82 resultados para MIC MAC
Resumo:
The motion of marine vessels has traditionally been studied using two different approaches: manoeuvring and seakeeping. These two approaches use different reference frames and coordinate systems to describe the motion. This paper derives the kinematic models that characterize the transformation of motion variables (position, velocity, accelerations) and forces between the different coordinate systems used in these theories. The derivations hereby presented are done in terms of the formalism adopted in robotics. The advantage of this formulation is the use of matrix notation and operations. As an application, the transformation of linear equations of motion used in seakeeping into body-fixed coordinates is considered for both zero and forward speed.
Resumo:
The Marine Systems Simulator (MSS) is an environment which provides the necessary resources for rapid implementation of mathematical models of marine systems with focus on control system design. The simulator targets models¡Xand provides examples ready to simulate¡Xof different floating structures and its systems performing various operations. The platform adopted for the development of MSS is Matlab/Simulink. This allows a modular simulator structure, and the possibility of distributed development. Openness and modularity of software components have been the prioritized design principles, which enables a systematic reuse of knowledge and results in efficient tools for research and education. This paper provides an overview of the structure of the MSS, its features, current accessability, and plans for future development.
Resumo:
Loop detectors are widely used on the motorway networks where they provide point speed and traffic volumes. Models have been proposed for temporal and spatial generalization of speed for average travel time estimation. Advancement in technology provides complementary data sources such as Bluetooth MAC Scanner (BMS), detecting the MAC ID of the Bluetooth devices transported by the traveller. Matching the data from two BMS stations provides individual vehicle travel time. Generally, on the motorways loops are closely spaced, whereas BMS are placed few kilometres apart. In this research, we fuse BMSs and loops data to define the trajectories of the Bluetooth vehicles. The trajectories are utilised to estimate the travel time statistics between any two points along the motorway. The proposed model is tested using simulation and validated with real data from Pacific motorway, Brisbane. Comparing the model with the linear interpolation based trajectory provides significant improvements.
Resumo:
We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.
Resumo:
The power of sharing computation in a cryptosystem is crucial in several real-life applications of cryptography. Cryptographic primitives and tasks to which threshold cryptosystems have been applied include variants of digital signature, identification, public-key encryption and block ciphers etc. It is desirable to extend the domain of cryptographic primitives which threshold cryptography can be applied to. This paper studies threshold message authentication codes (threshold MACs). Threshold cryptosystems usually use algebraically homomorphic properties of the underlying cryptographic primitives. A typical approach to construct a threshold cryptographic scheme is to combine a (linear) secret sharing scheme with an algebraically homomorphic cryptographic primitive. The lack of algebraic properties of MACs rules out such an approach to share MACs. In this paper, we propose a method of obtaining a threshold MAC using a combinatorial approach. Our method is generic in the sense that it is applicable to any secure conventional MAC by making use of certain combinatorial objects, such as cover-free families and their variants. We discuss the issues of anonymity in threshold cryptography, a subject that has not been addressed previously in the literature in the field, and we show that there are trade-offis between the anonymity and efficiency of threshold MACs.
Resumo:
Donna Hewitt (composer/vocalist/emic designer), Avril Huddy (choreographer/dancer) and Vanessa Mafé (dancer). Donna is performing with her invention called the eMic (extended mic-stand interface controller). The work explores the use of gesture to control live sound processing during the performance. The work was choreographed by Avril Huddy.
