6 resultados para information controls
em Indian Institute of Science - Bangalore - Índia
Resumo:
We report here the role of remote sensing (RS) and geographical information system (GIS) in the identification of geomorphic records and understanding of the local controls on the retreat of glaciers of the Baspa Valley, Himachal Pradesh, India. The geomorphic records mapped are accumulation zone, exposed ablation zone, moraine-covered ablation zone, snout, deglaciated valley, lateral moraine, medial moraine, terminal moraine and hanging glacier. Details of these features and stages of deglaciation have been extracted from RS data and mapped in a GIS environment. Glacial geomorphic data have been generated for 22 glaciers of the Baspa Valley. The retreat of glaciers has been estimated using the glacial maxima observed on satellite images. On the basis of percentage of retreat and the critical analysis of glacial geomorphic data for 22 glaciers of the Baspa Valley, they are classified into seven categories of very low to very very high retreat. From the analysis of the above 22 glaciers, it has been found that other than global warming, the retreat of glaciers of the Baspa Valley is inversely proportional to the size of the accumulation zone and the ratio of the moraine covered ablation/exposed ablation zone.
Resumo:
We study the optimal control problem of maximizing the spread of an information epidemic on a social network. Information propagation is modeled as a susceptible-infected (SI) process, and the campaign budget is fixed. Direct recruitment and word-of-mouth incentives are the two strategies to accelerate information spreading (controls). We allow for multiple controls depending on the degree of the nodes/individuals. The solution optimally allocates the scarce resource over the campaign duration and the degree class groups. We study the impact of the degree distribution of the network on the controls and present results for Erdos-Renyi and scale-free networks. Results show that more resource is allocated to high-degree nodes in the case of scale-free networks, but medium-degree nodes in the case of Erdos-Renyi networks. We study the effects of various model parameters on the optimal strategy and quantify the improvement offered by the optimal strategy over the static and bang-bang control strategies. The effect of the time-varying spreading rate on the controls is explored as the interest level of the population in the subject of the campaign may change over time. We show the existence of a solution to the formulated optimal control problem, which has nonlinear isoperimetric constraints, using novel techniques that is general and can be used in other similar optimal control problems. This work may be of interest to political, social awareness, or crowdfunding campaigners and product marketing managers, and with some modifications may be used for mitigating biological epidemics.
Resumo:
Heat shock promoters of mycobacteria are strong promoters that become rapidly upregulated during macrophage infection and thus serve as valuable candidates for expressing foreign antigens in recombinant BCG vaccine. In the present study, a new heat shock promoter controlling the expression of the groESL1 operon was identified and characterized. Mycobacterium tuberculosis groESL1 operon codes for the immunodominant 10 kDa (Rv3418c, GroES/Cpn10/Hsp10) and 60 kDa (Rv3417c, GroEL1/Cpn60.1/Hsp60) heat shock proteins. The basal promoter region was 115 bp, while enhanced activity was seen only with a 277-bp fragment. No promoter element was seen in the groES-groEL1 intergenic region. This operon codes for a bicistronic mRNA transcript as determined by reverse transcriptase-PCR and Northern blot analysis. Primer extension analysis identified two transcriptional start sites (TSSs) TSS1 (-236) and TSS2 (-171), out of which one (TSS2) was heat inducible. The groE promoter was more active than the groEL2 promoter in Mycobacterium smegmatis. Further, it was found to be differentially regulated under stress conditions, while the groEL2 promoter was constitutive.
Resumo:
In this paper, we present a decentralized dynamic load scheduling/balancing algorithm called ELISA (Estimated Load Information Scheduling Algorithm) for general purpose distributed computing systems. ELISA uses estimated state information based upon periodic exchange of exact state information between neighbouring nodes to perform load scheduling. The primary objective of the algorithm is to cut down on the communication and load transfer overheads by minimizing the frequency of status exchange and by restricting the load transfer and status exchange within the buddy set of a processor. It is shown that the resulting algorithm performs almost as well as a perfect information algorithm and is superior to other load balancing schemes based on the random sharing and Ni-Hwang algorithms. A sensitivity analysis to study the effect of various design parameters on the effectiveness of load balancing is also carried out. Finally, the algorithm's performance is tested on large dimensional hypercubes in the presence of time-varying load arrival process and is shown to perform well in comparison to other algorithms. This makes ELISA a viable and implementable load balancing algorithm for use in general purpose distributed computing systems.
Resumo:
Protocols for secure archival storage are becoming increasingly important as the use of digital storage for sensitive documents is gaining wider practice. Wong et al.[8] combined verifiable secret sharing with proactive secret sharing without reconstruction and proposed a verifiable secret redistribution protocol for long term storage. However their protocol requires that each of the receivers is honest during redistribution. We proposed[3] an extension to their protocol wherein we relaxed the requirement that all the recipients should be honest to the condition that only a simple majority amongst the recipients need to be honest during the re(distribution) processes. Further, both of these protocols make use of Feldman's approach for achieving integrity during the (redistribution processes. In this paper, we present a revised version of our earlier protocol, and its adaptation to incorporate Pedersen's approach instead of Feldman's thereby achieving information theoretic secrecy while retaining integrity guarantees.