59 resultados para key replacement attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We illustrate the potential of using higher order critical points in the deeper understanding of several interesting problems of condensed matter science, e.g. critical adsorption, finite size effects, morphology of critical fluctuations, reversible aggregation of colloids, dynamics of the ordering process, etc.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cysteine residues in proteins serve many important functions such as stabilizing and maintaining the three-dimensional conformation of many proteins(1), in enzyme catalysis, as a residue undergoing post-translational 2 and in the formation of DNA-binding modification domain of a class of transcriptional activators(3), It is also involved in biological redox coupling(4) and xenobiotic metabolism(5). Disulphide bonds formed by xenobiotic metabolism oxidation of cysteine residues have been used as a probe to study the structure/function relationships of proteins, Introducing novel disulphide bonds in proteins to increase their thermal stability and, therefore, the shelf life is an important goal of protein engineering(6,7), In addition, the thiol group of cysteine residue participates in a reaction termed as thiol/disulphide exchange reaction, the biological significance of this reaction being the theme of this review.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several replacement policies for web caches have been proposed and studied extensively in the literature. Different replacement policies perform better in terms of (i) the number of objects found in the cache (cache hit), (ii) the network traffic avoided by fetching the referenced object from the cache, or (iii) the savings in response time. In this paper, we propose a simple and efficient replacement policy (hereafter known as SE) which improves all three performance measures. Trace-driven simulations were done to evaluate the performance of SE. We compare SE with two widely used and efficient replacement policies, namely Least Recently Used (LRU) and Least Unified Value (LUV) algorithms. Our results show that SE performs at least as well as, if not better than, both these replacement policies. Unlike various other replacement policies proposed in literature, our SE policy does not require parameter tuning or a-priori trace analysis and has an efficient and simple implementation that can be incorporated in any existing proxy server or web server with ease.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two new statistics, namely Delta(chi 2) and Delta(chi), based on the extreme value theory, were derived by Gupta et al. We use these statistics to study the direction dependence in the HST Key Project data, which provides one of the most precise measurements of the Hubble constant. We also study the non-Gaussianity in this data set using these statistics. Our results for Delta(chi 2) show that the significance of direction-dependent systematics is restricted to well below the 1 sigma confidence limit; however, the presence of non-Gaussian features is subtle. On the other hand, the Delta(chi). statistic, which is more sensitive to direction dependence, shows direction dependence systematics to be at a slightly higher confidence level, and the presence of non-Gaussian features at a level similar to the Delta(chi 2) statistic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An analysis of 503 available triosephosphate isomerase sequences revealed nine fully conserved residues. Of these, four residues-K12, H95, E97 and E165-are capable of proton transfer and are all arrayed around the dihydroxyacetone phosphate substrate in the three-dimensional structure. Specific roles have been assigned to the residues K12, H95 and E165, but the nature of the involvement of E97 has not been established. Kinetic and structural characterization is reported for the E97Q and E97D mutants of Plasmodium falciparum triosephosphate isomerase (Pf TIM). A 4000-fold reduction in k(cat) is observed for E97Q, whereas the E97D mutant shows a 100-fold reduction. The control mutant, E165A, which lacks the key catalytic base, shows an approximately 9000-fold drop in activity. The integrity of the overall fold and stability of the dimeric structure have been demonstrated by biophysical studies. Crystal structures of E97Q and E97D mutants have been determined at 2.0 angstrom resolution. In the case of the isosteric replacement of glutamic acid by glutamine in the E97Q mutant a large conformational change for the critical K12 side chain is observed, corresponding to a trans-to-gauche transition about the C gamma-C delta (chi(3)) bond. In the E97D mutant, the K12 side chain maintains the wild-type orientation, but the hydrogen bond between K12 and D97 is lost. The results are interpreted as a direct role for E97 in the catalytic proton transfer cycle. The proposed mechanism eliminates the need to invoke the formation of the energetically unfavourable imidazolate anion at H95, a key feature of the classical mechanism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The inherent temporal locality in memory accesses is filtered out by the L1 cache. As a consequence, an L2 cache with LRU replacement incurs significantly higher misses than the optimal replacement policy (OPT). We propose to narrow this gap through a novel replacement strategy that mimics the replacement decisions of OPT. The L2 cache is logically divided into two components, a Shepherd Cache (SC) with a simple FIFO replacement and a Main Cache (MC) with an emulation of optimal replacement. The SC plays the dual role of caching lines and guiding the replacement decisions in MC. Our pro- posed organization can cover 40% of the gap between OPT and LRU for a 2MB cache resulting in 7% overall speedup. Comparison with the dynamic insertion policy, a victim buffer, a V-Way cache and an LRU based fully associative cache demonstrates that our scheme performs better than all these strategies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ad hoc networks are being used in applications ranging from disaster recovery to distributed collaborative entertainment applications. Ad hoc networks have become one of the most attractive solution for rapid deployment of interconnecting large number of mobile personal devices. The user community of mobile personal devices are demanding a variety of value added multimedia entertainment services. The popularity of peer group is increasing and one or some members of the peer group need to send data to some or all members of the peer group. The increasing demand for group oriented value added services is driving for efficient multicast service over ad hoc networks. Access control mechanisms need to be deployed to provide guarantee that the unauthorized users cannot access the multicast content. In this paper, we