4 resultados para Credibility
em Indian Institute of Science - Bangalore - Índia
Resumo:
A fundamental approach, based on Gouy-Chapman theory of double layer, has been provided to micromechanistically interpret the plasticity index of soils and their relationship with liquid limit. The relationships between plasticity index and liquid limit, developed earlier, through statistical approaches and critical state concepts, have been reexamined. The statistical analysis of extensive published data has resulted in the relationship, IP = 0.74 (wL - 8). On comparison with other relationships in vogue the proposed equation has been found to give better agreement. From the reappraisal of critical state approaches consistent with the micromechanistic interpretation, the possible range of parameters have been computed and compared with those obtained by statistical means to enhance the credibility of the proposed relationship.
Resumo:
Security in a mobile communication environment is always a matter for concern, even after deploying many security techniques at device, network, and application levels. The end-to-end security for mobile applications can be made robust by developing dynamic schemes at application level which makes use of the existing security techniques varying in terms of space, time, and attacks complexities. In this paper we present a security techniques selection scheme for mobile transactions, called the Transactions-Based Security Scheme (TBSS). The TBSS uses intelligence to study, and analyzes the security implications of transactions under execution based on certain criterion such as user behaviors, transaction sensitivity levels, and credibility factors computed over the previous transactions by the users, network vulnerability, and device characteristics. The TBSS identifies a suitable level of security techniques from the repository, which consists of symmetric, and asymmetric types of security algorithms arranged in three complexity levels, covering various encryption/decryption techniques, digital signature schemes, andhashing techniques. From this identified level, one of the techniques is deployed randomly. The results shows that, there is a considerable reduction in security cost compared to static schemes, which employ pre-fixed security techniques to secure the transactions data.
Resumo:
The understanding of protein-protein interactions is indispensable in comprehending most of the biological processes in a cell. Small-scale experiments as well as large-scale high-throughput techniques over the past few decades have facilitated identification and analysis of protein-protein interactions which form the basis of much of our knowledge on functional and regulatory aspects of proteins. However, such rich catalog of interaction data should be used with caution when establishing protein-protein interactions in silico, as the high-throughput datasets are prone to false positives. Numerous computational means developed to pursue genome-wide studies on protein-protein interactions at times overlook the mechanistic and molecular details, thus questioning the reliability of predicted protein-protein interactions. We review the development, advantages, and shortcomings of varied approaches and demonstrate that by providing a structural viewpoint in terms of shape complementarity and interaction energies at protein-protein interfaces coupled with information on expression and localization of proteins homologous to an interacting pair, it is possible to assess the credibility of predicted interactions in biological context. With a focus on human pathogen Mycobacterium tuberculosis H37Rv, we show that such scrupulous use of details at the molecular level can predict physicochemically viable protein-protein interactions across host and pathogen. Such predicted interactions have the potential to provide molecular basis of probable mechanisms of pathogenesis and hence open up ways to explore their usefulness as targets in the light of drug discovery. (c) 2014 IUBMB Life, 66(11):759-774, 2014
Resumo:
Despite high vulnerability, the impact of climate change on Himalayan ecosystem has not been properly investigated, primarily due to the inadequacy of observed data and the complex topography. In this study, we mapped the current vegetation distribution in Kashmir Himalayas from NOAA AVHRR and projected it under A1B SRES, RCP-4.5 and RCP-8.5 climate scenarios using the vegetation dynamics model-IBIS at a spatial resolution of 0.5A degrees. The distribution of vegetation under the changing climate was simulated for the 21st century. Climate change projections from the PRECIS experiment using the HADRM3 model, for the Kashmir region, were validated using the observed climate data from two observatories. Both the observed as well as the projected climate data showed statistically significant trends. IBIS was validated for Kashmir Himalayas by comparing the simulated vegetation distribution with the observed distribution. The baseline simulated scenario of vegetation (1960-1990), showed 87.15 % agreement with the observed vegetation distribution, thereby increasing the credibility of the projected vegetation distribution under the changing climate over the region. According to the model projections, grasslands and tropical deciduous forests in the region would be severely affected while as savannah, shrubland, temperate evergreen broadleaf forest, boreal evergreen forest and mixed forest types would colonize the area currently under the cold desert/rock/ice land cover types. The model predicted that a substantial area of land, presently under the permanent snow and ice cover, would disappear by the end of the century which might severely impact stream flows, agriculture productivity and biodiversity in the region.