501 resultados para METABOLIC NETWORKS
Resumo:
Molecular interactions that underlie pathophysiological states are being elucidated using techniques that profile proteomicend points in cellular systems. Within the field of cancer research, protein interaction networks play pivotal roles in the establishment and maintenance of the hallmarks of malignancy, including cell division, invasion, and migration. Multiple complementary tools enable a multifaceted view of how signal protein pathway alterations contribute to pathophysiological states.One pivotal technique is signal pathway profiling of patient tissue specimens. This microanalysis technology provides a proteomic snapshot at one point in time of cells directly procured from the native context of a tumor micro environment. To study the adaptive patterns of signal pathway events over time, before and after experimental therapy, it is necessary to obtain biopsies from patients before, during, and after therapy. A complementary approach is the profiling of cultured cell lines with and without treatment. Cultured cell models provide the opportunity to study short-term signal changes occurring over minutes to hours. Through this type of system, the effects of particular pharmacological agents may be used to test the effects of signal pathway inhibition or activation on multiple endpoints within a pathway. The complexity of the data generated has necessitated the development of mathematical models for optimal interpretation of interrelated signaling pathways. In combination,clinical proteomic biopsy profiling, tissue culture proteomic profiling, and mathematical modeling synergistically enable a deeper understanding of how protein associations lead to disease states and present new insights into the design of therapeutic regimens.
Resumo:
We propose a reliable and ubiquitous group key distribution scheme that is suitable for ad hoc networks. The scheme has self-initialisation and self-securing features. The former feature allows a cooperation of an arbitrary number of nodes to initialise the system, and it also allows node admission to be performed in a decentralised fashion. The latter feature allows a group member to determine the group key remotely while maintaining the system security. We also consider a decentralised solution of establishing secure point-to-point communication. The solution allows a new node to establish a secure channel with every existing node if it has pre-existing secure channels with a threshold number of the existing nodes.
Resumo:
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.
Resumo:
Generally wireless sensor networks rely of many-to-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding or change the data that carry through it. A sinkhole attack causes an important threat to sensor networks and it should be considered that the sensor nodes are mostly spread out in open areas and of weak computation and battery power. In order to detect the intruder in a sinkhole attack this paper suggests an algorithm which firstly finds a group of suspected nodes by analyzing the consistency of data. Then, the intruder is recognized efficiently in the group by checking the network flow information. The proposed algorithm's performance has been evaluated by using numerical analysis and simulations. Therefore, accuracy and efficiency of algorithm would be verified.
Resumo:
Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ communication in using WSNs can cause difficulty in use of security and protection in WSNs. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such networks require security plan due to various limitations of resources and the prominent characteristics of a wireless sensor network which is a considerable challenge. This article is an extensive review about problems of WSNs security, which examined recently by researchers and a better understanding of future directions for WSN security.
Resumo:
Large arrays and networks of carbon nanotubes, both single- and multi-walled, feature many superior properties which offer excellent opportunities for various modern applications ranging from nanoelectronics, supercapacitors, photovoltaic cells, energy storage and conversation devices, to gas- and biosensors, nanomechanical and biomedical devices etc. At present, arrays and networks of carbon nanotubes are mainly fabricated from the pre-fabricated separated nanotubes by solution-based techniques. However, the intrinsic structure of the nanotubes (mainly, the level of the structural defects) which are required for the best performance in the nanotube-based applications, are often damaged during the array/network fabrication by surfactants, chemicals, and sonication involved in the process. As a result, the performance of the functional devices may be significantly degraded. In contrast, directly synthesized nanotube arrays/networks can preclude the adverse effects of the solution-based process and largely preserve the excellent properties of the pristine nanotubes. Owing to its advantages of scale-up production and precise positioning of the grown nanotubes, catalytic and catalyst-free chemical vapor depositions (CVD), as well as plasma-enhanced chemical vapor deposition (PECVD) are the methods most promising for the direct synthesis of the nanotubes.
Resumo:
Service mismatches involve the adaptation of structural and behavioural interfaces of services, which in practice incurs long lead times through manual, coding e ort. We propose a framework, complementary to conventional service adaptation, to extract comprehensive and seman- tically normalised service interfaces, useful for interoperability in large business networks and the Internet of Services. The framework supports introspection and analysis of large and overloaded operational signa- tures to derive focal artefacts, namely the underlying business objects of services. A more simpli ed and comprehensive service interface layer is created based on these, and rendered into semantically normalised in- terfaces, given an ontology accrued through the framework from service analysis history. This opens up the prospect of supporting capability comparisons across services, and run-time request backtracking and ad- justment, as consumers discover new features of a service's operations through corresponding features of similar services. This paper provides a rst exposition of the service interface synthesis framework, describing patterns having novel requirements for unilateral service adaptation, and algorithms for interface introspection and business object alignment. A prototype implementation and analysis of web services drawn from com- mercial logistic systems are used to validate the algorithms and identify open challenges and future research directions.
