56 resultados para Key policies
Resumo:
This paper addresses the problem of finding outage-optimal power control policies for wireless energy harvesting sensor (EHS) nodes with automatic repeat request (ARQ)-based packet transmissions. The power control policy of the EHS specifies the transmission power for each packet transmission attempt, based on all the information available at the EHS. In particular, the acknowledgement (ACK) or negative acknowledgement (NACK) messages received provide the EHS with partial information about the channel state. We solve the problem of finding an optimal power control policy by casting it as a partially observable Markov decision process (POMDP). We study the structure of the optimal power policy in two ways. First, for the special case of binary power levels at the EHS, we show that the optimal policy for the underlying Markov decision process (MDP) when the channel state is observable is a threshold policy in the battery state. Second, we benchmark the performance of the EHS by rigorously analyzing the outage probability of a general fixed-power transmission scheme, where the EHS uses a predetermined power level at each slot within the frame. Monte Carlo simulation results illustrate the performance of the POMDP approach and verify the accuracy of the analysis. They also show that the POMDP solutions can significantly outperform conventional ad hoc approaches.
Resumo:
In this paper, we have proposed a novel certificate-less on-demand public key management (CLPKM) protocol for self-organized MANETs. The protocol works on flat network architecture, and distinguishes between authentication layer and routing layer of the network. We put an upper limit on the length of verification route and use the end-to-end trust value of a route to evaluate its strength. The end-to-end trust value is used by the protocol to select the most trusted verification route for accomplishing public key verification. Also, the protocol uses MAC function instead of RSA certificates to perform public key verification. By doing this, the protocol saves considerable computation power, bandwidth and storage space. The saved storage space is utilized by the protocol to keep a number of pre-established routes in the network nodes, which helps in reducing the average verification delay of the protocol. Analysis and simulation results confirm the effectiveness of the proposed protocol.
Resumo:
Diaminopropionate ammonialyase (DAPAL), a fold-typeII pyridoxal 5-phosphate-dependent enzyme, catalyzes the ,-elimination of diaminopropionate (DAP) to pyruvate and ammonia. DAPAL was able to utilize both d- and l-DAP as substrates with almost equal efficiency. Mutational analysis of functionally important residues such as Thr385, Asp125 and Asp194 was carried out to understand the mechanism by which the isomers are hydrolyzed. Further, the putative residues involved in the formation of disulfide bond Cys271 and Cys299 were also mutated. T385S, T385D sDAPAL were as active with dl-DAP as substrate as sDAPAL, whereas the later exhibited a threefold increase in catalytic efficiency with d-Ser as substrate. Further analysis of these mutants suggested that DAPAL might follow an anti-E-2 mechanism of catalysis that does not involve the formation of a quinonoid intermediate. Of the two mutants of Asp125, D125E showed complete loss of activity with d-DAP as substrate, whereas the reaction with l-DAP was not affected significantly, demonstrating that Asp125 was essential for abstraction of protons from the d-isomer. By contrast, mutational analysis of Asp194 showed that the residue may not be directly involved in proton abstraction from l-DAP. sDAPAL does not form a disulfide bond in solution, although the position of Cys299 and Cys271 in the modeled structure of sDAPAL favored the formation of a disulfide bond. Further, unlike eDAPAL, sDAPAL could be activated by monovalent cations. Mutation of the cysteine residues showed that Cys271 may be involved in coordinating the monovalent cation, as observed in the case of other fold-typeII enzymes.
Resumo:
Mobile nodes observing correlated data communicate using an insecure bidirectional switch to generate a secret key, which must remain concealed from the switch. We are interested in fault-tolerant secret key rates, i.e., the rates of secret key generated even if a subset of nodes drop out before the completion of the communication protocol. We formulate a new notion of fault-tolerant secret key capacity, and present an upper bound on it. This upper bound is shown to be tight when the random variables corresponding to the observations of nodes are exchangeable. Further, it is shown that one round of interaction achieves the fault-tolerant secret key capacity in this case. The upper bound is also tight for the case of a pairwise independent network model consisting of a complete graph, and can be attained by a noninteractive protocol.
