277 resultados para Pinched-cube topology
Resumo:
Topoisomerases (topos) maintain DNA topology and influence DNA transaction processes by catalysing relaxation, supercoiling and decatenation reactions. In the cellular milieu, division of labour between different topos ensures topological homeostasis and control of central processes. In Escherichia coli, DNA gyrase is the principal enzyme that carries out negative supercoiling, while topo IV catalyses decatenation, relaxation and unknotting. DNA gyrase apparently has the daunting task of undertaking both the enzyme functions in mycobacteria, where topo IV is absent. We have shown previously that mycobacterial DNA gyrase is an efficient decatenase. Here, we demonstrate that the strong decatenation property of the enzyme is due to its ability to capture two DNA segments in trans. Topo IV, a strong dedicated decatenase of E. coli, also captures two distinct DNA molecules in a similar manner. In contrast, E. coli DNA gyrase, which is a poor decatenase, does not appear to be able to hold two different DNA molecules in a stable complex. The binding of a second DNA molecule to GyrB/ParE is inhibited by ATP and the non-hydrolysable analogue, AMPPNP, and by the substitution of a prominent positively charged residue in the GyrB N-terminal cavity, suggesting that this binding represents a potential T-segment positioned in the cavity. Thus, after the GyrA/ParC mediated initial DNA capture, GyrB/ParE would bind efficiently to a second DNA in trans to form a T-segment prior to nucleotide binding and closure of the gate during decatenation.
Resumo:
Dodecagonal (12-sided) space vector pulsewidth modulation (PWM) schemes are characterized by the complete absence of (6n +/- 1)th-order harmonics (for odd n) in the phase voltages, within the linear modulation range and beyond, including over-modulation. This paper presents a new topology suitable for the realization of such multilevel inverter schemes for induction motor (IM) drives, by cascading two-level inverters with flying-capacitor-inverter fed floating H-bridge cells. Now, any standard IM may be used to get the dodecagonal operation which hitherto was possible only with open-end winding IM. To minimize the current total harmonic distortion (THD), a strategy for synchronous PWM is also proposed. It is shown that the proposed method is capable of obtaining better THD figures, compared to conventional dodecagonal schemes. The topology and the PWM strategy are validated through analysis and subsequently verified experimentally.
Resumo:
Multilevel inverters with hexagonal and dodecagonal voltage space vector structures have improved harmonic profile compared to two-level inverters. Further improvement in the quality of the waveform is possible using multilevel octadecagonal (18-sided polygon) voltage space vectors. This paper proposes an inverter circuit topology capable of generating multilevel octadecagonal voltage space vectors, by cascading two asymmetric three-level inverters. By the proper selection of dc-link voltages and the resultant switching states for the inverters, voltage space vectors, whose tips lie on three concentric octadecagons, are obtained. The advantages of octadecagonal voltage space vector-based pulsewidth modulation (PWM) techniques are the complete elimination of fifth, seventh, eleventh, and thirteenth harmonics in phase voltages and the extension of linear modulation range. In this paper, a simple PWM timing calculation method is also proposed. Experimental results have been presented in this paper to validate the proposed concept.