Resumo:
Staphylococcus saprophyticus is an important cause of urinary tract infection (UTI), particularly among young women, and is second only to uropathogenic Escherichia coli as the most frequent cause of UTI. The molecular mechanisms of urinary tract colonization by S. saprophyticus remain poorly understood. We have identified a novel 6.84 kb plasmid-located adhesin-encoding gene in S. saprophyticus strain MS1146 which we have termed uro-adherence factor B (uafB). UafB is a glycosylated serine-rich repeat protein that is expressed on the surface of S. saprophyticus MS1146. UafB also functions as a major cell surface hydrophobicity factor. To characterize the role of UafB we generated an isogenic uafB mutant in S. saprophyticus MS1146 by interruption with a group II intron. The uafB mutant had a significantly reduced ability to bind to fibronectin and fibrinogen. Furthermore, we show that a recombinant protein containing the putative binding domain of UafB binds specifically to fibronectin and fibrinogen. UafB was not involved in adhesion in a mouse model of UTI; however, we observed a striking UafB-mediated adhesion phenotype to human uroepithelial cells. We have also identified genes homologous to uafB in other staphylococci which, like uafB, appear to be located on transposable elements. Thus, our data indicate that UafB is a novel adhesin of S. saprophyticus that contributes to cell surface hydrophobicity, mediates adhesion to fibronectin and fibrinogen, and exhibits tropism for human uroepithelial cells.
Resumo:
Autotransporter (AT) proteins are found in all Escherichia coli pathotypes and are often associated with virulence. In this study we took advantage of the large number of available E. coli genome sequences to perform an in-depth bioinformatic analysis of AT-encoding genes. Twenty-eight E. coli genome sequences were probed using an iterative approach, which revealed a total of 215 AT-encoding sequences that represented three major groups of distinct domain architecture: (i) serine protease AT proteins, (ii) trimeric AT adhesins and (iii) AIDA-I-type AT proteins. A number of subgroups were identified within each broad category, and most subgroups contained at least one characterized AT protein; however, seven subgroups contained no previously described proteins. The AIDA-I-type AT proteins represented the largest and most diverse group, with up to 16 subgroups identified from sequence-based comparisons. Nine of the AIDA-I-type AT protein subgroups contained at least one protein that possessed functional properties associated with aggregation and/or biofilm formation, suggesting a high degree of redundancy for this phenotype. The Ag43, YfaL/EhaC, EhaB/UpaC and UpaG subgroups were found in nearly all E. coli strains. Among the remaining subgroups, there was a tendency for AT proteins to be associated with individual E. coli pathotypes, suggesting that they contribute to tissue tropism or symptoms specific to different disease outcomes.
Resumo:
The majority of Escherichia coli strains isolated from urinary tract infections have the potential to express multiple fimbriae. Two of the most common fimbrial adhesins are type 1 fimbriae and pyelonephritis-associated pili (Pap). Previous research has shown that induced, plasmid-based expression of a Pap regulator, papB, and its close homologues can prevent inversion of the fim switch controlling the expression of type 1 fimbriae. The aim of the present study was to determine if this cross-regulation occurs when PapB is expressed from its native promoter in the chromosome of E. coli K-12 and clinical isolates. The regulation was examined in three ways: (1) mutated alleles of the pap regulatory region, including papB and papI, that maintain the pap promoter in either the off or the on phase were exchanged into the chromosome of both E. coli K-12 and the clinical isolate E. coli CFT073, and the effect on type 1 fimbrial expression was measured; (2) type 1 fimbrial expression was determined using a novel fimS : : gfp+ reporter system in mutants of the clinical isolate E. coli 536 in which combinations of complete fimbrial clusters had been deleted; (3) type 1 fimbrial expression was determined in a range of clinical isolates and compared with both the number of P clusters and their expression. All three approaches demonstrated that P expression represses type 1 fimbrial expression. Using a number of novel genetic approaches, this work extends the initial finding that PapB inhibits FimB recombination to the impact of this regulation in clinical isolates.
