98 resultados para Nadir Shah, Sha de Persia 1688-1747


Relevância:

10.00% 10.00%

Publicador:

Resumo:

High performance video standards use prediction techniques to achieve high picture quality at low bit rates. The type of prediction decides the bit rates and the image quality. Intra Prediction achieves high video quality with significant reduction in bit rate. This paper presents novel area optimized architecture for Intra prediction of H.264 decoding at HDTV resolution. The architecture has been validated on a Xilinx Virtex-5 FPGA based platform and achieved a frame rate of 64 fps. The architecture is based on multi-level memory hierarchy to reduce latency and ensure optimum resources utilization. It removes redundancy by reusing same functional blocks across different modes. The proposed architecture uses only 13% of the total LUTs available on the Xilinx FPGA XC5VLX50T.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An industrial base oil, a blend of different paraffin fractions, is heated to 130 degrees C (1) in the ambient and (2) for use as a lubricant in a steel pin on a steel disk sliding experiment. The base oil was tested with and without test antioxidants: dimethyl disulfide (DMDS) and alkylated diphenylamine (ADPA). Primary and secondary oxidation products were monitored continuously by FTIR over a 100 h period. In addition, friction and wear of the steel pin were monitored over the same period and the chemical transformation of the pin surface was monitored by XPS. The objective of this work is to observe the catalytic action of the steel components on the oil aging process and the efficacy of the antioxidant to reduce oxidation of oil used in tribology as a lubricant. Possible mechanistic explanations of the aging process as well as its impact on friction and wear are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Regenerating codes are a class of codes for distributed storage networks that provide reliability and availability of data, and also perform efficient node repair. Another important aspect of a distributed storage network is its security. In this paper, we consider a threat model where an eavesdropper may gain access to the data stored in a subset of the storage nodes, and possibly also, to the data downloaded during repair of some nodes. We provide explicit constructions of regenerating codes that achieve information-theoretic secrecy capacity in this setting.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Erasure codes are an efficient means of storing data across a network in comparison to data replication, as they tend to reduce the amount of data stored in the network and offer increased resilience in the presence of node failures. The codes perform poorly though, when repair of a failed node is called for, as they typically require the entire file to be downloaded to repair a failed node. A new class of erasure codes, termed as regenerating codes were recently introduced, that do much better in this respect. However, given the variety of efficient erasure codes available in the literature, there is considerable interest in the construction of coding schemes that would enable traditional erasure codes to be used, while retaining the feature that only a fraction of the data need be downloaded for node repair. In this paper, we present a simple, yet powerful, framework that does precisely this. Under this framework, the nodes are partitioned into two types and encoded using two codes in a manner that reduces the problem of node-repair to that of erasure-decoding of the constituent codes. Depending upon the choice of the two codes, the framework can be used to avail one or more of the following advantages: simultaneous minimization of storage space and repair-bandwidth, low complexity of operation, fewer disk reads at helper nodes during repair, and error detection and correction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Erasure codes are an efficient means of storing data across a network in comparison to data replication, as they tend to reduce the amount of data stored in the network and offer increased resilience in the presence of node failures. The codes perform poorly though, when repair of a failed node is called for, as they typically require the entire file to be downloaded to repair a failed node. A new class of erasure codes, termed as regenerating codes were recently introduced, that do much better in this respect. However, given the variety of efficient erasure codes available in the literature, there is considerable interest in the construction of coding schemes that would enable traditional erasure codes to be used, while retaining the feature that only a fraction of the data need be downloaded for node repair. In this paper, we present a simple, yet powerful, framework that does precisely this. Under this framework, the nodes are partitioned into two types and encoded using two codes in a manner that reduces the problem of node-repair to that of erasure-decoding of the constituent codes. Depending upon the choice of the two codes, the framework can be used to avail one or more of the following advantages: simultaneous minimization of storage space and repair-bandwidth, low complexity of operation, fewer disk reads at helper nodes during repair, and error detection and correction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The objective of this study was to report the clinical phenotype and genetic analysis of two Indian families with Escobar syndrome (ES). The diagnosis of ES in both families was made on the basis of published clinical features. Blood samples were collected from members of both families and used in genomic DNA isolation. The entire coding regions and intron-exon junctions of the ES gene CHRNG (cholinergic receptor, nicotinic, gamma), and two other related genes, CHRND and CHRNA1, were amplified and sequenced to search for mutations in both families. Both families show a typical form of ES. Sequencing of the entire coding regions including the intron-exon junctions of the three genes did not yield any mutations in these families. In conclusion, it is possible that the mutations in these genes are located in the promoter or deep intronic regions that we failed to identify or the ES in these families is caused by mutations in a different gene. The lack of mutations in CHRNG has also been reported in several families, suggesting the possibility of at least one more gene for this syndrome. Clin Dysmorphol 22:54-58 (C) 2013 Wolters Kluwer Health vertical bar Lippincott Williams & Wilkins.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

