104 resultados para electronic communication
Resumo:
Through-bond interactions in 1,4-dehydrobenzene preferentially stabilize the out-of-phase combination of the radical hydrids, The resultant splitting between the frontier orbitals is crucial in making Bergman cyclization a symmetry-allowed process. Orbital symmetry also inhibits the radical centers from forming a C-C bond, enabling the biradical to survive as a local minimum capable of intermolecular hydrogen abstraction, Both these factors, which are important in the design of DNA cleaving molecules, are confirmed through calculations on biradicals formed from diynes in which through-bond interactions stabilize the in-phase combination of hybrids at the radical centers.
Resumo:
A survey of the literature on lanthanide coordination compounds reveals that ligands involving ether oxygens as donor atoms have received very little attention [ 11. Only recently have the complexes of lanthanides with cyclic polyethers been characterized [l-3]. We report in this communication that interaction of rareearth perchlorates with two new ligands namely N,N,N’,N’-tetramethyl-u-carboxamido-Oanisamide (TMCA) and N,N’-di-t-butyl-crcarboxamido- 0-anisamide (DTBCA). The two ligands are potentially tridentate possessing two amide moieties and an ether linkage in between. The isolated complexes have been characterized by analysis, electrolytic conductance, infrared and electronic spectra. The ‘H and “C NMR spectra for the diamagnetic La3+ and Y3+ complexes are also discussed.
Resumo:
Homodimeric protein tryptophanyl tRNA synthetase (TrpRS) has a Rossmann fold domain and belongs to the 1c subclass of aminoacyl tRNA synthetases. This enzyme performs the function of acylating the cognate tRNA. This process involves a number of molecules (2 protein subunits, 2 tRNAs and 2 activated Trps) and thus it is difficult to follow the complex steps in this process. Structures of human TrpRS complexed with certain ligands are available. Based on structural and biochemical data, mechanism of activation of Trp has been speculated. However, no structure has yet been solved in the presence of both the tRNA(Trp) and the activated Trp (TrpAMP). In this study, we have modeled the structure of human TrpRS bound to the activated ligand and the cognate tRNA. In addition, we have performed molecular dynamics (MD) simulations on these models as well as other complexes to capture the dynamical process of ligand induced conformational changes. We have analyzed both the local and global changes in the protein conformation from the protein structure network (PSN) of MD snapshots, by a method which was recently developed in our laboratory in the context of the functionally monomeric protein, methionyl tRNA synthetase. From these investigations, we obtain important information such as the ligand induced correlation between different residues of this protein, asymmetric binding of the ligands to the two subunits of the protein as seen in the crystal structure analysis, and the path of communication between the anticodon region and the aminoacylation site. Here we are able to elucidate the role of dimer interface at a level of detail, which has not been captured so far.
Resumo:
First-principles calculations were performed for orthorhombic HgO, rhombohedral and cubic phases of HgTiO3 (HTO) and HgPbO3 (HPO). The calculations show that in the rhombohedral phase HTO is a direct gap insulator with a gap of ~1.6 eV. The rhombohedral phase of HPO, on the other hand, shows a weak metallic character. The results provide an explanation for the electrical properties of these compounds. The cubic phases of HTO and HPO are invariably metallic in nature, thereby suggesting that for HTO the rhombohedral–cubic transition must also be accompanied by a change in the electrical state. Examination of the electronic density of states of these systems revealed no significant on-site mixing of Hg 5d and Hg 6s states in any of these materials.
Resumo:
The reaction of the [(eta(5)-C5Me5)MoCl4] complex with [LiBH4 - TH F] in toluene at - 70 degrees C, followed by pyrolysis at 110 degrees C, afforded dark brown [(eta(5)-C5Me5Mo)(3)MoB9H18], 2, in parallel with the known [(eta(5)-C5Me5Mo)(2)B5H9], 1. Compound 2 has been characterized in solution by H-1, B-11, and C-13 NMR spectroscopy and elemental analysis, and the structural types were unequivocally established by crystallographic studies. The title compound represents a novel class of vertex-fused clusters in which a Mo atom has been fused in a perpendicular fashion between two molybdaborane clusters. Electronic structure calculations employing density functional theory yield geometries in agreement with the structure determinations, and on grounds of density functional theory calculations, we have analyzed the bonding patterns in the structure,
Resumo:
In this paper we have proposed and implemented a joint Medium Access Control (MAC) -cum- Routing scheme for environment data gathering sensor networks. The design principle uses node 'battery lifetime' maximization to be traded against a network that is capable of tolerating: A known percentage of combined packet losses due to packet collisions, network synchronization mismatch and channel impairments Significant end-to-end delay of an order of few seconds We have achieved this with a loosely synchronized network of sensor nodes that implement Slotted-Aloha MAC state machine together with route information. The scheme has given encouraging results in terms of energy savings compared to other popular implementations. The overall packet loss is about 12%. The battery life time increase compared to B-MAC varies from a minimum of 30% to about 90% depending on the duty cycle.