Resumo:
FimB and FimE are site-specific recombinases, part of the λ integrase family, and invert a 314 bp DNA switch that controls the expression of type 1 fimbriae in Escherichia coli. FimB and FimE differ in their activity towards the fim switch, with FimB catalysing inversion in both directions in comparison to the higher-frequency but unidirectional on-to-off recombination catalysed by FimE. Previous work has demonstrated that FimB, but not FimE, recombination is completely inhibited in vitro and in vivo by a regulator, PapB, expressed from a distinct fimbrial locus. The aim of this work was to investigate differences between FimB and FimE activity by exploiting the differential inhibition demonstrated by PapB. The research focused on genetic changes to the fim switch that alter recombinase binding and its structural context. FimB and FimE still recombined a switch in which the majority of fimS DNA was replaced with a larger region of non-fim DNA. This demonstrated a minimal requirement for FimB and FimE recombination of the Fim binding sites and associated inverted repeats. With the original leucine-responsive regulatory protein (Lrp) and integration host factor (IHF)-dependent structure removed, PapB was now able to inhibit both recombinases. The relative affinities of FimB and FimE were determined for the four ‘half sites’. This analysis, along with the effect of extensive swaps and duplications of the half sites on recombination frequency, demonstrated that FimB recruitment and therefore subsequent activity was dependent on a single half site and its context, whereas FimE recombination was less stringent, being able to interact initially with two half sites with equally high affinity. While increasing FimB recombination frequencies failed to overcome PapB repression, mutations made in recombinase binding sites resulted in inhibition of FimE recombination by PapB. Overall, the data support a model in which the recombinases differ in loading order and co-operative interactions. PapB exploits this difference and FimE becomes susceptible when its normal loading is restricted or changed.
Resumo:
This thesis examined the ability to predict the emergence of bacteria resistant to antibiotics using genetic markers in the bacteria. Bacteria containing the genetic markers were able to become resistant to antibiotics, whereas bacteria that did not have the genetic markers remained susceptible. Existing techniques can identify the presence of resistance by looking at the characteristics of the bacteria during growth. However, having the ability to predict antibiotic resistance before it emerges could improve the preservation of currently available antibiotics and minimise treatment failure.
Resumo:
A framework supporting the systematic development of safety cases for Unmanned Aircraft System (UAS) operations in a broad range of civil and commercial applications is presented. The case study application is the use of UAS for disaster response. In those States where regulations do not preclude UAS operations altogether, approvals for UAS operations can be granted on a case-by-case basis contingent on the provision of a safety case acceptable to the relevant National Airworthiness Authority (NAA). A safety case for UAS operations must show how the risks associated with the hazards have been managed to an acceptable level. The foundational components necessary for structuring and assessing these safety cases have not yet been proposed. Barrier-bow-tie models are used in this paper to structure the safety case for the two primary hazards of 1) a ground impact, and 2) a Mid-Air Collision (MAC). The models establish the set of Risk Control Variables (RCVs) available to reduce the risk. For the ground-impact risk model, seven RCVs are identified which in combination govern the probability of an accident. Similarly, ten RCVs are identified within the MAC model. The effectiveness of the RCVs and how they can implemented in terms of processes, policies, devices, practices, or other actions for each of the case-study applications are discussed. The framework presented can provide for the more systematic and consistent regulation of UAS through a "safety target" approach.
Resumo:
The forthcoming NIST’s Advanced Hash Standard (AHS) competition to select SHA-3 hash function requires that each candidate hash function submission must have at least one construction to support FIPS 198 HMAC application. As part of its evaluation, NIST is aiming to select either a candidate hash function which is more resistant to known side channel attacks (SCA) when plugged into HMAC, or that has an alternative MAC mode which is more resistant to known SCA than the other submitted alternatives. In response to this, we perform differential power analysis (DPA) on the possible smart card implementations of some of the recently proposed MAC alternatives to NMAC (a fully analyzed variant of HMAC) and HMAC algorithms and NMAC/HMAC versions of some recently proposed hash and compression function modes. We show that the recently proposed BNMAC and KMDP MAC schemes are even weaker than NMAC/HMAC against the DPA attacks, whereas multi-lane NMAC, EMD MAC and the keyed wide-pipe hash have similar security to NMAC against the DPA attacks. Our DPA attacks do not work on the NMAC setting of MDC-2, Grindahl and MAME compression functions.
