11 resultados para Crime prevention and architectural design.
em Indian Institute of Science - Bangalore - Índia
Resumo:
The recent trend towards minimizing the interconnections in large scale integration (LSI) circuits has led to intensive investigation in the development of ternary circuits and the improvement of their design. The ternary multiplexer is a convenient and useful logic module which can be used as a basic building block in the design of a ternary system. This paper discusses a systematic procedure for the simplification and realization of ternary functions using ternary multiplexers as building blocks. Both single level and multilevel multiplexing techniques are considered. The importance of the design procedure is highlighted by considering two specific applications, namely, the development of ternary adder/subtractor and TCD to ternary converter.
Resumo:
In this paper a nonlinear control has been designed using the dynamic inversion approach for automatic landing of unmanned aerial vehicles (UAVs), along with associated path planning. This is a difficult problem because of light weight of UAVs and strong coupling between longitudinal and lateral modes. The landing maneuver of the UAV is divided into approach, glideslope and flare. In the approach UAV aligns with the centerline of the runway by heading angle correction. In glideslope and flare the UAV follows straight line and exponential curves respectively in the pitch plane with no lateral deviations. The glideslope and flare path are scheduled as a function of approach distance from runway. The trajectory parameters are calculated such that the sink rate at touchdown remains within specified bounds. It is also ensured that the transition from the glideslope to flare path is smooth by ensuring C-1 continuity at the transition. In the outer loop, the roll rate command is generated by assuring a coordinated turn in the alignment segment and by assuring zero bank angle in the glideslope and flare segments. The pitch rate command is generated from the error in altitude to control the deviations from the landing trajectory. The yaw rate command is generated from the required heading correction. In the inner loop, the aileron, elevator and rudder deflections are computed together to track the required body rate commands. Moreover, it is also ensured that the forward velocity of the UAV at the touch down remains close to a desired value by manipulating the thrust of the vehicle. A nonlinear six-DOF model, which has been developed from extensive wind-tunnel testing, is used both for control design as well as to validate it.
Resumo:
In this work, we explore simultaneous geometry design and material selection for statically determinate trusses by posing it as a continuous optimization problem. The underlying principles of our approach are structural optimization and Ashby’s procedure for material selection from a database. For simplicity and ease of initial implementation, only static loads are considered in this work with the intent of maximum stiffness, minimum weight/cost, and safety against failure. Safety of tensile and compression members in the truss is treated differently to prevent yield and buckling failures, respectively. Geometry variables such as lengths and orientations of members are taken to be the design variables in an assumed layout. Areas of cross-section of the members are determined to satisfy the failure constraints in each member. Along the lines of Ashby’s material indices, a new design index is derived for trusses. The design index helps in choosing the most suitable material for any geometry of the truss. Using the design index, both the design space and the material database are searched simultaneously using gradient-based optimization algorithms. The important feature of our approach is that the formulated optimization problem is continuous, although the material selection from a database is an inherently discrete problem. A few illustrative examples are included. It is observed that the method is capable of determining the optimal topology in addition to optimal geometry when the assumed layout contains more links than are necessary for optimality.
Resumo:
The incorporation of dUMP during replication or the deamination of cytosine in DNA results in the occurrence of uracils in genomes. To maintain genomic integrity, uracil DNA glycosylases (UDGs) excise uracil from DNA and initiate the base-excision repair pathway. Here, we cloned, purified and biochemically characterized a family 5 UDG, UdgB, from Mycobacterium smegmatis to allow us to use it as a model organism to investigate the physiological significance of the novel enzyme. Studies with knockout strains showed that compared with the wild-type parent, the mutation rate of the udgB(-) strain was approximately twofold higher, whereas the mutation rate of a strain deficient in the family 1 UDG (ung(-)) was found to be similar to 8.4-fold higher. Interestingly, the mutation rate of the double-knockout (ung(-)ludgB(-)) strain was remarkably high, at similar to 19.6-fold. While CG to TA mutations predominated in the ung(-) and ung(-)/udgb(-) strains, AT to GC mutations were enhanced in the udgB(-) strain. The ung(-)/udgB(-) strain was notably more sensitive to acidified nitrite and hydrogen peroxide stresses compared with the single knockouts (ung(-) or udgB(-)). These observations reveal a synergistic effect of UdgB and Ung in DNA repair, and could have implications for the generation of attenuated strains of Mycobacterium tuberculosis.
Resumo:
Annulation of aromatic rings on the folded Image ,Image ,Image -triquinane backbone has led to the design of potential host systems Image and Image whose crystal structures have been determined.