present a topology aware key management and distribution scheme for secure overlay multicast over MANET to address node mobility related issues for multicast key management. We use overlay approach for key distribution and our objective is to keep communication overhead low for key management and distribution. We also incorporate reliability using explicit acknowledgments with the key distribution scheme. Through simulations we show that the proposed key management scheme has low communication overhead for rekeying and improves the reliability of key distribution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a technique for irreversible watermarking approach robust to affine transform attacks in camera, biomedical and satellite images stored in the form of monochrome bitmap images. The watermarking approach is based on image normalisation in which both watermark embedding and extraction are carried out with respect to an image normalised to meet a set of predefined moment criteria. The normalisation procedure is invariant to affine transform attacks. The result of watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. Here, direct-sequence code division multiple access approach is used to embed multibit text information in DCT and DWT transform domains. The proposed watermarking schemes are robust against various types of attacks such as Gaussian noise, shearing, scaling, rotation, flipping, affine transform, signal processing and JPEG compression. Performance analysis results are measured using image processing metrics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The region spanning residues 95-146 of the rotavirus nonstructural protein NSP4 from the asymptomatic human strain ST3 has been purified and crystallized and diffraction data have been collected to a resolution of 2.6 angstrom. Several attempts to solve the structure by the molecular-replacement method using the available tetrameric structures of this domain were unsuccessful despite a sequence identity of 73% to the already known structures. A more systematic approach with a dimer as the search model led to an unexpected pentameric structure using the program Phaser. The various steps involved in arriving at this molecular-replacement solution, which unravelled a case of subtle variation between different oligomeric states unknown at the time of solving the structure, are presented in this paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this article, we report the mechanical and biocompatibility properties of injection-molded high-density polyethylene (HDPE) composites reinforced with 40 wt % ceramic filler [hydroxyapatite (HA) and/or Al2O3] and 2 wt % titanate as a coupling agent. The mechanical property measurements revealed that a combination of a maximum tensile strength of 18.7 MPa and a maximum tensile modulus of about 855 MPa could be achieved with the injection-molded HDPE20 wt % HA20 wt % Al2O3 composites. For the same composite composition, the maximum compression strength was determined to be 71.6 MPa and the compression modulus was about 660 MPa. The fractrography study revealed the uniform distribution of ceramic fillers in the semicrystalline HDPE matrix. The cytocompatibility study with osteoblast-like SaOS2 cells confirmed extensive cell adhesion and proliferation on the injection-molded HDPE20 wt % HA20 wt % Al2O3 composites. The cell viability analysis with the 3(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide assay revealed a statistically significant difference between the injection-molded HDPE20 wt % HA20 wt % Al2O3 composites and sintered HA for various culture durations of upto 7 days. The difference in cytocompatibility properties among the biocomposites is explained in terms of the difference in the protein absorption behavior. (C) 2011 Wiley Periodicals, Inc. J Appl Polym Sci, 2012

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Grouping and coordination tactics for ground attack missions by a heterogeneous mix of reconnaissance, enemy suppression, and attack unmanned aerial vehicles (UAVs) is presented. Dubins' paths are used to determine the optimal number of attack UAVs and their positional and heading freedoms, as functions of weapon seeker range and field of view. A generic battlefield scenario with layered defense is created and the tactics are evaluated on a Group Flyer simulation platform for both nominal and off-nominal conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Indian region is presently the second region after the Neotropics in terms of diversity of phalangopsid crickets. Yet their study is impeded by the lack of necessary taxonomic tools for taxon identification. In the present paper, all generic diagnoses are clarified, using morphological and genitalic characters; female genitalia are described and illustrated for all genera with known females. New taxa are described from southern India: Kempiola flavipunctatus Desutter-Grandcolas n. sp., Opiliosina meridionalis Desutter-Grandcolas n. gen., n. sp., Phalangopsina bolivari Desutter-Grandcolas n. sp., P. chopardi Desutter-Grandcolas n. sp., P. gravelyi Desutter-Grandcolas n. sp., and Speluncasina Desutter-Grandcolas n. gen. The list of phalangopsid crickets from the Indian Region is updated, and a key to phalangopsid genera proposed. A lectotype and a paralectotype are designated to fix the name of Phalangopsina dubia (Bolivar, 1900). Opilionacris annandalei Chopard, 1928, previously transferred to the African genus Phaeophilacris Walker, 1871, is transferred to the genus Speluncasina Desutter-Grandcolas n. gen., while Larandopsis jharnae Bhowmik, 1981 and L. newguineae Bhowmik, 1981 described from New Guinea are transferred to the eneopterine genus Lebinthus Stal, 1877. Finally Luzaropsis confusa Chopard, 1969 is removed from its synonymy with L. ferruginea Walker, 1871.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving security in WSNs requires robust encryption and authentication standards among the sensor nodes. Severe resources constraints in typical Wireless Sensor nodes hinder them in achieving key agreements. It is proved from past studies that many notable key management schemes do not work well in sensor networks due to their limited capacities. The idea of key predistribution is not feasible considering the fact that the network could scale to millions. We prove a novel algorithm that provides robust and secure communication channel in WSNs. Our Double Encryption with Validation Time (DEV) using Key Management Protocol algorithm works on the basis of timed sessions within which a secure secret key remains valid. A mobile node is used to bootstrap and exchange secure keys among communicating pairs of nodes. Analysis and simulation results show that the performance of the DEV using Key Management Protocol Algorithm is better than the SEV scheme and other related work.