62 resultados para ”we” identity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the structure constants of the N = 1 beta deformed theory perturbatively and at strong coupling. We show that the planar one loop corrections to the structure constants of single trace gauge invariant operators in the scalar sector is determined by the anomalous dimension Hamiltonian. This result implies that 3 point functions of the chiral primaries of the theory do not receive corrections at one loop. We then study the structure constants at strong coupling using the Lunin-Maldacena geometry. We explicitly construct the supergravity mode dual to the chiral primary with three equal U(1) R-charges in the Lunin-Maldacena geometry. We show that the 3 point function of this supergravity mode with semi-classical states representing two other similar chiral primary states but with large U(1) charges to be independent of the beta deformation and identical to that found in the AdS(5) x S-5 geometry. This together with the one-loop result indicate that these structure constants are protected by a non-renormalization theorem. We also show that three point function of U(1) R-currents with classical massive strings is proportional to the R-charge carried by the string solution. This is in accordance with the prediction of the R-symmetry Ward identity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The analytic signal (AS) was proposed by Gabor as a complex signal corresponding to a given real signal. The AS has a one-sided spectrum and gives rise to meaningful spectral averages. The Hilbert transform (HT) is a key component in Gabor's AS construction. We generalize the construction methodology by employing the fractional Hilbert transform (FrHT), without going through the standard fractional Fourier transform (FrFT) route. We discuss some properties of the fractional Hilbert operator and show how decomposition of the operator in terms of the identity and the standard Hilbert operators enables the construction of a family of analytic signals. We show that these analytic signals also satisfy Bedrosian-type properties and that their time-frequency localization properties are unaltered. We also propose a generalized-phase AS (GPAS) using a generalized-phase Hilbert transform (GPHT). We show that the GPHT shares many properties of the FrHT, in particular, selective highlighting of singularities, and a connection with Lie groups. We also investigate the duality between analyticity and causality concepts to arrive at a representation of causal signals in terms of the FrHT and GPHT. On the application front, we develop a secure multi-key single-sideband (SSB) modulation scheme and analyze its performance in noise and sensitivity to security key perturbations. (C) 2013 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we propose a novel authentication protocol for MANETs requiring stronger security. The protocol works on a two-tier network architecture with client nodes and authentication server nodes, and supports dynamic membership. We use an external membership granting server (MGS) to provide stronger security with dynamic membership. However, the external MGS in our protocol is semi-online instead of being online, i.e., the MGS cannot initiate a connection with a network node but any network node can communicate with the MGS whenever required. To ensure efficiency, the protocol uses symmetric key cryptography to implement the authentication service. However, to achieve storage scalability, the protocol uses a pseudo random function (PRF) to bind the secret key of a client to its identity using the secret key of its server. In addition, the protocol possesses an efficient server revocation mechanism along with an efficient server re-assignment mechanism, which makes the protocol robust against server node compromise.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The basic requirements for secure communication in a vehicular ad hoc network (VANET) are anonymous authentication with source non-repudiation and integrity. The existing security protocols in VANETs do not differentiate between the anonymity requirements of different vehicles and the level of anonymity provided by these protocols is the same for all the vehicles in a network. To provide high level of anonymity, the resource requirements of security protocol would also be high. Hence, in a resource constrained VANET, it is necessary to differentiate between the anonymity requirements of different vehicles and to provide the level of anonymity to a vehicle as per its requirement. In this paper, we have proposed a novel protocol for authentication which can provide multiple levels of anonymity in VANETs. The protocol makes use of identity based signature mechanism and pseudonyms to implement anonymous authentication with source non-repudiation and integrity. By controlling the number of pseudonyms issued to a vehicle and the lifetime of each pseudonym for a vehicle, the protocol is able to control the level of anonymity provided to a vehicle. In addition, the protocol includes a novel pseudonym issuance policy using which the protocol can ensure the uniqueness of a newly generated pseudonym by checking only a very small subset of the set of pseudonyms previously issued to all the vehicles. The protocol cryptographically binds an expiry date to each pseudonym, and in this way, enforces an implicit revocation for the pseudonyms. Analytical and simulation results confirm the effectiveness of the proposed protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Specification of the centromere location in most eukaryotes is not solely dependent on the DNA sequence. However, the non-genetic determinants of centromere identity are not clearly defined. While multiple mechanisms, individually