13 resultados para Term of protection
em Indian Institute of Science - Bangalore - Índia
Resumo:
The protective ability of cytotoxic T cells (CTL) raised in vitro against Japanese encephalitis virus (JEV) was examined by adoptive transfer experiments. Adoptive transfer of anti-JEV effecters by intracerebral (i.c.) but not by intraperitoneal (i.p.) or intravenous (i.v.) routes protected adult BALB/c mice against lethal i.c. JEV challenge. In contrast to adult mice, adoptive transfer of anti-JEV effecters into newborn (4-day-old) and suckling (8-14-day-old) mice did not confer protection. However, virus-induced death was delayed in suckling mice compared to newborn mice upon adoptive transfer. The specific reasons for lack of protection in newborn mice are not clear but virus load was found to be higher in newborn mice brains compared to those of adults and virus clearance was observed only in adult mice brains but not in newborn mice brains upon adoptive transfer. Specific depletion of Lyt 2.2(+), L3T4(+) or Thy-1(+) T cell populations before adoptive transfer abrogated the protective ability of transferred effecters. However, when Lyt 2.2(+) cell-depleted and L3T4(+) cell-depleted effecters were mixed and transferred into adult mice the protective activity was retained, demonstrating that both Lyt 2.2(+) and L3T4(+) T cells are necessary to confer protection. Although the presence of L3T4(+) T cells in adoptively transferred effector populations enhanced virus-specific serum neutralizing antibodies, the presence of neutralizing antibodies alone without Lyt 2.2(+) cells was not sufficient to confer protection.
Resumo:
Low-power electronic devices used in digital telecom exchanges are vulnerable to surge voltages and currents primarily originating from natural lightning or due to the direct interactions between electric power and telecommunication lines, etc., causing the earth/ground potential rise, neutral potential rise, and faults in the system. The fault currents may flow directly to telecom lines or through the equipment to the customer's premises, causing adequate damage to the equipment and personnel safety. In wireline applications, analog or digital, central office, exchanges, and subscriber sides have to be protected. Decisive protection and protective methods have to be employed for proper functioning of the equipment under overvoltage/overcurrent conditions. Current investigation reports some interesting results obtained on the recently developed high-voltage high-current protection cards used in digital telecom exchanges. The performances of protection cards both for the ring wave and hybrid wave surges are evaluated and presented. The surge generators required for the investigation are developed and fabricated in house as per the relevant telecom standards.
Resumo:
India has rich traditions of nature conservation as well as a vigorous official program of protection of nature reserves developed over the last 40 years. However, the officialp rograms uffers fromt otal relianceo n authoritarianm anagement arrangements in which decisions are made centrally and coercion is used to implement them. At the same time, the state apparatus organises subsidized resource flows to the urbanindustrial- intensivea griculturalc omplex which promote inefficient,n on-sustainable resource-use patterns that are inimical to conservation of biodiversity. These processes are illustrated within the concrete setting of the district of Uttara Kannada in southern India. It is suggested that the interests of conservation would be served far better by an approach that withdraws the subsidies to the elite so that a much more efficient, sustainable and equitable pattern of resource use, compatible with conservation of biodiversity, can be instituted. In conjunction with this, the larger society should involve local people in working out detailed plans for conservation of biodiversity and offer them adequate authority as well as appropriate financial incentives to implement these plans. The paper goes on to illustrate how such an approach may be implemented in the case of Uttara Kannada.
Resumo:
The steady flow of a power law fluid in annuli with porous walls is investigated. The solution for the axial velocity component is obtained as a power series in terms of the cross flow Reynolds number, the first term of the series giving the solution for the case of the solid wall annulus. The cross flow is restricted to be such that the rate of injection of fluid at one wall of the annulus is equal to the rate of suction at the other wall and also we have considered only very small values of the cross flow velocity. The velocity profiles are drawn for different values of n and for different gaps and the results are discussed in detail. The behaviour of the average flux, in different eases is also discussed.
Resumo:
The telecommunication, broadcasting and other instrumented towers carry power and/or signal cables from their ground end to their upper regions. During a direct hit to the tower, significant induction can occur to these mounted cables. In order to provide adequate protection to the equipments connected to them, protection schemes have been evolved in the literature. Development of more effective protection schemes requires a quantitative knowledge on various parameters. However, such quantitative knowledge is difficult to find at present. Amongst several of these aspects, the present work aims to investigate on the two important aspects: (i) what would be the nature of the induced currents and (ii) what will be the current sharing if as per the practice, the sheath of the cable is connected to the down conductor/tower. These aspects will be useful in design of protection schemes and also in analyzing the field structure around instrumented towers.
Resumo:
In this paper, we analyze the coexistence of a primary and a secondary (cognitive) network when both networks use the IEEE 802.11 based distributed coordination function for medium access control. Specifically, we consider the problem of channel capture by a secondary network that uses spectrum sensing to determine the availability of the channel, and its impact on the primary throughput. We integrate the notion of transmission slots in Bianchi's Markov model with the physical time slots, to derive the transmission probability of the secondary network as a function of its scan duration. This is used to obtain analytical expressions for the throughput achievable by the primary and secondary networks. Our analysis considers both saturated and unsaturated networks. By performing a numerical search, the secondary network parameters are selected to maximize its throughput for a given level of protection of the primary network throughput. The theoretical expressions are validated using extensive simulations carried out in the Network Simulator 2. Our results provide critical insights into the performance and robustness of different schemes for medium access by the secondary network. In particular, we find that the channel captures by the secondary network does not significantly impact the primary throughput, and that simply increasing the secondary contention window size is only marginally inferior to silent-period based methods in terms of its throughput performance.