Resumo:
A $k$-box $B=(R_1,...,R_k)$, where each $R_i$ is a closed interval on the real line, is defined to be the Cartesian product $R_1\times R_2\times ...\times R_k$. If each $R_i$ is a unit length interval, we call $B$ a $k$-cube. Boxicity of a graph $G$, denoted as $\boxi(G)$, is the minimum integer $k$ such that $G$ is an intersection graph of $k$-boxes. Similarly, the cubicity of $G$, denoted as $\cubi(G)$, is the minimum integer $k$ such that $G$ is an intersection graph of $k$-cubes. It was shown in [L. Sunil Chandran, Mathew C. Francis, and Naveen Sivadasan: Representing graphs as the intersection of axis-parallel cubes. MCDES-2008, IISc Centenary Conference, available at CoRR, abs/cs/ 0607092, 2006.] that, for a graph $G$ with maximum degree $\Delta$, $\cubi(G)\leq \lceil 4(\Delta +1)\log n\rceil$. In this paper, we show that, for a $k$-degenerate graph $G$, $\cubi(G) \leq (k+2) \lceil 2e \log n \rceil$. Since $k$ is at most $\Delta$ and can be much lower, this clearly is a stronger result. This bound is tight. We also give an efficient deterministic algorithm that runs in $O(n^2k)$ time to output a $8k(\lceil 2.42 \log n\rceil + 1)$ dimensional cube representation for $G$. An important consequence of the above result is that if the crossing number of a graph $G$ is $t$, then $\boxi(G)$ is $O(t^{1/4}{\lceil\log t\rceil}^{3/4})$ . This bound is tight up to a factor of $O((\log t)^{1/4})$. We also show that, if $G$ has $n$ vertices, then $\cubi(G)$ is $O(\log n + t^{1/4}\log t)$. Using our bound for the cubicity of $k$-degenerate graphs we show that cubicity of almost all graphs in $\mathcal{G}(n,m)$ model is $O(d_{av}\log n)$, where $d_{av}$ denotes the average degree of the graph under consideration. model is O(davlogn).
Resumo:
TCP attacks are the major problem faced by Mobile Ad hoc Networks (MANETs) due to its limited network and host resources. Attacker traceback is a promising solution which allows a victim to identify the exact location of the attacker and hence enables the victim to take proper countermeasure near attack origins, for forensics and to discourage attackers from launching the attacks. However, attacker traceback in MANET is a challenging problem due to dynamic network topology, limited network and host resources such as memory, bandwidth and battery life. We introduce a novel method of TCP attacker Identification in MANET using the Traffic History - MAITH. Based on the comprehensive evaluation based on simulations, we showed that MAITH can successfully track down the attacker under diverse mobile multi-hop network environment with low communication, computation, and memory overhead.
Resumo:
Mobile ad hoc networks (MANETs) is one of the successful wireless network paradigms which offers unrestricted mobility without depending on any underlying infrastructure. MANETs have become an exciting and im- portant technology in recent years because of the rapid proliferation of variety of wireless devices, and increased use of ad hoc networks in various applications. Like any other networks, MANETs are also prone to variety of attacks majorly in routing side, most of the proposed secured routing solutions based on cryptography and authentication methods have greater overhead, which results in latency problems and resource crunch problems, especially in energy side. The successful working of these mechanisms also depends on secured key management involving a trusted third authority, which is generally difficult to implement in MANET environ-ment due to volatile topology. Designing a secured routing algorithm for MANETs which incorporates the notion of trust without maintaining any trusted third entity is an interesting research problem in recent years. This paper propose a new trust model based on cognitive reasoning,which associates the notion of trust with all the member nodes of MANETs using a novel Behaviors-Observations- Beliefs(BOB) model. These trust values are used for detec- tion and prevention of malicious and dishonest nodes while routing the data. The proposed trust model works with the DTM-DSR protocol, which involves computation of direct trust between any two nodes using cognitive knowledge. We have taken care of trust fading over time, rewards, and penalties while computing the trustworthiness of a node and also route. A simulator is developed for testing the proposed algorithm, the results of experiments shows incorporation of cognitive reasoning for computation of trust in routing effectively detects intrusions in MANET environment, and generates more reliable routes for secured routing of data.
Resumo:
The present work involves a computational study of soot formation and transport in case of a laminar acetylene diffusion flame perturbed by a co nvecting line vortex. The topology of the soot contours (as in an earlier experimental work [4]) have been investigated. More soot was produced when vortex was introduced from the air si de in comparison to a fuel side vortex. Also the soot topography was more diffused in case of the air side vortex. The computational model was found to be in good agreement with the ex perimental work [4]. The computational simulation enabled a study of the various parameters affecting soot transport. Temperatures were found to be higher in case of air side vortex as compared to a fuel side vortex. In case of the fuel side vortex, abundance of fuel in the vort ex core resulted in stoichiometrically rich combustion in the vortex core, and more discrete so ot topography. Overall soot production too was low. In case of the air side vortex abundan ce of air in the core resulted in higher temperatures and more soot yield. Statistical techniques like probability density fun ction, correlation coefficient and conditional probability function were introduced to explain the transient dependence of soot yield and transport on various parameters like temperature, a cetylene concentration.