or in concert, may specify centromeres epigenetically, most studies in this area are focused on a universal factor, a centromere-specific histone H3 variant CENP-A, often considered as the epigenetic determinant of centromere identity. In spite of variable timing of its loading at centromeres across species, a replication coupled early S phase deposition of CENP-A is found in most yeast centromeres. Centromeres are the earliest replicating chromosomal regions in a pathogenic budding yeast Candida albicans. Using a 2-dimensional agarose gel electrophoresis assay, we identify replication origins (ORI7-LI and ORI7-RI) proximal to an early replicating centromere (CEN7) in C. albicans. We show that the replication forks stall at CEN7 in a kinetochore dependent manner and fork stalling is reduced in the absence of the homologous recombination (HR) proteins Rad51 and Rad52. Deletion of ORI7-RI causes a significant reduction in the stalled fork signal and an increased loss rate of the altered chromosome 7. The HR proteins, Rad51 and Rad52, have been shown to play a role in fork restart. Confocal microscopy shows declustered kinetochores in rad51 and rad52 mutants, which are evidence of kinetochore disintegrity. CENP-A(CaCse4) levels at centromeres, as determined by chromatin immunoprecipitation (ChIP) experiments, are reduced in absence of Rad51/Rad52 resulting in disruption of the kinetochore structure. Moreover, western blot analysis reveals that delocalized CENP-A molecules in HR mutants degrade in a similar fashion as in other kinetochore mutants described before. Finally, co-immunoprecipitation assays indicate that Rad51 and Rad52 physically interact with CENP-A(CaCse4) in vivo. Thus, the HR proteins Rad51 and Rad52 epigenetically maintain centromere functioning by regulating CENP-A(CaCse4) levels at the programmed stall sites of early replicating centromeres.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The primary role of substituted side chains in organic semiconductors is to increase their solubility in common organic solvents. In the recent past, many literature reports have suggested that the side chains play a critical role in molecular packing and strongly impact the charge transport properties of conjugated polymers. In this work, we have investigated the influence of side-chains on the charge transport behavior of a novel class of diketopyrrolopyrrole (DPP) based alternating copolymers. To investigate the role of side-chains, we prepared four diketopyrrolopyrrole-diketopyrrolopyrrole (DPP-DPP) conjugated polymers with varied side-chains and carried out a systematic study of thin film microstructure and charge transport properties in polymer thin-film transistors (PTFTs). Combining results obtained from grazing incidence X-ray diffraction (GIXD) and charge transport properties in PTFTs, we conclude side-chains have a strong influence on molecular packing, thin film microstructure, and the charge carrier mobility of DPP-DPP copolymers. However, the influence of side-chains on optical properties was moderate. The preferential ``edge-on'' packing and dominant n-channel behavior with exceptionally high field-effect electron mobility values of >1 cm(2) V-1 s(-1) were observed by incorporating hydrophilic (triethylene glycol) and hydrophobic side-chains of alternate DPP units. In contrast moderate electron and hole mobilities were observed by incorporation of branched hydrophobic side-chains. This work clearly demonstrates that the subtle balance between hydrophobicity and hydrophilicity induced by side-chains is a powerful strategy to alter the molecular packing and improve the ambipolar charge transport properties in DPP-DPP based conjugated polymers. Theoretical analysis supports the conclusion that the side-chains influence polymer properties through morphology changes, as there is no effect on the electronic properties in the gas phase. The exceptional electron mobility is at least partially a result of the strong intramolecular conjugation of the donor and acceptor as evidenced by the unusually wide conduction band of the polymer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since its induction, the selective-identity (sID) model for identity-based cryptosystems and its relationship with various other notions of security has been extensively studied. As a result, it is a general consensus that the sID model is much weaker than the full-identity (ID) model. In this paper, we study the sID model for the particular case of identity-based signatures (IBS). The main focus is on the problem of constructing an ID-secure IBS given an sID-secure IBS without using random oracles-the so-called standard model-and with reasonable security degradation. We accomplish this by devising a generic construction which uses as black-box: i) a chameleon hash function and ii) a weakly-secure public-key signature. We argue that the resulting IBS is ID-secure but with a tightness gap of O(q(s)), where q(s) is the upper bound on the number of signature queries that the adversary is allowed to make. To the best of our knowledge, this is the first attempt at such a generic construction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Inference of molecular function of proteins is the fundamental task in the quest for understanding cellular processes. The task is getting increasingly difficult with thousands of new proteins discovered each day. The difficulty arises primarily due to lack of high-throughput experimental technique for assessing protein molecular function, a lacunae that computational approaches are trying hard to fill. The latter too faces a major bottleneck in absence of clear evidence based on evolutionary information. Here we propose a de novo approach to annotate protein molecular function through structural