Resumo:
Towards ultrafast optoelectronic applications of single and a few layer reduced graphene oxide (RGO), we study time domain terahertz spectroscopy and optical pump induced changes in terahertz conductivity of self-supported RGO membrane in the spectral window of 0.5-3.5 THz. The real and imaginary parts of conductivity spectra clearly reveal low frequency resonances, attributed to the energy gaps due to the van Hove singularities in the density of states flanking the Dirac points arising due to the relative rotation of the graphene layers. Further, optical pump induced terahertz conductivity is positive, pointing to the dominance of intraband scattering processes. The relaxation dynamics of the photo-excited carriers consists of three cooling pathways: the faster (similar to 450 fs) one due to optical phonon emission followed by disorder mediated large momentum and large energy acoustic phonon emission with a time constant of a few ps (called the super-collision mechanism) and a very large time (similar to 100 ps) arising from the deep trap states. The frequency dependence of the dynamic conductivity at different delay times is analyzed in term of Drude-Smith model. (C) 2014 Published by Elsevier Ltd.
Resumo:
We study the generation of defects when a quantum spin system is quenched through a multicritical point by changing a parameter of the Hamiltonian as t/tau, where tau is the characteristic timescale of quenching. We argue that when a quantum system is quenched across a multicritical point, the density of defects (n) in the final state is not necessarily given by the Kibble-Zurek scaling form n similar to 1/tau(d nu)/((z nu+1)), where d is the spatial dimension, and. and z are respectively the correlation length and dynamical exponent associated with the quantum critical point. We propose a generalized scaling form of the defect density given by n similar to 1/(tau d/(2z2)), where the exponent z(2) determines the behavior of the off-diagonal term of the 2 x 2 Landau-Zener matrix at the multicritical point. This scaling is valid not only at a multicritical point but also at an ordinary critical point.
Resumo:
The probability that a random process crosses an arbitrary level for the first time is expressed as a Gram—Charlier series, the leading term of which is the Poisson approximation. The coefficients of this series are related to the moments of the number of level crossings. The results are applicable to both stationary and non-stationary processes. Some numerical results are presented for the response process of a linear single-degree-of-freedom oscillator under Gaussian white noise excitation.
Resumo:
The O(m(pi)4/(m(u) + (d))2Q2) and O(alpha(S)2) corrections to the leading term of the perturbative QCD calculation of the pion electromagnetic form factor are examined numerically. Both sets of terms provide significant corrections for values of Q2 between 1 and 15 GeV2/c2.
Resumo:
Bypass operation with the aid of a special bypass valve is an important part of present-day schemes of protection for h.v. d.c. transmission systems. In this paper, the possibility of using two valves connected to any phase in the bridge convertor for the purpose of bypass operation is studied. The scheme is based on the use of logic circuits in conjunction with modified methods of fault detection. Analysis of the faults in a d.c. transmission system is carried out with the object of determining the requirements of such a logic-circuit control system. An outline of the scheme for the logic-circuit control of the bypass operation for both rectifier and invertor bridges is then given. Finally, conclusions are drawn regarding the advantages of such a system, which include reduction in the number of valves, prevention of severe faults and fast clearance of faults, in addition to the immediate location of the fault and its nature.
Resumo:
Seasonal epidemics caused by influenza A (H1 and H3 subtypes) and B viruses are a major global health threat. The traditional, trivalent influenza vaccines have limited efficacy because of rapid antigenic evolution of the circulating viruses. This antigenic variability mediates viral escape from the host immune responses, necessitating annual vaccine updates. Influenza vaccines elicit a protective antibody response, primarily targeting the viral surface glycoprotein hemagglutinin (HA). However, the predominant humoral response is against the hypervariable head domain of HA, thereby restricting the breadth of protection. In contrast, the conserved, subdominant stem domain of HA is a potential ``universal'' vaccine candidate. We designed an HA stem-fragment immunogen from the 1968 pandemic H3N2 strain (A/Hong Kong/1/68) guided by a comprehensive H3 HA sequence conservation analysis. The biophysical properties of the designed immunogen were further improved by C-terminal fusion of a trimerization motif, ``isoleucine-zipper'', or ``foldon''. These immunogens elicited cross-reactive, antiviral antibodies and conferred partial protection against a lethal, homologous HK68 virus challenge in vivo. Furthermore, bacterial expression of these immunogens is economical and facilitates rapid scale-up.
Resumo:
Inaccuracies in prediction of circulating viral strain genotypes and the possibility of novel reassortants causing a pandemic outbreak necessitate the development of an anti-influenza vaccine with increased breadth of protection and potential for rapid production and deployment. The hemagglutinin (HA) stem is a promising target for universal influenza vaccine as stem-specific antibodies have the potential to be broadly cross-reactive towards different HA subtypes. Here, we report the design of a bacterially expressed polypeptide that mimics a H5 HA stem by protein minimization to focus the antibody response towards the HA stem. The HA mini-stem folds as a trimer mimicking the HA prefusion conformation. It is resistant to thermal/chemical stress, and it binds to conformation-specific, HA stem-directed broadly neutralizing antibodies with high affinity. Mice vaccinated with the group 1 HA mini-stems are protected from morbidity and mortality against lethal challenge by both group 1 (H5 and H1) and group 2 (H3) influenza viruses, the first report of cross-group protection. Passive transfer of immune serum demonstrates the protection is mediated by stem-specific antibodies. Furthermore, antibodies indudced by these HA stems have broad HA reactivity, yet they do not have antibody-dependent enhancement activity.