203 resultados para protocol identification


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In many applications of wireless ad hoc networks, wireless nodes are owned by rational and intelligent users. In this paper, we call nodes selfish if they are owned by independent users and their only objective is to maximize their individual goals. In such situations, it may not be possible to use the existing protocols for wireless ad hoc networks as these protocols assume that nodes follow the prescribed protocol without deviation. Stimulating cooperation among these nodes is an interesting and challenging problem. Providing incentives and pricing the transactions are well known approaches to stimulate cooperation. In this paper, we present a game theoretic framework for truthful broadcast protocol and strategy proof pricing mechanism called Immediate Predecessor Node Pricing Mechanism (IPNPM). The phrase strategy proof here means that truth revelation of cost is a weakly dominant-strategy (in game theoretic terms) for each node. In order to steer our mechanism-design approach towards practical implementation, we compute the payments to nodes using a distributed algorithm. We also propose a new protocol for broadcast in wireless ad hoc network with selfish nodes based on IPNPM. The features of the proposed broadcast protocol are reliability and a significantly reduced number of packet forwards compared to the number of network nodes, which in turn leads to less system-wide power consumption to broadcast a single packet. Our simulation results show the efficacy of the proposed broadcast protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a new approach to the location of fault in the high voltage power transmission system using Support Vector Machines (SVMs). A knowledge base is developed using transient stability studies for apparent impedance swing trajectory in the R-X plane. SVM technique is applied to identify the fault location in the system. Results are presented on sample 3-power station, a 9-bus system illustrate the implementation of the proposed method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Power system disturbances are often caused by faults on transmission lines. When faults occur in a power system, the protective relays detect the fault and initiate tripping of appropriate circuit breakers, which isolate the affected part from the rest of the power system. Generally Extra High Voltage (EHV) transmission substations in power systems are connected with multiple transmission lines to neighboring substations. In some cases mal-operation of relays can happen under varying operating conditions, because of inappropriate coordination of relay settings. Due to these actions the power system margins for contingencies are decreasing. Hence, power system protective relaying reliability becomes increasingly important. In this paper an approach is presented using Support Vector Machine (SVM) as an intelligent tool for identifying the faulted line that is emanating from a substation and finding the distance from the substation. Results on 24-bus equivalent EHV system, part of Indian southern grid, are presented for illustration purpose. This approach is particularly important to avoid mal-operation of relays following a disturbance in the neighboring line connected to the same substation and assuring secure operation of the power systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Existing protocols for archival systems make use of verifiability of shares in conjunction with a proactive secret sharing scheme to achieve high availability and long term confidentiality, besides data integrity. In this paper, we extend an existing protocol (Wong et al. [9]) to take care of more realistic situations. For example, it is assumed in the protocol of Wong et al. that the recipients of the secret shares are all trustworthy; we relax this by requiring that only a majority is trustworthy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the slotted ALOHA protocol on a channel with a capture effect. There are M protocols as special cases. We obtain sufficient rate conditions, which are close to necessary for stability of the system, when the arrival streams are stationary ergodic. Under the same rate conditions, for general regenerative arrival streams, we obtain the rates of convergence to stationarity, finiteness of stationary moments and various functional limit theorems. Our arrival streams contain all the traffic models suggested in the recent literature, including the ones which display long range dependence. We also obtain bounds on the stationary moments of waiting times which can be tight under realistic conditions. Finally, we obtain several results on the transient performance of the system, e.g., first time to overflow and the limits of the overflow process. We also extend the above results to the case of a capture channel exhibiting Markov modulated fading. Most of our results and proofs will be shown to hold also for the slotted ALOHA protocol without capture.