228 resultados para strong designated verifier signature scheme
Resumo:
In this paper, a 5th and 7th harmonic suppression technique for a 2-level VSI fed IM drive, by using capacitive filtering is proposed. A capacitor fed 2-level inverter is used on an open-end winding induction motor to suppress all 5th and 7th order harmonics. A PWM scheme that maintains the capacitor voltage, while suppressing the harmonics is also proposed. The proposed scheme is valid for the entire modulation range, including overmodulation and six-step mode of operation of the main inverter.
Resumo:
Background. Pediatric glioblastoma multiforme (GBM) is rare, and there is a single study, a seminal discovery showing association of histone H3.3 and isocitrate dehydrogenase (IDH) 1 mutation with a DNA methylation signature. The present study aims to validate these findings in an independent cohort of pediatric GBM, compare it with adult GBM, and evaluate the involvement of important functionally altered pathways. Methods. Genome-wide methylation profiling of 21 pediatric GBM cases was done and compared with adult GBM data (GSE22867). We performed gene mutation analysis of IDH1 and H3 histone family 3A (H3F3A), status evaluation of glioma cytosine-phosphate-guanine island methylator phenotype (G-CIMP), and Gene Ontology analysis. Experimental evaluation of reactive oxygen species (ROS) association was also done. Results. Distinct differences were noted between methylomes of pediatric and adult GBM. Pediatric GBM was characterized by 94 hypermethylated and 1206 hypomethylated cytosine-phosphate-guanine (CpG) islands, with 3 distinct clusters, having a trend to prognostic correlation. Interestingly, none of the pediatric GBM cases showed G-CIMP/IDH1 mutation. Gene Ontology analysis identified ROS association in pediatric GBM, which was experimentally validated. H3F3A mutants (36.4%; all K27M) harbored distinct methylomes and showed enrichment of processes related to neuronal development, differentiation, and cell-fate commitment. Conclusions. Our study confirms that pediatric GBM has a distinct methylome compared with that of adults. Presence of distinct clusters and an H3F3A mutation-specific methylome indicate existence of epigenetic subgroups within pediatric GBM. Absence of IDH1/G-CIMP status further indicates that findings in adult GBM cannot be simply extrapolated to pediatric GBM and that there is a strong need for identification of separate prognostic markers. A possible role of ROS in pediatric GBM pathogenesis is demonstrated for the first time and needs further evaluation.
Resumo:
Let P be a set of n points in R-d and F be a family of geometric objects. We call a point x is an element of P a strong centerpoint of P w.r.t..F if x is contained in all F is an element of F that contains more than cn points of P, where c is a fixed constant. A strong centerpoint does not exist even when F is the family of halfspaces in the plane. We prove the existence of strong centerpoints with exact constants for convex polytopes defined by a fixed set of orientations. We also prove the existence of strong centerpoints for abstract set systems with bounded intersection. (C) 2014 Elsevier B.V. All rights reserved.
Resumo:
There has been a lot of work in the literature, related to the mapping of boundaries of regions, using multiple agents. Most of these are based on optimization techniques or rely on potential fields to drive the agents towards the boundary and then retain them there while they space out evenly along the perimeter or surface (in two-dimensional and three-dimensional cases, respectively). In this paper an algorithm to track the boundary of a region in space is provided based on the cyclic pursuit scheme. This enables the agents to constantly move along the perimeter in a cluster, thereby tracking a dynamically changing boundary. The trajectories of the agents provide a sketch of the boundary. The use of multiple agents may facilitate minimization of tracking error by providing accurate estimates of points on the boundary, besides providing redundancy. Simulation results are provided to highlight the performance of the proposed scheme.
Resumo:
Opportunistic selection in multi-node wireless systems improves system performance by selecting the ``best'' node and by using it for data transmission. In these systems, each node has a real-valued local metric, which is a measure of its ability to improve system performance. Our goal is to identify the best node, which has the largest metric. We propose, analyze, and optimize a new distributed, yet simple, node selection scheme that combines the timer scheme with power control. In it, each node sets a timer and transmit power level as a function of its metric. The power control is designed such that the best node is captured even if. other nodes simultaneously transmit with it. We develop several structural properties about the optimal metric-to-timer-and-power mapping, which maximizes the probability of selecting the best node. These significantly reduce the computational complexity of finding the optimal mapping and yield valuable insights about it. We show that the proposed scheme is scalable and significantly outperforms the conventional timer scheme. We investigate the effect of. and the number of receive power levels. Furthermore, we find that the practical peak power constraint has a negligible impact on the performance of the scheme.