dynamics match for a pair of segments from two dissimilar proteins, which may share even <10% sequence identity. To screen these matches, corresponding 1 mu s coarse-grained (CG) molecular dynamics trajectories were used to compute normalized root-mean-square-fluctuation graphs and select mobile segments, which were, thereafter, matched for all pairs using unweighted three-dimensional autocorrelation vectors. Our in-house custom-built forcefield (FF), extensively validated against dynamics information obtained from experimental nuclear magnetic resonance data, was specifically used to generate the CG dynamics trajectories. The test for correspondence of dynamics-signature of protein segments and function revealed 87% true positive rate and 93.5% true negative rate, on a dataset of 60 experimentally validated proteins, including moonlighting proteins and those with novel functional motifs. A random test against 315 unique fold/function proteins for a negative test gave >99% true recall. A blind prediction on a novel protein appears consistent with additional evidences retrieved therein. This is the first proof-of-principle of generalized use of structural dynamics for inferring protein molecular function leveraging our custom-made CG FF, useful to all. (C) 2014 Wiley Periodicals, Inc.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

LDPC codes can be constructed by tiling permutation matrices that belong to the square root of identity type and similar algebraic structures. We investigate into the properties of such codes. We also present code structures that are amenable for efficient encoding.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We set up the theory of newforms of half-integral weight on Gamma(0)(8N) and Gamma(0)(16N), where N is odd and squarefree. Further, we extend the definition of the Kohnen plus space in general for trivial character and also study the theory of newforms in the plus spaces on Gamma(0)(8N), Gamma(0)(16N), where N is odd and squarefree. Finally, we show that the Atkin-Lehner W-operator W-4 acts as the identity operator on S-2k(new)(4N), where N is odd and squarefree. This proves that S-2k(-)(4) = S-2k(4).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several papers have studied fault attacks on computing a pairing value e(P, Q), where P is a public point and Q is a secret point. In this paper, we observe that these attacks are in fact effective only on a small number of pairing-based protocols, and that too only when the protocols are implemented with specific symmetric pairings. We demonstrate the effectiveness of the fault attacks on a public-key encryption scheme, an identity-based encryption scheme, and an oblivious transfer protocol when implemented with a symmetric pairing derived from a supersingular elliptic curve with embedding degree 2.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rotations in depth are challenging for object vision because features can appear, disappear, be stretched or compressed. Yet we easily recognize objects across views. Are the underlying representations view invariant or dependent? This question has been intensely debated in human vision, but the neuronal representations remain poorly understood. Here, we show that for naturalistic objects, neurons in the monkey inferotemporal (IT) cortex undergo a dynamic transition in time, whereby they are initially sensitive to viewpoint and later encode view-invariant object identity. This transition depended on two aspects of object structure: it was strongest when objects foreshortened strongly across views and were similar to each other. View invariance in IT neurons was present even when objects were reduced to silhouettes, suggesting that it can arise through similarity between external contours of objects across views. Our results elucidate the viewpoint debate by showing that view invariance arises dynamically in IT neurons out of a representation that is initially view dependent.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The power of X-ray crystal structure analysis as a technique is to `see where the atoms are'. The results are extensively used by a wide variety of research communities. However, this `seeing where the atoms are' can give a false sense of security unless the precision of the placement of the atoms has been taken into account. Indeed, the presentation of bond distances and angles to a false precision (i.e. to too many decimal places) is commonplace. This article has three themes. Firstly, a basis for a proper representation of protein crystal structure results is detailed and demonstrated with respect to analyses of Protein Data Bank entries. The basis for establishing the precision of placement of each atom in a protein crystal structure is non-trivial. Secondly, a knowledge base harnessing such a descriptor of precision is presented. It is applied here to the case of salt bridges, i.e. ion pairs, in protein structures; this is the most fundamental place to start with such structure-precision representations since salt bridges are one of the tenets of protein structure stability. Ion pairs also play a central role in protein oligomerization, molecular recognition of ligands and substrates, allosteric regulation, domain motion and alpha-helix capping. A new knowledge base, SBPS (Salt Bridges in Protein Structures), takes these structural precisions into account and is the first of its kind. The third theme of the article is to indicate natural extensions of the need for such a description of precision, such as those involving metalloproteins and the determination of the protonation states of ionizable amino acids. Overall, it is also noted that this work and these examples are also relevant to protein three-dimensional structure molecular graphics software.