Resumo:
The present work involves a computational study of soot formation and transport in case of a laminar acetylene diffusion flame perturbed by a convecting line vortex. The topology of the soot contours (as in an earlier experimental work [4]) have been investigated. More soot was produced when vortex was introduced from the air side in comparison to a fuel side vortex. Also the soot topography was more diffused in case of the air side vortex. The computational model was found to be in good agreement with the experimental work [4]. The computational simulation enabled a study of the various parameters affecting soot transport. Temperatures were found to be higher in case of air side vortex as compared to a fuel side vortex. In case of the fuel side vortex, abundance of fuel in the vort ex core resulted in stoichiometrically rich combustion in the vortex core, and more discrete soot topography. Overall soot production too was low. In case of the air side vortex abundance of air in the core resulted in higher temperatures and more soot yield. Statistical techniques like probability density function, correlation coefficient and conditional probability function were introduced to explain the transient dependence of soot yield and transport on various parameters like temperature, a cetylene concentration.
Resumo:
The nontrivial electronic topology of a topological insulator is thus far known to display signatures in a robust metallic state at the surface. Here, we establish vibrational anomalies in Raman spectra of the bulk that signify changes in electronic topology: an E-g(2) phonon softens unusually and its linewidth exhibits an asymmetric peak at the pressure induced electronic topological transition (ETT) in Sb2Se3 crystal. Our first-principles calculations confirm the electronic transition from band to topological insulating state with reversal of parity of electronic bands passing through a metallic state at the ETT, but do not capture the phonon anomalies which involve breakdown of adiabatic approximation due to strongly coupled dynamics of phonons and electrons. Treating this within a four-band model of topological insulators, we elucidate how nonadiabatic renormalization of phonons constitutes readily measurable bulk signatures of an ETT, which will facilitate efforts to develop topological insulators by modifying a band insulator. DOI: 10.1103/PhysRevLett.110.107401
Resumo:
Close packing of hydrophobic residues in the protein interior is an important determinant of protein stability. Cavities introduced by large to small substitutions are known to destabilize proteins. Conversely, native states of proteins and protein fragments can be stabilized by filling in existing cavities. Molten globules (MGs) were initially used to describe a state of protein which has well-defined secondary structure but little or no tertiary packing. Subsequent studies have shown that MGs do have some degree of native-like topology and specific packing. Wet molten globules (WMGs) with hydrated cores and considerably decreased packing relative to the native state have been studied extensively. Recently there has been renewed interest in identification and characterization of dry molten globules (DMGs). These are slightly expanded forms of the native state which show increased conformational flexibility, native-like main-chain hydrogen bonding and dry interiors. The generality of occurrence of DMGs during protein unfolding and the extent and nature of packing in DMGs remain to be elucidated. Packing interactions in native proteins and MGs can be probed through mutations. Next generation sequencing technologies make it possible to determine relative populations of mutants in a large pool. When this is coupled to phenotypic screens or cell-surface display, it becomes possible to rapidly examine large panels of single-site or multi-site mutants. From such studies, residue specific contributions to protein stability and function can be estimated in a highly parallelized fashion. This complements conventional biophysical methods for characterization of packing in native states and molten globules.
Resumo:
We address the problem of mining targeted association rules over multidimensional market-basket data. Here, each transaction has, in addition to the set of purchased items, ancillary dimension attributes associated with it. Based on these dimensions, transactions can be visualized as distributed over cells of an n-dimensional cube. In this framework, a targeted association rule is of the form {X -> Y} R, where R is a convex region in the cube and X. Y is a traditional association rule within region R. We first describe the TOARM algorithm, based on classical techniques, for identifying targeted association rules. Then, we discuss the concepts of bottom-up aggregation and cubing, leading to the CellUnion technique. This approach is further extended, using notions of cube-count interleaving and credit-based pruning, to derive the IceCube algorithm. Our experiments demonstrate that IceCube consistently provides the best execution time performance, especially for large and complex data cubes.