Resumo:
The correctness of a hard real-time system depends its ability to meet all its deadlines. Existing real-time systems use either a pure real-time scheduler or a real-time scheduler embedded as a real-time scheduling class in the scheduler of an operating system (OS). Existing implementations of schedulers in multicore systems that support real-time and non-real-time tasks, permit the execution of non-real-time tasks in all the cores with priorities lower than those of real-time tasks, but interrupts and softirqs associated with these non-real-time tasks can execute in any core with priorities higher than those of real-time tasks. As a result, the execution overhead of real-time tasks is quite large in these systems, which, in turn, affects their runtime. In order that the hard real-time tasks can be executed in such systems with minimal interference from other Linux tasks, we propose, in this paper, an integrated scheduler architecture, called SchedISA, which aims to considerably reduce the execution overhead of real-time tasks in these systems. In order to test the efficacy of the proposed scheduler, we implemented partitioned earliest deadline first (P-EDF) scheduling algorithm in SchedISA on Linux kernel, version 3.8, and conducted experiments on Intel core i7 processor with eight logical cores. We compared the execution overhead of real-time tasks in the above implementation of SchedISA with that in SCHED_DEADLINE's P-EDF implementation, which concurrently executes real-time and non-real-time tasks in Linux OS in all the cores. The experimental results show that the execution overhead of real-time tasks in the above implementation of SchedISA is considerably less than that in SCHED_DEADLINE. We believe that, with further refinement of SchedISA, the execution overhead of real-time tasks in SchedISA can be reduced to a predictable maximum, making it suitable for scheduling hard real-time tasks without affecting the CPU share of Linux tasks.
Resumo:
We consider the basic bidirectional relaying problem, in which two users in a wireless network wish to exchange messages through an intermediate relay node. In the compute-and-forward strategy, the relay computes a function of the two messages using the naturally occurring sum of symbols simultaneously transmitted by user nodes in a Gaussian multiple-access channel (MAC), and the computed function value is forwarded to the user nodes in an ensuing broadcast phase. In this paper, we study the problem under an additional security constraint, which requires that each user's message be kept secure from the relay. We consider two types of security constraints: 1) perfect secrecy, in which the MAC channel output seen by the relay is independent of each user's message and 2) strong secrecy, which is a form of asymptotic independence. We propose a coding scheme based on nested lattices, the main feature of which is that given a pair of nested lattices that satisfy certain goodness properties, we can explicitly specify probability distributions for randomization at the encoders to achieve the desired security criteria. In particular, our coding scheme guarantees perfect or strong secrecy even in the absence of channel noise. The noise in the channel only affects reliability of computation at the relay, and for Gaussian noise, we derive achievable rates for reliable and secure computation. We also present an application of our methods to the multihop line network in which a source needs to transmit messages to a destination through a series of intermediate relays.
Resumo:
Local heterogeneity is ubiquitous in natural aqueous systems. It can be caused locally by external biomolecular subsystems like proteins, DNA, micelles and reverse micelles, nanoscopic materials etc., but can also be intrinsic to the thermodynamic nature of the aqueous solution itself (like binary mixtures or at the gas-liquid interface). The altered dynamics of water in the presence of such diverse surfaces has attracted considerable attention in recent years. As these interfaces are quite narrow, only a few molecular layers thick, they are hard to study by conventional methods. The recent development of two dimensional infra-red (2D-IR) spectroscopy allows us to estimate length and time scales of such dynamics fairly accurately. In this work, we present a series of interesting studies employing two dimensional infra-red spectroscopy (2D-IR) to investigate (i) the heterogeneous dynamics of water inside reverse micelles of varying sizes, (ii) supercritical water near the Widom line that is known to exhibit pronounced density fluctuations and also study (iii) the collective and local polarization fluctuation of water molecules in the presence of several different proteins. The spatio-temporal correlation of confined water molecules inside reverse micelles of varying sizes is well captured through the spectral diffusion of corresponding 2D-IR spectra. In the case of supercritical water also, we observe a strong signature of dynamic heterogeneity from the elongated nature of the 2D-IR spectra. In this case the relaxation is ultrafast. We find remarkable agreement between the different tools employed to study the relaxation of density heterogeneity. For aqueous protein solutions, we find that the calculated dielectric constant of the respective systems unanimously shows a noticeable increment compared to that of neat water. However, the `effective' dielectric constant for successive layers shows significant variation, with the layer adjacent to the protein having a much lower value. Relaxation is also slowest at the surface. We find that the dielectric constant achieves the bulk value at distances more than 3 nm from the surface of the protein.