Resumo:
Effective control of morphology and electrical connectivity of networks of single-walled carbon nanotubes (SWCNTs) by using rough, nanoporous silica supports of Fe catalyst nanoparticles in catalytic chemical vapor deposition is demonstrated experimentally. The very high quality of the nanotubes is evidenced by the G-to-D Raman peak ratios (>50) within the range of the highest known ratios. Transitions from separated nanotubes on smooth SiO2 surface to densely interconnected networks on the nanoporous SiO2 are accompanied by an almost two-order of magnitude increase of the nanotube density. These transitions herald the hardly detectable onset of the nanoscale connectivity and are confirmed by the microanalysis and electrical measurements. The achieved effective nanotube interconnection leads to the dramatic, almost three-orders of magnitude decrease of the SWCNT network resistivity compared to networks of similar density produced by wet chemistry-based assembly of preformed nanotubes. The growth model, supported by multiscale, multiphase modeling of SWCNT nucleation reveals multiple constructive roles of the porous catalyst support in facilitating the catalyst saturation and SWCNT nucleation, consistent with the observed higher density of longer nanotubes. The associated mechanisms are related to the unique surface conditions (roughness, wettability, and reduced catalyst coalescence) on the porous SiO2 and the increased carbon supply through the supporting porous structure. This approach is promising for the direct integration of SWCNT networks into Si-based nanodevice platforms and multiple applications ranging from nanoelectronics and energy conversion to bio- and environmental sensing.
Resumo:
This thesis focuses on providing reliable data transmissions in large-scale industrial wireless sensor networks through improving network layer protocols. It addresses three major problems: scalability, dynamic industrial environments and coexistence of multiple types of data traffic in a network. Theoretical developments are conducted, followed by simulation studies for verification of theoretic results. The approach proposed in this thesis has been shown to be effective for large-scale network implementation and to provide improved data transmission reliability for both periodic and sporadic traffic.
Resumo:
(Figure Presented) Unusual conductivity effects: Suitably functionalized dendrimers (see picture) are capable of forming truly covalent three-dimensional networks with remarkably high conductivity on electrochemical doping. Depending on the charging level of the electroactive components used as building blocks for the dendrimer core and the perimeter, two separated regimes of electrical conductivity can be observed.
Resumo:
In this paper, we reflect upon our experiences and those of our peers as doctoral students and early career researchers in an Australian political science department. We seek to explain and understand the diverse ways that participating in an unofficial Feminist Reading Group in our department affected our experiences. We contend that informal peer support networks like reading groups do more than is conventionally assumed, and may provide important avenues for sustaining feminist research in times of austerity, as well as supporting and enabling women and emerging feminist scholars in academia. Participating in the group created a community of belonging and resistance, providing women with personal validation, information and material support, as well as intellectual and political resources to understand and resist our position within the often hostile spaces of the University. While these experiences are specific to our context, time and location, they signal that peer networks may offer critical political resources for responding to the ways that women’s bodies and concerns are marginalised in increasingly competitive and corporatised university environments.
Resumo:
School connectedness is central to the long term well-being of adolescents, and high quality parent-child relationships facilitate school connectedness. This study examined the extent to which family relationship quality is associated with the school connectedness of pre- and early teenagers, and how this association varies with adolescent involvement in peer drinking networks. The sample consisted of 7,372 10-14 year olds recruited from 231 schools in 30 Australian communities. Participants completed the Communities that Care youth survey. A multi-level model of school connectedness was used, with a random term for school-level variation. Key independent variables included family relationship quality, peer drinking networks, and school grade. Control variables included child gender, sensation seeking, depression, child alcohol use, parent education, and language spoken at home. For grade 6 students, the association of family relationship quality and school connectedness was lower when peer drinking networks were present, and this effect was nonsignificant for older (grade 8) students. Post hoc analyses indicated that the effect for family relationship quality on school connectedness was nonsignificant when adolescents in grade 6 reported that the majority of friends consumed alcohol. The results point to the importance of familyschool partnerships in early intervention and prevention.