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper proposes two methodologies for damage identification from measured natural frequencies of a contiguously damaged reinforced concrete beam, idealised with distributed damage model. The first method identifies damage from Iso-Eigen-Value-Change contours, plotted between pairs of different frequencies. The performance of the method is checked for a wide variation of damage positions and extents. The method is also extended to a discrete structure in the form of a five-storied shear building and the simplicity of the method is demonstrated. The second method is through smeared damage model, where the damage is assumed constant for different segments of the beam and the lengths and centres of these segments are the known inputs. First-order perturbation method is used to derive the relevant expressions. Both these methods are based on distributed damage models and have been checked with experimental program on simply supported reinforced concrete beams, subjected to different stages of symmetric and un-symmetric damages. The results of the experiments are encouraging and show that both the methods can be adopted together in a damage identification scenario.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An important issue in the design of a distributed computing system (DCS) is the development of a suitable protocol. This paper presents an effort to systematize the protocol design procedure for a DCS. Protocol design and development can be divided into six phases: specification of the DCS, specification of protocol requirements, protocol design, specification and validation of the designed protocol, performance evaluation, and hardware/software implementation. This paper describes techniques for the second and third phases, while the first phase has been considered by the authors in their earlier work. Matrix and set theoretic based approaches are used for specification of a DCS and for specification of the protocol requirements. These two formal specification techniques form the basis of the development of a simple and straightforward procedure for the design of the protocol. The applicability of the above design procedure has been illustrated by considering an example of a computing system encountered on board a spacecraft. A Petri-net based approach has been adopted to model the protocol. The methodology developed in this paper can be used in other DCS applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The 2.3 kb BamHI fragment from the colitis bacteriophage DNA was transcribed and translated into a 20 kd structural protein P6, in a coupled transcription-translation system derived from Escherichia coli. This protein was expressed in vivo by the 2.3 kb DNA cloned in pBR322. The gene with the regulatory elements for this protein was located on the 680 bp AvaII fragment of the insert DNA. It hybridized with two RNAs of sizes 520 and 1630 nucleotides indicating that both are messengers for the 20 kd protein. Dot-blot hybridization showed that the transcripts for P6 reached a maximum level at 12 min after phage infection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The absolute yields of gaseous oxyfluorides SOF2, SO2F2, and SOF4 from negative, point-plane corona discharges in pressurized gas mixtures of SF6 with O2 and H2O enriched with18O2 and H2 18O have been measured using a gas chromatograph-mass spectrometer. The predominant SF6 oxidation mechanisms have been revealed from a determination of the relative18O and16O isotope content of the observed oxyfluoride by-product. The results are consistent with previously proposed production mechanisms and indicate that SOF2 and SO2F2 derive oxygen predominantly from H2O and O2, respectively, in slow, gas-phase reactions involving SF4, SF3, and SF2 that occur outside of the discharge region. The species SOF4 derives oxygen from both H2O and O2 through fast reactions in the active discharge region involving free radicals or ions such as OH and O, with SF5 and SF4.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Design of speaker identification schemes for a small number of speakers (around 10) with a high degree of accuracy in controlled environment is a practical proposition today. When the number of speakers is large (say 50–100), many of these schemes cannot be directly extended, as both recognition error and computation time increase monotonically with population size. The feature selection problem is also complex for such schemes. Though there were earlier attempts to rank order features based on statistical distance measures, it has been observed only recently that the best two independent measurements are not the same as the combination in two's for pattern classification. We propose here a systematic approach to the problem using the decision tree or hierarchical classifier with the following objectives: (1) Design of optimal policy at each node of the tree given the tree structure i.e., the tree skeleton and the features to be used at each node. (2) Determination of the optimal feature measurement and decision policy given only the tree skeleton. Applicability of optimization procedures such as dynamic programming in the design of such trees is studied. The experimental results deal with the design of a 50 speaker identification scheme based on this approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Human platelet-derived growth factor (PDGF) is composed of two polypeptide chains, PDGF-1 and PDGF-2,the human homolog of the v-sis oncogene. Deregulation of PDGF-2 expression can confer a growth advantage to cells possessing the cognate receptor and, thus, may