alpha-Azidoacetophenones were converted into 2-aryl-1,3-oxazole-4-carbaldehydes through rearrangement of the carbon framework upon exposure to DMF/POCl3. The unprecedented rearrangement occurs via alkenyl azides and 2H-azirines. A mechanism for this unusual reaction was proposed and evidenced.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Peer to peer networks are being used extensively nowadays for file sharing, video on demand and live streaming. For IPTV, delay deadlines are more stringent compared to file sharing. Coolstreaming was the first P2P IPTV system. In this paper, we model New Coolstreaming (newer version of Coolstreaming) via a queueing network. We use two time scale decomposition of Markov chains to compute the stationary distribution of number of peers and the expected number of substreams in the overlay which are not being received at the required rate due to parent overloading. We also characterize the end-to-end delay encountered by a video packet received by a user and originated at the server. Three factors contribute towards the delay. The first factor is the mean shortest path length between any two overlay peers in terms of overlay hops of the partnership graph which is shown to be O (log n) where n is the number of peers in the overlay. The second factor is the mean number of routers between any two overlay neighbours which is seen to be at most O (log N-I) where N-I is the number of routers in the internet. Third factor is the mean delay at a router in the internet. We provide an approximation of this mean delay E W]. Thus, the mean end to end delay in New Coolstreaming is shown to be upper bounded by O (log E N]) (log N-I) E (W)] where E N] is the mean number of peers at a channel.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mountain waves in the stratosphere have been observed over elevated topographies using both nadir-looking and limb-viewing satellites. However, the characteristics of mountain waves generated over the Himalayan Mountain range and the adjacent Tibetan Plateau are relatively less explored. The present study reports on three-dimensional (3-D) properties of a mountain wave event that occurred over the western Himalayan region on 9 December 2008. Observations made by the Atmospheric Infrared Sounder on board the Aqua and Microwave Limb Sounder on board the Aura satellites are used to delineate the wave properties. The observed wave properties such as horizontal (lambda(x), lambda(y)) and vertical (lambda(z)) wavelengths are 276 km (zonal), 289 km (meridional), and 25 km, respectively. A good agreement is found between the observed and modeled/analyzed vertical wavelength for a stationary gravity wave determined using the Modern Era Retrospective Analysis for Research and Applications (MERRA) reanalysis winds. The analysis of both the National Centers for Environmental Prediction/National Center for Atmospheric Research reanalysis and MERRA winds shows that the waves are primarily forced by strong flow across the topography. Using the 3-D properties of waves and the corrected temperature amplitudes, we estimated wave momentum fluxes of the order of similar to 0.05 Pa, which is in agreement with large-amplitude mountain wave events reported elsewhere. In this regard, the present study is considered to be very much informative to the gravity wave drag schemes employed in current general circulation models for this region.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider secrecy obtained when one transmits on a Gaussian Wiretap channel above the secrecy capacity. Instead of equivocation, we consider probability of error as the criterion of secrecy. The usual channel codes are considered for transmission. The rates obtained can reach the channel capacity. We show that the “confusion” caused to the Eve when the rate of transmission is above capacity of the Eve's channel is similar to the confusion caused by using the wiretap channel codes used below the secrecy capacity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Regenerating codes are a class of codes proposed for providing reliability of data and efficient repair of failed nodes in distributed storage systems. In this paper, we address the fundamental problem of handling errors and erasures at the nodes or links, during the data-reconstruction and node-repair operations. We provide explicit regenerating codes that are resilient to errors and erasures, and show that these codes are optimal with respect to storage and bandwidth requirements. As a special case, we also establish the capacity of a class of distributed storage systems in the presence of malicious adversaries. While our code constructions are based on previously constructed Product-Matrix codes, we also provide necessary and sufficient conditions for introducing resilience in any regenerating code.