Resumo:
A compact model for noise margin (NM) of single-electron transistor (SET) logic is developed, which is a function of device capacitances and background charge (zeta). Noise margin is, then, used as a metric to evaluate the robustness of SET logic against background charge, temperature, and variation of SET gate and tunnel junction capacitances (CG and CT). It is shown that choosing alpha=CT/CG=1/3 maximizes the NM. An estimate of the maximum tolerable zeta is shown to be equal to plusmn0.03 e. Finally, the effect of mismatch in device parameters on the NM is studied through exhaustive simulations, which indicates that a isin [0.3, 0.4] provides maximum robustness. It is also observed that mismatch can have a significant impact on static power dissipation.
Resumo:
Classical and non-classical isomers of both neutral and dianionic BC2P2H3 species, which are isolobal to Cp+ and Cp-, are studied at both B3LYP/6-311++G(d,p) and G3B3 levels of theory. The global minimum structure given by B3LYP/6-311+ + G(d,p) for BC2P2H3 is based on a vinylcyclopropenyl-type structure, whereas BC2P2H32- has a planar aromatic cyclopentadienyl-ion-like structure. However, at the G3B3 level, there are three low-energy isomers for BC2P2H3: 1)tricyclopentane, 2) nido and 3) vinylcyclopropenyl-type structures, all within 1.7 kcal mol(-1) of each other. On the contrary, for the dianionic species the cyclic planar structure is still the minimum. In comparison to the isolobal Cp+ and HnCnP5-n+ isomers, BC2P2H3 shows a competition between pi-delocalised vinylcyclopropenyl- and cluster-type structures (nido and tricyclopentane). Substitution of H on C by tBu, and H on B by Ph, in BC2P2H3 increases the energy difference between the low-lying isomers, giving the lowest energy structure as a tricyclopentane type. Similar substitution in BC2P2H32- merely favours different positional isomers of the cyclic planar geometry, as observed in 1) isoelectronic neutral heterodiphospholes EtBu2C2P2 (E=S, Se, Te), 2) monoanionic heterophospholyl rings EtBu2C2P2 (E=P-, As-, Sb-) and 3) polyphospholyl rings anions tBu(5-n)C(n)P(5-n) (n=0-5). The principal factors that affect the stability of three-, four-, and five-membered ring and acyclic geometrical and positional isomers of neutral and dianionic BC2P2H3 isomers appear to be: 1) relative bond strengths, 2) availability of electrons for the empty 2p boron orbital and 3) steric effects of the tBu groups in the HBC(2)P(2)tBu(2) systems.
Resumo:
The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abuses in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as Activity-Event-Symptoms(AES) model for detecting fraud and intrusion attacks which appears during payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs during mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.
Resumo:
In this paper, we propose a new security metric for measuring resilience of a symmetric key distribution scheme in wireless sensor network. A polynomial-based and a novel complete connectivity schemes are proposed and an analytical comparison, in terms of security and connectivity, between the schemes is shown. Motivated by the schemes, we derive general expressions for security and connectivity. A number of conclusions are made using these general expressions.
Resumo:
In this paper, we exploit the idea of decomposition to match buyers and sellers in an electronic exchange for trading large volumes of homogeneous goods, where the buyers and sellers specify marginal-decreasing piecewise constant price curves to capture volume discounts. Such exchanges are relevant for automated trading in many e-business applications. The problem of determining winners and Vickrey prices in such exchanges is known to have a worst-case complexity equal to that of as many as (1 + m + n) NP-hard problems, where m is the number of buyers and n is the number of sellers. Our method proposes the overall exchange problem to be solved as two separate and simpler problems: 1) forward auction and 2) reverse auction, which turns out to be generalized knapsack problems. In the proposed approach, we first determine the quantity of units to be traded between the sellers and the buyers using fast heuristics developed by us. Next, we solve a forward auction and a reverse auction using fully polynomial time approximation schemes available in the literature. The proposed approach has worst-case polynomial time complexity. and our experimentation shows that the approach produces good quality solutions to the problem. Note to Practitioners- In recent times, electronic marketplaces have provided an efficient way for businesses and consumers to trade goods and services. The use of innovative mechanisms and algorithms has made it possible to improve the efficiency of electronic marketplaces by enabling optimization of revenues for the marketplace and of utilities for the buyers and sellers. In this paper, we look at single-item, multiunit electronic exchanges. These are electronic marketplaces where buyers submit bids and sellers ask for multiple units of a single item. We allow buyers and sellers to specify volume discounts using suitable functions. Such exchanges are relevant for high-volume business-to-business trading of standard products, such as silicon wafers, very large-scale integrated chips, desktops, telecommunications equipment, commoditized goods, etc. The problem of determining winners and prices in such exchanges is known to involve solving many NP-hard problems. Our paper exploits the familiar idea of decomposition, uses certain algorithms from the literature, and develops two fast heuristics to solve the problem in a near optimal way in worst-case polynomial time.