Resumo:
Two atmospheric inversions (one fine-resolved and one process-discriminating) and a process-based model for land surface exchanges are brought together to analyse the variations of methane emissions from 1990 to 2009. A focus is put on the role of natural wetlands and on the years 2000-2006, a period of stable atmospheric concentrations. From 1990 to 2000, the top-down and bottom-up visions agree on the time-phasing of global total and wetland emission anomalies. The process-discriminating inversion indicates that wetlands dominate the time-variability of methane emissions (90% of the total variability). The contribution of tropical wetlands to the anomalies is found to be large, especially during the post-Pinatubo years (global negative anomalies with minima between -41 and -19 Tg yr(-1) in 1992) and during the alternate 1997-1998 El-Nino/1998-1999 La-Nina (maximal anomalies in tropical regions between +16 and +22 Tg yr(-1) for the inversions and anomalies due to tropical wetlands between +12 and +17 Tg yr(-1) for the process-based model). Between 2000 and 2006, during the stagnation of methane concentrations in the atmosphere, the top-down and bottom-up approaches agree on the fact that South America is the main region contributing to anomalies in natural wetland emissions, but they disagree on the sign and magnitude of the flux trend in the Amazon basin. A negative trend (-3.9 +/- 1.3 Tg yr(-1)) is inferred by the process-discriminating inversion whereas a positive trend (+1.3 +/- 0.3 Tg yr(-1)) is found by the process model. Although processed-based models have their own caveats and may not take into account all processes, the positive trend found by the B-U approach is considered more likely because it is a robust feature of the process-based model, consistent with analysed precipitations and the satellite-derived extent of inundated areas. On the contrary, the surface-data based inversions lack constraints for South America. This result suggests the need for a re-interpretation of the large increase found in anthropogenic methane inventories after 2000.
Resumo:
In this paper we consider a single discrete time queue with infinite buffer. The channel may experience fading. The transmission rate is a linear function of power used for transmission. In this scenario we explicitly obtain power control policies which minimize mean power and/or mean delay. There may also be peak power constraint.
Resumo:
Insulin like growth factor binding protein 4 (IGFBP4) regulates growth and development of tissues and organs by negatively regulating IGF signaling. Among most cancers, IGFBP4 has growth inhibitory role and reported as a down-regulated gene, except for renal cell carcinoma, wherein IGFBP4 promotes tumor progression. IGFBP4 expression has been shown to be higher in increasing grades of astrocytoma. However, the functional role of IGFBP4 in gliomas has not been explored. Surgical biopsies of 20 normal brain and 198 astrocytoma samples were analyzed for IGFBP4 expression by qRT-PCR. Highest expression of IGFBP4 mRNA was seen in GBM tumors compared to control brain tissues (median log2 of 2.035, p < 0.0001). Immunohistochemical analysis of 53 tissue samples revealed predominant nuclear staining of IGFBP4, seen maximally in GBMs when compared to DA and AA tumors (median LI = 29.12 +/- A 16.943, p < 0.001). Over expression of IGFBP4 in U343 glioma cells resulted in up-regulation of molecules involved in tumor growth, EMT and invasion such as pAkt, pErk, Vimentin, and N-cadherin and down-regulation of E-cadherin. Functionally, IGFBP4 over expression in these cells resulted in increased proliferation, migration and invasion as assessed by MTT, transwell migration, and Matrigel invasion assays. These findings were confirmed upon IGFBP4 knockdown in U251 glioma cells. Our data suggest a pro-tumorigenic role for IGFBP4 in glioma.