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider a two user fading Multiple Access Channel with a wire-tapper (MAC-WT) where the transmitter has the channel state information (CSI) to the intended receiver but not to the eavesdropper (eve). We provide an achievable secrecy sum-rate with optimal power control. We next provide a secrecy sum-rate with optimal power control and cooperative jamming (CJ). We then study an achievable secrecy sum rate by employing an ON/OFF power control scheme which is more easily computable. We also employ CJ over this power control scheme. Results show that CJ boosts the secrecy sum-rate significantly even if we do not know the CSI of the eve's channel. At high SNR, the secrecy sum-rate (with CJ) without CSI of the eve exceeds the secrecy sum-rate (without CJ) with full CSI of the eve.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents experimental and analytical studies on fatigue crack propagation in concrete-concrete cold jointed interface specimens. Beams of different sizes having jointed interface between two concretes with different elastic properties are tested under fatigue loading. The acoustic emission technique is used for monitoring the fatigue crack growth. It is observed that the interface having a higher moduli mismatch tends to behave in a brittle manner. The CMOD compliances at different loading cycles are measured and the equivalent crack lengths are determined from a finite element analysis. An analytical model for crack growth rate is proposed using the concepts of the dimensional analysis. (C) 2014 Elsevier Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cytosolic heat shock protein 90 (Hsp90) has been shown to be essential for many infectious pathogens and is considered a potential target for drug development. In this study, we have carried out biochemical characterization of Hsp90 from a poorly studied protozoan parasite of clinical importance, Entamoeba histolytica. We have shown that Entamoeba Hsp90 can bind to both ATP and its pharmacological inhibitor, 17-AAG (17-allylamino-17-demethoxygeldanamycin), with K-d values of 365.2 and 10.77 mu M, respectively, and it has a weak ATPase activity with a catalytic efficiency of 4.12 x 10(-4) min(-1) mu M-1. Using inhibitor 17-AAG, we have shown dependence of Entamoeba on Hsp90 for its growth and survival. Hsp90 function is regulated by various co-chaperones. Previous studies suggest a lack of several important co-chaperones in E. histolytica. In this study, we describe the presence of a novel homologue of co-chaperone Aha1 (activator of Hsp90 ATPase), EhAha1c, lacking a canonical Aha1 N-terminal domain. We also show that EhAha1c is capable of binding and stimulating ATPase activity of EhHsp90. In addition to highlighting the potential of Hsp90 inhibitors as drugs against amoebiasis, our study highlights the importance of E. histolytica in understanding the evolution of Hsp90 and its co-chaperone repertoire. (C) 2014 Elsevier Ltd. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Heat shock factor binding protein (HSBP) was originally discovered in a yeast two-hybrid screen as an interacting partner of heat shock factor (HSF). It appears to be conserved in all eukaryotes studied so far, with yeast being the only exception. Cell biological analysis of HSBP in mammals suggests its role as a negative regulator of heat shock response as it appears to interact with HSF only during the recovery phase following exposure to heat stress. While the identification of HSF in the malaria parasite is still eluding biologists, this study for the first time, reports the presence of a homologue of HSBP in Plasmodium falciparum. Methods: PfHSBP was cloned and purified as his-tag fusion protein. CD (Circular dichroism) spectroscopy was performed to predict the secondary structure. Immunoblots and immunofluorescence approaches were used to study expression and localization of HSBP in P. falciparum. Cellular fractionation was performed to examine subcellular distribution of PfHSBP. Immunoprecipitation was carried out to identify HSBP interacting partner in P. falciparum. Results: PfHSBP is a conserved protein with a high helical content and has a propensity to form homo-oligomers. PfHSBP was cloned, expressed and purified. The in vivo protein expression profile shows maximal expression in trophozoites. The protein was found to exist in oligomeric form as trimer and hexamer. PfHSBP is predominantly localized in the parasite cytosol, however, upon heat shock, it translocates to the nucleus. This study also reports the interaction of PfHSBP with PfHSP70-1 in the cytoplasm of the parasite. Conclusions: This study emphasizes the structural and biochemical conservation of PfHSBP with its mammalian counterpart and highlights its potential role in regulation of heat shock response in the malaria parasite. Analysis of HSBP may be an important step towards identification of the transcription factor regulating the heat shock response in P. falciparum.