6 resultados para Organized crime
em Indian Institute of Science - Bangalore - Índia
Resumo:
We demonstrate the phenomenon of self-organized criticality (SOC) in a simple random walk model described by a random walk of a myopic ant, i.e., a walker who can see only nearest neighbors. The ant acts on the underlying lattice aiming at uniform digging, i.e., reduction of the height profile of the surface but is unaffected by the underlying lattice. In one, two, and three dimensions we have explored this model and have obtained power laws in the time intervals between consecutive events of "digging." Being a simple random walk, the power laws in space translate to power laws in time. We also study the finite size scaling of asymptotic scale invariant process as well as dynamic scaling in this system. This model differs qualitatively from the cascade models of SOC.
Resumo:
The nanocrystallites ( ≈ 3 nm) of LiNbO3, evolved in the (100−x)LiBO2-xNb2O5 (5x20, in molar ratio) glass system exhibited intense second-harmonic signals in transmission mode when exposed to infrared (IR) light at λ = 1064 nm. The second-harmonic waves were found to undergo optical diffraction which was attributed to the presence of self-organized submicrometer-sized LiNbO3 crystallites that were grown within the glass matrix along the parallel damage fringes created by the IR laser radiation. Micro-Raman studies carried out on the laser-irradiated samples confirmed the self-organized crystallites to be LiNbO3.
Resumo:
In this paper, we have proposed a novel certificate-less on-demand public key management (CLPKM) protocol for self-organized MANETs. The protocol works on flat network architecture, and distinguishes between authentication layer and routing layer of the network. We put an upper limit on the length of verification route and use the end-to-end trust value of a route to evaluate its strength. The end-to-end trust value is used by the protocol to select the most trusted verification route for accomplishing public key verification. Also, the protocol uses MAC function instead of RSA certificates to perform public key verification. By doing this, the protocol saves considerable computation power, bandwidth and storage space. The saved storage space is utilized by the protocol to keep a number of pre-established routes in the network nodes, which helps in reducing the average verification delay of the protocol. Analysis and simulation results confirm the effectiveness of the proposed protocol.
Self-organized public key management in MANETs with enhanced security and without certificate-chains
Resumo:
In the self-organized public key management approaches, public key verification is achieved through verification routes constituted by the transitive trust relationships among the network principals. Most of the existing approaches do not distinguish among different available verification routes. Moreover, to ensure stronger security, it is important to choose an appropriate metric to evaluate the strength of a route. Besides, all of the existing self-organized approaches use certificate-chains for achieving authentication, which are highly resource consuming. In this paper, we present a self-organized certificate-less on-demand public key management (CLPKM) protocol, which aims at providing the strongest verification routes for authentication purposes. It restricts the compromise probability for a verification route by restricting its length. Besides, we evaluate the strength of a verification route using its end-to-end trust value. The other important aspect of the protocol is that it uses a MAC function instead of RSA certificates to perform public key verifications. By doing this, the protocol saves considerable computation power, bandwidth and storage space. We have used an extended strand space model to analyze the correctness of the protocol. The analytical, simulation, and the testbed implementation results confirm the effectiveness of the proposed protocol. (c) 2014 Elsevier B.V. All rights reserved.
Resumo:
Secondary structure formation in oligopeptides can be induced by short nucleating segments with a high propensity to form hydrogen bonded turn conformations. Type I/III turns facilitate helical folding while type II'/I' turns favour hairpin formation. This principle is experimentally verified by studies of two designed dodecapeptides, Boc-Val-Phe-Leu-Phe-Val-Aib-Aib-Val-Phe-Leu-Phe-Val-OMe 1 and Boc-Val-Phe-Leu-Phe-Val- (D) Pro- (L) Pro-Val-Phe-Leu-Phe-Val-OMe 2. The N- and C-terminal flanking pentapeptide sequences in both cases are identical. Peptide 1 adopts a largely alpha-helical conformation in crystals, with a small 3(10) helical segment at the N-terminus. The overall helical fold is maintained in methanol solution as evidenced by NMR studies. Peptide 2 adopts an antiparallel beta-hairpin conformation stabilized by 6 interstrand hydrogen bonds. Key nuclear Overhauser effects (NOEs) provide evidence for the antiparallel beta-hairpin structure. Aromatic proton chemical shifts provide a clear distinction between the conformation of peptides 1 (helical) and 2 (beta-hairpin). The proximity of facing aromatic residues positioned at non-hydrogen bonding positions in the hairpin results in extensively ring current shifted proton resonances in peptide 2.
Resumo:
Folding of Ubiquitin (Ub), a functionally important protein found in eukaryotic organisms, is investigated at low and neutral pH at different temperatures using simulations of the coarse-grained self-organized-polymer model with side chains (SOP-SC). The melting temperatures (T-m's), identified with the peaks in the heat capacity curves, decrease as pH decreases, in qualitative agreement with experiments. The calculated radius of gyration, showing dramatic variations with pH, is in excellent agreement with scattering experiments. At T-m Ub folds in a two-state manner at low and neutral pH. Clustering analysis of the conformations sampled in equilibrium folding trajectories at T-m with multiple transitions between the folded and unfolded states, shows a network of metastable states connecting the native and unfolded states. At low and neutral pH, Ub folds with high probability through a preferred set of conformations resulting in a pH-dependent dominant folding pathway. Folding kinetics reveal that Ub assembly at low pH occurs by multiple pathways involving a combination of nucleation-collapse and diffusion collision mechanism. The mechanism by which Ub folds is dictated by the stability of the key secondary structural elements responsible for establishing long-range contacts and collapse of Ub. Nucleation collapse mechanism holds if the stability of these elements are marginal, as would be the case at elevated temperatures. If the lifetimes associated with these structured microdomains are on the order of hundreds of microseconds, then Ub folding follows the diffusion collision mechanism with intermediates, many of which coincide with those found in equilibrium. Folding at neutral pH is a sequential process with a populated intermediate resembling that sampled at equilibrium. The transition state structures, obtained using a P-fold analysis, are homogeneous and globular with most of the secondary and tertiary structures being native-like. Many of our findings for both the thermodynamics and kinetics of folding are not only in agreement with experiments but also provide missing details not resolvable in standard experiments. The key prediction that folding mechanism varies dramatically with pH is amenable to experimental tests.