Resumo:
The current study describes the evolution of microstructure and texture in an Al-Zn-Mg-Cu-Zr-based 7010 aluminum alloy during different modes of hot cross-rolling. Processing of materials involves three different types of cross-rolling. The development of texture in the one-step cross-rolled specimen can be described by a typical beta-fiber having the maximum intensity near Copper (Cu) component. However, for the multi-step cross-rolled specimens, the as-rolled texture is mainly characterized by a strong rotated-Brass (Bs) component and a very weak rotated-cube component. Subsequent heat treatment leads to sharpening of the major texture component (i.e., rotated-Bs). Furthermore, the main texture components in all the specimens appear to be significantly rotated in a complex manner away from their ideal positions because of non-symmetric deformations in the two rolling directions. Detailed microstructural study indicates that dynamic recovery is the dominant restoration mechanism operating during the hot rolling. During subsequent heat treatment, static recovery dominates, while a combination of particle-stimulated nucleation (PSN) and strain-induced grain boundary migration (SIBM) causes partial recrystallization of the grain structure. The aforementioned restoration mechanisms play an important role in the development of texture components. The textural development in the current study could be attributed to the combined effects of (a) cross-rolling and inter-pass annealing that reduce the intensity of Cu component after each successive pass, (b) recrystallization resistance of Bs-oriented grains, (c) stability of Bs texture under cross-rolling, and (d) Zener pinning by Al3Zr dispersoids.
Resumo:
The effect of molecular shape and position of hydrogen bonding functionality in the solid state structural self-assembly was investigated using diaminotriazine substituted diphenyl ether based positional isomers (1-5). The molecular shape was modulated by changing diaminotriazine position that produced channel supramolecular structures in 1, 3 and 5. There exists a direct correlation between the molecular shape and three dimensional structures; more linear molecules resulted in close-packing whereas molecules with a labyrinthine topology formed a channel structure. Supramolecular aspects pertaining to the influence of solvent of crystallization in structure formation and reversible structural transformation in solid state were also explored. 1-5 exhibited tunable solid state fluorescence (lambda(max) = 437-496 nm) depending on the diaminotriazine substitutional position and 3 showed solvent-dependent solid state fluorescence. The present study describes the generation of a supramolecular channel structure with functional properties such as tunable fluorescence by varying the position of hydrogen bond functionality and solvent of crystallization.
Resumo:
In this paper, the stiffness and mass per unit length distributions of a rotating beam, which is isospectral to a given uniform axially loaded nonrotating beam, are determined analytically. The Barcilon-Gottlieb transformation is extended so that it transforms the governing equation of a rotating beam into the governing equation of a uniform, axially loaded nonrotating beam. Analysis is limited to a certain class of Euler-Bernoulli cantilever beams, where the product between the stiffness and the cube of mass per unit length is a constant. The derived mass and stiffness distributions of the rotating beam are used in a finite element analysis to confirm the frequency equivalence of the given and derived beams. Examples of physically realizable beams that have a rectangular cross section are shown as a practical application of the analysis.
Resumo:
Multilevel inverters with hexagonal and dodecagonal voltage space vector structures have improved harmonic profile compared to two level inverters. Further improvement in the quality of the waveform is possible using multilevel octadecagonal (18 sided polygon) voltage space vectors. This paper proposes an inverter circuit topology capable of generating multilevel octadecagonal voltage space vectors, by cascading two asymmetric three level inverters. By proper selection of DC link voltages and the resultant switching states for the inverters, voltage space vectors, whose tips lie on three concentric octadecagons, are obtained. The advantages of octadecagonal voltage space vector based PWM techniques are the complete elimination of fifth, seventh, eleventh and thirteenth harmonics in phase voltages and the extension of linear modulation range. In this paper, a simple PWM timing calculation method is also proposed. Matlab simulation results and experimental results have been presented in this paper to validate the proposed concept.