Resumo:
This study evaluated the complexity of calcium ion exchange with sodium exchanged weak acid cation resin (DOW MAC-3). Exchange equilibria recorded for a range of different solution normalities revealed profiles which were represented by conventional “L” or “H” type isotherms at low values of equilibrium concentration (Ce) of calcium ions, plus a superimposed region of increasing calcium uptake was observed at high Ce values. The loading of calcium ions was determined to be ca. 53.5 to 58.7 g/kg of resin when modelling only the sorption curve created at low Ce values,which exhibited a well-defined plateau. The calculated calcium ion loading capacity for DOWMAC-3 resin appeared to correlate with the manufacturer's recommendation. The phenomenon of super equivalent ion exchange (SEIX) was observed when the “driving force” for the exchange process was increased in excess of 2.25 mmol calcium ions per gram of resin in the starting solution. This latter event was explained in terms of displacement of sodium ions from sodium hydroxide solution which remained in the resin bead following the initial conversion of the as supplied “H+” exchanged resin sites to the “Na+” version required for softening studies. Evidence for hydrolysis of a small fraction of the sites on the sodium exchanged resin surface was noted. The importance of carefully choosing experimental parameters was discussed especially in relation to application of the Langmuir–Vageler expression. This latter model which compared the ratio of the initial calcium ion concentration in solution to resin mass, versus final equilibrium loading of the calcium ions on the resin; was discovered to be an excellent means of identifying the progress of the calcium–sodium ion exchange process. Moreover, the Langmuir–Vageler model facilitated standardization of various calcium–sodium ion exchange experiments which allowed systematic experimental design.
Resumo:
In his 1987 book, The Media Lab: Inventing the Future at MIT, Stewart Brand provides an insight into the visions of the future of the media in the 1970s and 1980s. 1 He notes that Nicolas Negroponte made a compelling case for the foundation of a media laboratory at MIT with diagrams detailing the convergence of three sectors of the media—the broadcast and motion picture industry; the print and publishing industry; and the computer industry. Stewart Brand commented: ‘If Negroponte was right and communications technologies really are converging, you would look for signs that technological homogenisation was dissolving old boundaries out of existence, and you would expect an explosion of new media where those boundaries used to be’. Two decades later, technology developers, media analysts and lawyers have become excited about the latest phase of media convergence. In 2006, the faddish Time Magazine heralded the arrival of various Web 2.0 social networking services: You can learn more about how Americans live just by looking at the backgrounds of YouTube videos—those rumpled bedrooms and toy‐strewn basement rec rooms—than you could from 1,000 hours of network television. And we didn’t just watch, we also worked. Like crazy. We made Facebook profiles and Second Life avatars and reviewed books at Amazon and recorded podcasts. We blogged about our candidates losing and wrote songs about getting dumped. We camcordered bombing runs and built open‐source software. America loves its solitary geniuses—its Einsteins, its Edisons, its Jobses—but those lonely dreamers may have to learn to play with others. Car companies are running open design contests. Reuters is carrying blog postings alongside its regular news feed. Microsoft is working overtime to fend off user‐created Linux. We’re looking at an explosion of productivity and innovation, and it’s just getting started, as millions of minds that would otherwise have drowned in obscurity get backhauled into the global intellectual economy. The magazine announced that Time’s Person of the Year was ‘You’, the everyman and everywoman consumer ‘for seizing the reins of the global media, for founding and framing the new digital democracy, for working for nothing and beating the pros at their own game’. This review essay considers three recent books, which have explored the legal dimensions of new media. In contrast to the unbridled exuberance of Time Magazine, this series of legal works displays an anxious trepidation about the legal ramifications associated with the rise of social networking services. In his tour de force, The Future of Reputation: Gossip, Rumor, and Privacy on the Internet, Daniel Solove considers the implications of social networking services, such as Facebook and YouTube, for the legal protection of reputation under privacy law and defamation law. Andrew Kenyon’s edited collection, TV Futures: Digital Television Policy in Australia, explores the intersection between media law and copyright law in the regulation of digital television and Internet videos. In The Future of the Internet and How to Stop It, Jonathan Zittrain explores the impact of ‘generative’ technologies and ‘tethered applications’—considering everything from the Apple Mac and the iPhone to the One Laptop per Child programme.