Resumo:
In this paper, we propose a new state transition based embedding (STBE) technique for audio watermarking with high fidelity. Furthermore, we propose a new correlation based encoding (CBE) scheme for binary logo image in order to enhance the payload capacity. The result of CBE is also compared with standard run-length encoding (RLE) compression and Huffman schemes. Most of the watermarking algorithms are based on modulating selected transform domain feature of an audio segment in order to embed given watermark bit. In the proposed STBE method instead of modulating feature of each and every segment to embed data, our aim is to retain the default value of this feature for most of the segments. Thus, a high quality of watermarked audio is maintained. Here, the difference between the mean values (Mdiff) of insignificant complex cepstrum transform (CCT) coefficients of down-sampled subsets is selected as a robust feature for embedding. Mdiff values of the frames are changed only when certain conditions are met. Hence, almost 50% of the times, segments are not changed and still STBE can convey watermark information at receiver side. STBE also exhibits a partial restoration feature by which the watermarked audio can be restored partially after extraction of the watermark at detector side. The psychoacoustic model analysis showed that the noise-masking ratio (NMR) of our system is less than -10dB. As amplitude scaling in time domain does not affect selected insignificant CCT coefficients, strong invariance towards amplitude scaling attacks is also proved theoretically. Experimental results reveal that the proposed watermarking scheme maintains high audio quality and are simultaneously robust to general attacks like MP3 compression, amplitude scaling, additive noise, re-quantization, etc.
Resumo:
In this paper, we design a new dynamic packet scheduling scheme suitable for differentiated service (DiffServ) network. Designed dynamic benefit weighted scheduling (DBWS) uses a dynamic weighted computation scheme loosely based on weighted round robin (WRR) policy. It predicts the weight required by expedited forwarding (EF) service for the current time slot (t) based on two criteria; (i) previous weight allocated to it at time (t-1), and (ii) the average increase in the queue length of EF buffer. This prediction provides smooth bandwidth allocation to all the services by avoiding overbooking of resources for EF service and still providing guaranteed services for it. The performance is analyzed for various scenarios at high, medium and low traffic conditions. The results show that packet loss is minimized, end to end delay is minimized and jitter is reduced and therefore meet quality of service (QoS) requirement of a network.
Resumo:
The link between atmospheric CO2 level and ventilation state of the deep ocean is poorly understood due to the lack of coherent observations on the partitioning of carbon between atmosphere and ocean. In this Southern Ocean study, we have classified the Southern Ocean into different zones based on its hydrological features and have binned the variability in latitudinal air-CO2 concentration and its isotopic ratios. Together with air-CO2, we analysed the surface water for the isotopic ratios in dissolved inorganic carbon (DIC). Using the binary mixing approach on the isotopic ratio of atmospheric CO2 and its concentration, we identified the delta C-13 value of source CO2. The isotopic composition of source CO2 was around -9.22 +/- 0.26 parts per thousand for the year 2011 and 2012, while a composition of -13.49 +/- 4.07 parts per thousand was registered for the year 2013. We used the delta C-13 of DIC to predict the CO2 composition in air under equilibrium and compared our estimates with actual observations. We suggest that the degeneration of the DIC in presence of warm water in the region was the factor responsible for adding the CO2 to the atmosphere above. The place of observation coincides with the zone of high wind speed which promotes the process of CO2 exsolution from sea water. (C) 2015 Elsevier Ltd. All rights reserved.