Resumo:
Autonomous mission control, unlike automatic mission control which is generally pre-programmed to execute an intended mission, is guided by the philosophy of carrying out a complete mission on its own through online sensing, information processing, and control reconfiguration. A crucial cornerstone of this philosophy is the capability of intelligence and of information sharing between unmanned aerial vehicles (UAVs) or with a central controller through secured communication links. Though several mission control algorithms, for single and multiple UAVs, have been discussed in the literature, they lack a clear definition of the various autonomous mission control levels. In the conventional system, the ground pilot issues the flight and mission control command to a UAV through a command data link and the UAV transmits intelligence information, back to the ground pilot through a communication link. Thus, the success of the mission depends entirely on the information flow through a secured communication link between ground pilot and the UAV In the past, mission success depended on the continuous interaction of ground pilot with a single UAV, while present day applications are attempting to define mission success through efficient interaction of ground pilot with multiple UAVs. However, the current trend in UAV applications is expected to lead to a futuristic scenario where mission success would depend only on interaction among UAV groups with no interaction with any ground entity. However, to reach this capability level, it is necessary to first understand the various levels of autonomy and the crucial role that information and communication plays in making these autonomy levels possible. This article presents a detailed framework of UAV autonomous mission control levels in the context of information flow and communication between UAVs and UAV groups for each level of autonomy.
Resumo:
The problem of sensor-network-based distributed intrusion detection in the presence of clutter is considered. It is argued that sensing is best regarded as a local phenomenon in that only sensors in the immediate vicinity of an intruder are triggered. In such a setting, lack of knowledge of intruder location gives rise to correlated sensor readings. A signal-space viewpoint is introduced in which the noise-free sensor readings associated to intruder and clutter appear as surfaces $\mathcal{S_I}$ and $\mathcal{S_C}$ and the problem reduces to one of determining in distributed fashion, whether the current noisy sensor reading is best classified as intruder or clutter. Two approaches to distributed detection are pursued. In the first, a decision surface separating $\mathcal{S_I}$ and $\mathcal{S_C}$ is identified using Neyman-Pearson criteria. Thereafter, the individual sensor nodes interactively exchange bits to determine whether the sensor readings are on one side or the other of the decision surface. Bounds on the number of bits needed to be exchanged are derived, based on communication complexity (CC) theory. A lower bound derived for the two-party average case CC of general functions is compared against the performance of a greedy algorithm. The average case CC of the relevant greater-than (GT) function is characterized within two bits. In the second approach, each sensor node broadcasts a single bit arising from appropriate two-level quantization of its own sensor reading, keeping in mind the fusion rule to be subsequently applied at a local fusion center. The optimality of a threshold test as a quantization rule is proved under simplifying assumptions. Finally, results from a QualNet simulation of the algorithms are presented that include intruder tracking using a naive polynomial-regression algorithm.
Resumo:
In modern wireline and wireless communication systems, Viterbi decoder is one of the most compute intensive and essential elements. Each standard requires a different configuration of Viterbi decoder. Hence there is a need to design a flexible reconfigurable Viterbi decoder to support different configurations on a single platform. In this paper we present a reconfigurable Viterbi decoder which can be reconfigured for standards such as WCDMA, CDMA2000, IEEE 802.11, DAB, DVB, and GSM. Different parameters like code rate, constraint length, polynomials and truncation length can be configured to map any of the above mentioned standards. Our design provides higher throughput and scalable power consumption in various configuration of the reconfigurable Viterbi decoder. The power and throughput can also be optimized for different standards.
Resumo:
We develop several hardware and software simulation blocks for the TinyOS-2 (TOSSIM-T2) simulator. The choice of simulated hardware platform is the popular MICA2 mote. While the hardware simulation elements comprise of radio and external flash memory, the software blocks include an environment noise model, packet delivery model and an energy estimator block for the complete system. The hardware radio block uses the software environment noise model to sample the noise floor. The packet delivery model is built by establishing the SNR-PRR curve for the MICA2 system. The energy estimator block models energy consumption by Micro Controller Unit(MCU), Radio, LEDs, and external flash memory. Using the manufacturerpsilas data sheets we provide an estimate of the energy consumed by the hardware during transmission, reception and also track several of the MCUs states with the associated energy consumption. To study the effectiveness of this work, we take a case study of a paper presented in [1]. We obtain three sets of results for energy consumption through mathematical analysis, simulation using the blocks built into PowerTossim-T2 and finally laboratory measurements. Since there is a significant match between these result sets, we propose our blocks for T2 community to effectively test their application energy requirements and node life times.