Resumo:
The vacuum interrupter is extensively employed in the medium voltage switchgear for the interruption of the short-circuit current. The voltage across the arc during current interruption is termed as the arc voltage. The nature and magnitude of this arc voltage is indicative of the performance of the contacts and the vacuum interrupter as a whole. Also, the arc voltage depends on the parameters like the magnitude of short-circuit current, the arcing time, the point of opening of the contacts, the geometry and area of the contacts and the type of magnetic field. This paper investigates the dependency of the arc voltage on some of these parameters. The paper also discusses the usefulness of the arc voltage in diagnosing the performance of the contacts.
Resumo:
Most HIV-1 broadly neutralizing antibodies are directed against the gp120 subunit of the env surface protein. Native env consists of a trimer of gp120-gp41 heterodimers, and in contrast to monomeric gp120, preferentially binds CD4 binding site (CD4bs)-directed neutralizing antibodies over non-neutralizing ones. Some cryo-electron tomography studies have suggested that the V1V2 loop regions of gp120 are located close to the trimer interface. We have therefore designed cyclically permuted variants of gp120 with and without the h-CMP and SUMO2a trimerization domains inserted into the V1V2 loop. h-CMP-V1cyc is one such variant in which residues 153 and 142 are the N- and C-terminal residues, respectively, of cyclically permuted gp120 and h-CMP is fused to the N-terminus. This molecule forms a trimer under native conditions and binds CD4 and the neutralizing CD4bs antibodies b12 with significantly higher affinity than wild-type gp120. It binds non-neutralizing CD4bs antibody F105 with lower affinity than gp120. A similar derivative, h-CMP-V1cycl, bound the V1V2 loop-directed broadly neutralizing antibodies PG9 and PG16 with similar to 20-fold higher affinity than wild-type JRCSF gp120. These cyclic permutants of gp120 are properly folded and are potential immunogens. The data also support env models in which the V1V2 loops are proximal to the trimer interface.
Resumo:
Authentication protocols are very much essential for secure communication in mobile ad hoc networks (MANETs). A number of authentication protocols for MANETs have been proposed in the literature which provide the basic authentication service while trying to optimize their performance and resource consumption parameters. A problem with most of these protocols is that the underlying networking environment on which they are applicable have been left unspecified. As a result, lack of specifications about the networking environments applicable to an authentication protocol for MANETs can mislead about the performance and the applicability of the protocol. In this paper, we first characterize networking environment for a MANET as its 'Membership Model' which is defined as a set of specifications related to the 'Membership Granting Server' (MGS) and the 'Membership Set Pattern' (MSP) of the MANET. We then identify various types of possible membership models for a MANET. In order to illustrate that while designing an authentication protocol for a MANET, it is very much necessary to consider the underlying membership model of the MANET, we study a set of six representative authentication protocols, and analyze their applicability for the membership models as enumerated in this paper. The analysis shows that the same protocol may not perform equally well in all membership models. In addition, there may be membership models which are important from the point of view of users, but for which no authentication protocol is available.
Resumo:
Tuberculosis is continuing as a problem of mankind. With evolution, MDR and XDR forms of tuberculosis have emerged from drug sensitive strain. MDR and XDR strains are resistant to most of the antibiotics, making the management more difficult. BCG vaccine is not providing complete protection against tuberculosis. Therefore new infections are spreading at a tremendous rate. At the present moment there is experimental evidence to believe that Vitamin A and Vitamin D has anti-mycobacterial property. It is in this context, we have hypothesized a host based approach using the above vitamins that can cause possible prevention and cure of tuberculosis with minimal chance of resistance or toxicity. (C) 2015 Elsevier Ltd. All rights reserved.
Resumo:
Computing the maximum of sensor readings arises in several environmental, health, and industrial monitoring applications of wireless sensor networks (WSNs). We characterize the several novel design trade-offs that arise when green energy harvesting (EH) WSNs, which promise perpetual lifetimes, are deployed for this purpose. The nodes harvest renewable energy from the environment for communicating their readings to a fusion node, which then periodically estimates the maximum. For a randomized transmission schedule in which a pre-specified number of randomly selected nodes transmit in a sensor data collection round, we analyze the mean absolute error (MAE), which is defined as the mean of the absolute difference between the maximum and that estimated by the fusion node in each round. We optimize the transmit power and the number of scheduled nodes to minimize the MAE, both when the nodes have channel state information (CSI) and when they do not. Our results highlight how the optimal system operation depends on the EH rate, availability and cost of acquiring CSI, quantization, and size of the scheduled subset. Our analysis applies to a general class of sensor reading and EH random processes.