Resumo:
The world is in the midst of a biodiversity crisis, threatening essential goods and services on which humanity depends. While there is an urgent need globally for biodiversity research, growing obstacles are severely limiting biodiversity research throughout the developing world, particularly in Southeast Asia. Facilities, funding, and expertise are often limited throughout this region, reducing the capacity for local biodiversity research. Although western scientists generally have more expertise and capacity, international research has sometimes been exploitative ``parachute science,'' creating a culture of suspicion and mistrust. These issues, combined with misplaced fears of biopiracy, have resulted in severe roadblocks to biodiversity research in the very countries that need it the most. Here, we present an overview of challenges to biodiversity research and case studies that provide productive models for advancing biodiversity research in developing countries. Key to success is integration of research and education, a model that fosters sustained collaboration by focusing on the process of conducting biodiversity research as well as research results. This model simultaneously expands biodiversity research capacity while building trust across national borders. It is critical that developing countries enact policies that protect their biodiversity capital without shutting down international and local biodiversity research that is essential to achieve the long-term sustainability of biodiversity, promoting food security and economic development.
Resumo:
Energy harvesting sensor nodes are gaining popularity due to their ability to improve the network life time and are becoming a preferred choice supporting green communication. In this paper, we focus on communicating reliably over an additive white Gaussian noise channel using such an energy harvesting sensor node. An important part of this paper involves appropriate modeling of energy harvesting, as done via various practical architectures. Our main result is the characterization of the Shannon capacity of the communication system. The key technical challenge involves dealing with the dynamic (and stochastic) nature of the (quadratic) cost of the input to the channel. As a corollary, we find close connections between the capacity achieving energy management policies and the queueing theoretic throughput optimal policies.
Self-organized public key management in MANETs with enhanced security and without certificate-chains
Resumo:
In the self-organized public key management approaches, public key verification is achieved through verification routes constituted by the transitive trust relationships among the network principals. Most of the existing approaches do not distinguish among different available verification routes. Moreover, to ensure stronger security, it is important to choose an appropriate metric to evaluate the strength of a route. Besides, all of the existing self-organized approaches use certificate-chains for achieving authentication, which are highly resource consuming. In this paper, we present a self-organized certificate-less on-demand public key management (CLPKM) protocol, which aims at providing the strongest verification routes for authentication purposes. It restricts the compromise probability for a verification route by restricting its length. Besides, we evaluate the strength of a verification route using its end-to-end trust value. The other important aspect of the protocol is that it uses a MAC function instead of RSA certificates to perform public key verifications. By doing this, the protocol saves considerable computation power, bandwidth and storage space. We have used an extended strand space model to analyze the correctness of the protocol. The analytical, simulation, and the testbed implementation results confirm the effectiveness of the proposed protocol. (c) 2014 Elsevier B.V. All rights reserved.
Resumo:
Introduction: Immunomodulators are agents, which can modulate the immune response to specific antigens, while causing least toxicity to the host system. Being part of the modern vaccine formulations, these compounds have contributed remarkably to the field of therapeutics. Despite the successful record maintained by these agents, the requirement of novel immunomodulators keeps increasing due to the increasing severity of diseases. Hence, research regarding the same holds great importance. Areas covered: In this review, we discuss the role of immunomodulators in improving performance of various vaccines used for counteracting most threatening infectious diseases, mechanisms behind their action and criteria for development of novel immunomodulators. Expert opinion: Understanding the molecular mechanisms underlying immune response is a prerequisite for development of effective therapeutics as these are often exploited by pathogens for their own propagation. Keeping this in mind, the present research in the field of immunotherapy focuses on developing immunomodulators that would not only enhance the protection against pathogen, but also generate a long-term memory response. With the introduction of advanced formulations including combination of different kinds of immunomodulators, one can expect tremendous success in near future.