Resumo:
Glioblastomas (GBM) are largely incurable as they diffusely infiltrate adjacent brain tissues and are difficult to diagnose at early stages. Biomarkers derived from serum, which can be obtained by minimally invasive procedures, may help in early diagnosis, prognosis and treatment monitoring. To develop a serum cytokine signature, we profiled 48 cytokines in sera derived from normal healthy individuals (n = 26) and different grades of glioma patients (n = 194). We divided the normal and grade IV glioma/GBM serum samples randomly into equal sized training and test sets. In the training set, the Prediction Analysis for Microarrays (PAM) identified a panel of 18 cytokines that could discriminate GBM sera fromnormal sera with maximum accuracy (95.40%) and minimum error (4.60%). The 18-cytokine signature obtained in the training set discriminated GBM sera from normal sera in the test set as well (accuracy 96.55%; error 3.45%). Interestingly, the 18-cytokine signature also differentiated grade II/Diffuse Astrocytoma (DA) and grade III/Anaplastic Astrocytoma (AA) sera from normal sera very efficiently (DA vs. normal-accuracy 96.00%, error 4.00%; AA vs. normal-accuracy 95.83%, error 4.17%). Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway analysis using 18 cytokines resulted in the enrichment of two pathways, cytokine-cytokine receptor interaction and JAK-STAT pathways with high significance. Thus our study identified an 18-cytokine signature for distinguishing glioma sera fromnormal healthy individual sera and also demonstrated the importance of their differential abundance in glioma biology.
Resumo:
In this paper, an implicit scheme is presented for a meshless compressible Euler solver based on the Least Square Kinetic Upwind Method (LSKUM). The Jameson and Yoon's split flux Jacobians formulation is very popular in finite volume methodology, which leads to a scalar diagonal dominant matrix for an efficient implicit procedure (Jameson & Yoon, 1987). However, this approach leads to a block diagonal matrix when applied to the LSKUM meshless method. The above split flux Jacobian formulation, along with a matrix-free approach, has been adopted to obtain a diagonally dominant, robust and cheap implicit time integration scheme. The efficacy of the scheme is demonstrated by computing 2D flow past a NACA 0012 airfoil under subsonic, transonic and supersonic flow conditions. The results obtained are compared with available experiments and other reliable computational fluid dynamics (CFD) results. The present implicit formulation shows good convergence acceleration over the RK4 explicit procedure. Further, the accuracy and robustness of the scheme in 3D is demonstrated by computing the flow past an ONERA M6 wing and a clipped delta wing with aileron deflection. The computed results show good agreement with wind tunnel experiments and other CFD computations.
Resumo:
The present study deals with the diffusion and phase transition behaviour of paraffin reinforced with carbon nano-additives namely graphene oxide (GO) and surface functionalized single walled carbon nanotubes (SWCNT). Bulk disordered systems of paraffin hydrocarbons impregnated with carbon nano-additives have been generated in realistic equilibrium conformations for potential application as latent heat storage systems. Ab initio molecular dynamics(MD) in conjugation with COMPASS forcefield has been implemented using periodic boundary conditions. The proposed scheme allows determination of optimum nano-additive loading for improving thermo-physical properties through analysis of mass, thermal and transport properties; and assists in determination of composite behaviour and related performance from microscopic point of view. It was observed that nanocomposites containing 7.8% surface functionalised SWCNT and 55% GO loading corresponds to best latent heat storage system. The propounded methodology could serve as a by-pass route for economically taxing and iterative experimental procedures required to attain the optimum composition for best performance. The results also hint at the large unexplored potential of ab-initio classical MD techniques for predicting performance of new nanocomposites for potential phase change material applications. (C) 2015 Author(s).
Resumo:
The kinetic theory of fluid turbulence modeling developed by Degond and Lemou in 7] is considered for further study, analysis and simulation. Starting with the Boltzmann like equation representation for turbulence modeling, a relaxation type collision term is introduced for isotropic turbulence. In order to describe some important turbulence phenomenology, the relaxation time incorporates a dependency on the turbulent microscopic energy and this makes difficult the construction of efficient numerical methods. To investigate this problem, we focus here on a multi-dimensional prototype model and first propose an appropriate change of frame that makes the numerical study simpler. Then, a numerical strategy to tackle the stiff relaxation source term is introduced in the spirit of Asymptotic Preserving Schemes. Numerical tests are performed in a one-dimensional framework on the basis of the developed strategy to confirm its efficiency.