216 research outputs found

    Artificial memory in production management

    Get PDF
    The scheduling of parts in a production system is an NP-complete problem. To search an optimal solution is incompatible with the "real time" constraint. The usual procedures (clusters-job, introduction of constraints on the fabrication starting time, hierarchical schedulind) all contribute to vanish the combinatorial aspect of the problem. We propose to memorize some behaviour-classes and to use them in order to choose the management rule in relation with the aimed targets. A numerical example will describe this approach

    Merged Mining: Curse of Cure?

    Get PDF
    Merged mining refers to the concept of mining more than one cryptocurrency without necessitating additional proof-of-work effort. Although merged mining has been adopted by a number of cryptocurrencies already, to this date little is known about the effects and implications. We shed light on this topic area by performing a comprehensive analysis of merged mining in practice. As part of this analysis, we present a block attribution scheme for mining pools to assist in the evaluation of mining centralization. Our findings disclose that mining pools in merge-mined cryptocurrencies have operated at the edge of, and even beyond, the security guarantees offered by the underlying Nakamoto consensus for extended periods. We discuss the implications and security considerations for these cryptocurrencies and the mining ecosystem as a whole, and link our findings to the intended effects of merged mining

    Cryptographic Key Management in Delay Tolerant Networks (DTNs): A survey

    Get PDF
    Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with a) security initialization, b) key establishment, and c) key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research

    A routing defense mechanism using evolutionary game theory for Delay Tolerant Networks

    Get PDF
    Delay Tolerant Networks (DTNs) often suffer from intermittent disruption due to factors such as mobility and energy. Though lots of routing algorithms in DTNs have been proposed in the last few years, the routing security problems have not attracted enough attention. DTNs are still facing the threats from different kinds of routing attacks. In this paper, a general purpose defense mechanism is proposed against various routing attacks on DTNs. The defense mechanism is based on the routing path information acquired from the forwarded messages and the acknowledgment (ACK), and it is suitable for different routing schemes. Evolutionary game theory is applied with the defense mechanism to analyze and facilitate the strategy changes of the nodes in the networks. Simulation results show that the proposed evolutionary game theory based defense scheme can achieve high average delivery ratio, low network overhead and low average transmission delay in various routing attack scenarios. By introducing the game theory, the networks can avoid being attacked and provide normal transmission service. The networks can reach evolutionary strategy stable (ESS) under special conditions after evolution. The initial parameters will affect the convergence speed and the final ESS, but the initial ratio of the nodes choosing different strategies can only affect the game process

    Patterned, organoid-based cartilaginous implants exhibit zone specific functionality forming osteochondral-like tissues in vivo.

    Full text link
    Tissue engineered constructs have the potential to respond to the unmet medical need of treating deep osteochondral defects. However, current tissue engineering strategies struggle in the attempt to create patterned constructs with biologically distinct functionality. In this work, a developmentally-inspired modular approach is proposed, whereby distinct cartilaginous organoids are used as living building blocks. First, a hierarchical construct was created, composed of three layers of cartilaginous tissue intermediates derived from human periosteum-derived cells: (i) early (SOX9), (ii) mature (COL2) and (iii) (pre)hypertrophic (IHH, COLX) phenotype. Subcutaneous implantation in nude mice generated a hybrid tissue containing one mineralized and one non-mineralized part. However, the non-mineralized part was represented by a collagen type I positive fibrocartilage-like tissue. To engineer a more stable articular cartilage part, iPSC-derived cartilage microtissues (SOX9, COL2; IHH neg) were generated. Subcutaneous implantation of assembled iPSC-derived cartilage microtissues resulted in a homogenous cartilaginous tissue positive for collagen type II but negative for osteocalcin. Finally, iPSC-derived cartilage microtissues in combination with the pre-hypertrophic cartilage organoids (IHH, COLX) could form dual tissues consisting of i) a cartilaginous safranin O positive and ii) a bony osteocalcin positive region upon subcutaneous implantation, corresponding to the pre-engineered zonal pattern. The assembly of functional building blocks, as presented in this work, opens possibilities for the production of complex tissue engineered implants by embedding zone-specific functionality through the use of pre-programmed living building blocks

    Raman scattering study of the a-GeTe structure and possible mechanism for the amorphous-to-crystal transition

    Full text link
    We report on an inelastic (Raman) light scattering study of the local structure of amorphous GeTe films. A detailed analysis of the temperature-reduced Raman spectra has shown that appreciable structural changes occur as a function of temperature. These changes involve modifications of atomic arrangements such as to facilitate the rapid amorphous-to-crystal transformation, which is the major advantage of phase-change materials used in optical data storage media. A particular structural model, supported by polarization analysis, is proposed being compatible with the experimental data as regards both the structure of a-GeTe and the crystallization transition. The remarkable difference between the Raman spectrum of the crystal and the glass can thus naturally be accounted for.Comment: Published in: J. Phys. Condens. Matter. 18, 965-979 (2006

    An ancestral molecular response to nanomaterial particulates

    Get PDF
    The varied transcriptomic response to nanoparticles has hampered the understanding of the mechanism of action. Here, by performing a meta-analysis of a large collection of transcriptomics data from various engineered nanoparticle exposure studies, we identify common patterns of gene regulation that impact the transcriptomic response. Analysis identifies deregulation of immune functions as a prominent response across different exposure studies. Looking at the promoter regions of these genes, a set of binding sites for zinc finger transcription factors C2H2, involved in cell stress responses, protein misfolding and chromatin remodelling and immunomodulation, is identified. The model can be used to explain the outcomes of mechanism of action and is observed across a range of species indicating this is a conserved part of the innate immune system.Peer reviewe
    corecore