutions do not exist in the real world because modern systems are continuously improving, and intruders frequently attempt various techniques to discover security flaws and bypass existing security control in modern systems. In that case, threat modelling is a great starting point in understanding the threat landscape of the system and its weaknesses. Therefore, the threat modelling field in computer science was significantly improved by implementing various frameworks to identify threats and address them to mitigate them. However, most mature threat modelling frameworks are implemented for traditional IT systems that only consider software-related weaknesses and do not address the physical attributes. This approach may not be practical for IoT technology because it inherits software and physical security weaknesses. However, scholars employed mature threat modelling frameworks such as STRIDE on IoT technology because mature frameworks still include security concepts that are significant for modern technology. Therefore, mature frameworks cannot be ignored but are not efficient in addressing the threat associated with modern systems.
As a solution, this research study aims to extract the significant security concept of matured threat modelling frameworks and utilise them to implement robust IoT threat modelling frameworks. This study selected fifteen threat modelling frameworks from among researchers and the defence-in-depth security concept to extract threat modelling techniques. Subsequently, this research study conducted three independent reviews to discover valuable threat modelling concepts and their usefulness for IoT technology. The first study deduced that integration of threat modelling approach software-centric, asset-centric, attacker-centric and data-centric with defence-in-depth is valuable and delivers distinct benefits. As a result, PASTA and TRIKE demonstrated four threat modelling approaches based on a classification scheme. The second study deduced the features of a threat modelling framework that achieves a high satisfaction level toward defence-in-depth security architecture. Under evaluation criteria, the PASTA framework scored the highest satisfaction value. Finally, the third study deduced IoT systematic threat modelling techniques based on recent research studies. As a result, the STRIDE framework was identified as the most popular framework, and other frameworks demonstrated effective capabilities valuable to IoT technology.
Respectively, this study introduced Defence-aware Threat Modelling (DATM), an IoT threat modelling framework based on the findings of threat modelling and defence-in-depth security concepts. The steps involved with the DATM framework are further described with figures for better understatement. Subsequently, a smart doorbell case study is considered for threat modelling using the DATM framework for validation. Furthermore, the outcome of the case study was further assessed with the findings of three research studies and validated the DATM framework. Moreover, the outcome of this thesis is helpful for researchers who want to conduct threat modelling in IoT environments and design a novel threat modelling framework suitable for IoT technology
- …