contribute to the malignant phenotype. We investigated the regulation of PDGF-2 mRNA expression during megakaryocytic differentiation of K562 cells. Induction by 12-O-tetradecanoylphorbol-13-acetate (TPA) led to a greater than 200-fold increase in PDGF-2 transcript levels in these cells. Induction was dependent on protein synthesis and was not enhanced by cycloheximide exposure.In our initial investigation of the PDGF-2 promoter, a minimal promoter region, which included sequences extending only 42 base pairs upstream of the TATA signal, was found to be as efficient as 4 kilobase pairs upstream of the TATA signal in driving expression of a reporter gene in uninduced K562 cells. We also functionally identified different regulatory sequence elements of the PDGF-2 promoter in TPA-induced K562 cells. One region acted as a transcriptional silencer, while another region was necessary for maximal activity of the promoter in megakaryoblasts. This region was shown to bind nuclear factors and was the target for trans-activation in normal and tumor cells. In one tumor cell line, which expressed high PDGF-2 mRNA levels, the presence of the positive regulatory region resulted in a 30-fold increase in promoter activity. However, the ability of the minimal PDGF-2 promoter to drive reporter gene expression in uninduced K562 cells and normal fibroblasts, which contained no detectable PDGF-2 transcripts, implies the existence of other negative control mechanisms beyond the regulation of promoter activity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The structure of [Cu4L2(bipy)4(µ3-OH)2][ClO4]4 containing a Vitamin B6 ligand, pyridoxine (5-hydroxy-6-methylpyridine-3,4-dimethanol, HL), and 2,2′-bipyridine (bipy) has been determined by single-crystal X-ray analysis. This is the first report on a copper(II) complex having a ‘stepped-cubane’ structure. The compound crystallizes in the triclinic space group P[1 with combining macron](Z= 1) with a= 11.015(3), b= 11.902(1), c= 13.142(2)Å, α= 105.07(1), β= 102.22(1) and γ= 99.12(1)°; R= 0.054). The co-ordination geometry around each copper is trigonally distorted square pyramidal. Two of the basal sites are occupied by bipyridyl nitrogens in a bidentate fashion. The remaining basal positions for Cu(1) are filled by a phenolic oxygen and a 4-hydroxymethyl oxygen of the L moiety, whereas for Cu(2) they are occupied by two µ3-OH oxygens. The axial sites are occupied by a µ3-OH oxygen and the 4-hydroxymethyl oxygen of the same pyridoxine for Cu(1) and Cu(2), respectively. Both the bridging nature of the 4-hydroxymethyl oxygen of the L moiety and the unsymmetrical bridging nature of the µ3-OH groups with axial–equatorial bridging are novel features. The structure is discussed in relation to stepped-cubane structures reported in the literature. A comparative study is also made with µ3-hydroxo-bridged copper(II) complexes. Both the plasticity effect of CuII and the stacking interactions between the various rings appear to be important in stabilizing this unusual structure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ten new cyclic hexadepsipeptides, six isariins and four isaridins, from the fungus Isaria have been identified and characterized by high-performance liquid chromatography, coupled to tandem electrospray ionization mass spectrometry (LC-ESIMS/MS). The isariins possess a beta-hydroxy acid residue and five alpha-amino acids, while isaridins contain a beta-amino acid, an alpha-hydroxy acid, and four alpha-amino acids. One- and two-dimensional NMR spectroscopy confirmed the chemical identity of some of the isariin fractions. Mass spectral fragmentation patterns of [M + H](+) ions reveal clear diagnostic fragment ions for the isariins and isaridins. Previously described cyclic depsipeptides, isarfelins from Isaria felina (Guo, Y. X.; Liu, Q. H.; Ng, T. B.; Wang H. X. Peptides 2005, 26, 2384), are now reassigned as members of the isaridin family. Examination of isaridin sequences revealed significant similarities with cyclic hexadepsipeptides such as destruxins and roseotoxins. The structure of an isariin (isariin A) investigated by NMR spectroscopy indicated the presence of a hybrid alpha beta C-11 turn, formed by the beta-hydroxy acid and glycine residues and a (D)Leu-(L)Ala type II' beta-turn. Additionally, the inhibitory effect of isariins and an isaridin on the intra-erythrocytic growth of Plasmodium falciparum is presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The microorganism Mucor piriformis transforms androst-4-ene-3,17-dione into a major and several minor metabolites. X-ray crystallographic analysis of two of these metabolites was undertaken to determine unambiguously their composition and chirality. Crystals belong to the orthorhombic space-group P2(1)2(1)2(1), with a = 7.199(4) angstrom and a = 6.023(3) angstrom, b = 11.719(3) angstrom and b = 13.455(4) angstrom, c = 20.409(3) angstrom and c = 20.702(4) angstrom for the two title compounds, respectively. The structures have been refined to final R values of 0.060 and 0.040, respectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The temperature dependence of the chlorine-35 n.q.r. in the mercuric chloride-4-picoline N-oxide complex has been studied from 77 K to room temperature, and the results are used to assign the observed frequencies to terminal and bridging chlorines.