Resumo:
The agriculture, forestry and other land use (AFOLU) sector is responsible for approximately 25% of anthropogenic GHG emissions mainly from deforestation and agricultural emissions from livestock, soil and nutrient management. Mitigation from the sector is thus extremely important in meeting emission reduction targets. The sector offers a variety of cost-competitive mitigation options with most analyses indicating a decline in emissions largely due to decreasing deforestation rates. Sustainability criteria are needed to guide development and implementation of AFOLU mitigation measures with particular focus on multifunctional systems that allow the delivery of multiple services from land. It is striking that almost all of the positive and negative impacts, opportunities and barriers are context specific, precluding generic statements about which AFOLU mitigation measures have the greatest promise at a global scale. This finding underlines the importance of considering each mitigation strategy on a case-by-case basis, systemic effects when implementing mitigation options on the national scale, and suggests that policies need to be flexible enough to allow such assessments. National and international agricultural and forest (climate) policies have the potential to alter the opportunity costs of specific land uses in ways that increase opportunities or barriers for attaining climate change mitigation goals. Policies governing practices in agriculture and in forest conservation and management need to account for both effective mitigation and adaptation and can help to orient practices in agriculture and in forestry towards global sharing of innovative technologies for the efficient use of land resources. Different policy instruments, especially economic incentives and regulatory approaches, are currently being applied however, for its successful implementation it is critical to understand how land-use decisions are made and how new social, political and economic forces in the future will influence this process.
Resumo:
We consider a setting in which a single item of content is disseminated in a population of mobile nodes by opportunistic copying when pairs of nodes come in radio contact. The nodes in the population may either be interested in receiving the content (referred to as destinations) or not yet interested in receiving the content (referred to as relays). We consider a model for the evolution of popularity, the process by which relays get converted into destinations. A key contribution of our work is to model and study the joint evolution of content popularity and its spread in the population. Copying the content to relay nodes is beneficial since they can help spread the content to destinations, and could themselves be converted into destinations. We derive a fluid limit for the joint evolution model and obtain optimal policies for copying to relay nodes in order to deliver content to a desired fraction of destinations, while limiting the fraction of relay nodes that get the content but never turn into destinations. We prove that a time-threshold policy is optimal for controlling the copying to relays, i.e., there is an optimal time-threshold up to which all opportunities for copying to relays are exploited, and after which relays are not copied to. We then utilize simulations and numerical evaluations to provide insights into the effects of various system parameters on the optimally controlled co-evolution model.
Resumo:
Key aspects of Organic Photovoltaics (OPVs) have been reviewed in this tutorial. Issues pertaining to the choice of materials, fabrication processes, photophysical mechanisms, device characterization, morphology of active layers and manufacturing are discussed. Special emphasis has been given to recent developments in large-area modules. Current strategies in enhancing the performance using external optical engineering approaches have also been highlighted. OPVs as a technology combine low weight, flexibility, low cost, good form factor and high-throughput processing; making them a promising PV technology for the future.
Resumo:
Blends of bromo-terminated polystyrene (PS-Br) and poly(vinyl methylether) (PVME) exhibit lower critical solution temperatures. In this study, PS-Br was designed by atom transfer radical polymerization and was converted to thiol-capped polystyrene (PS-SH) by reacting with thiourea. The silver nanoparticles (nAg) were then decorated with covalently bound PS-SH macromolecules to improve the phase miscibility in the PS-Br-PVME blends. Thermally induced demixing in this model blend was followed in the presence of polystyrene immobilized silver nanoparticles (PS-g-nAg). The graft density of the PS macromolecules was estimated to be ca. 0.78 chains per nm(2). Although the matrix and the grafted molecular weights were similar, PS-g-nAg particles were expelled from the PS phase and were localized in the PVME phase of the blends. This was addressed with respect to intermediate graft density and favourable PS-PVME contacts from microscopic interactions point of view. Interestingly, blends with 0.5 wt% PS-g-nAg delayed the spinodal decomposition temperature in the blends by ca. 18 degrees C with respect to the control blends. The scale of cooperativity, as determined by differential scanning calorimetry, increased only marginally in the case of PS-g-nAg; however, it increased significantly in the presence of bare nAg particles.