171 resultados para Pairing symmetry


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this study, a tandem LC-MS (Waters Xevo TQ) MRM-based MS method was developed for rapid, broad profiling of hydrophilic metabolites from biological samples, in either positive or negative ion modes without the need for an ion pairing reagent, using a reversed-phase pentafluorophenylpropyl (PFPP) column. The developed method was successfully applied to analyze various biological samples from C57BL/6 mice, including urine, duodenum, liver, plasma, kidney, heart, and skeletal muscle. As result, a total 112 of hydrophilic metabolites were detected within 8 min of running time to obtain a metabolite profile of the biological samples. The analysis of this number of hydrophilic metabolites is significantly faster than previous studies. Classification separation for metabolites from different tissues was globally analyzed by PCA, PLS-DA and HCA biostatistical methods. Overall, most of the hydrophilic metabolites were found to have a "fingerprint" characteristic of tissue dependency. In general, a higher level of most metabolites was found in urine, duodenum, and kidney. Altogether, these results suggest that this method has potential application for targeted metabolomic analyzes of hydrophilic metabolites in a wide ranges of biological samples.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The mineral ettringite has been studied using a number of techniques, including XRD, SEM with EDX, thermogravimetry and vibrational spectroscopy. The mineral proved to be composed of 53% of ettringite and 47% of thaumasite in a solid solution. Thermogravimetry shows a mass loss of 46.2% up to 1000 °C. Raman spectroscopy identifies multiple sulphate symmetric stretching modes in line with the three sulphate crystallographically different sites. Raman spectroscopy also identifies a band at 1072 cm−1 attributed to a carbonate symmetric stretching mode, confirming the presence of thaumasite. The observation of multiple bands in the ν4 spectral region between 700 and 550 cm−1 offers evidence for the reduction in symmetry of the sulphate anion from Td to C2v or even lower symmetry. The Raman band at 3629 cm−1 is assigned to the OH unit stretching vibration and the broad feature at around 3487 cm−1 to water stretching bands. Vibrational spectroscopy enables an assessment of the molecular structure of natural ettringite to be made.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The microstructure of artificial grain boundaries in YBa2Cu3O7-δ (YBCO) thin films grown on [001] tilt YZrO2 (YSZ) bicrystal substrates has been characterized using transmission electron microscopy and atomic force microscopy. Despite a relatively straight morphology of the substrate boundaries, the film boundaries were wavy. The waviness was a result of the combined effects of grooving at the substrate boundaries prior to the film deposition and an island-growth mechanism for YBCO on YSZ substrates. The dihedral angle of the groove walls varied with the misorientation angle and depended on the symmetry of the substrate boundary. The amplitudes of the film boundary waviness compared well with the widths of the grooves. In addition, the grooves induced local bending of the YBCO lattice planes and additional tilt components perpendicular to the c-axis close to the film boundaries. © 1995.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we have investigated on the natural wendwilsonite mineral with the formulae Ca2(Mg,Co)(AsO4)2⋅2(H2O). Raman spectroscopy complimented with infrared spectroscopy has been used to determine the molecular structure of the wendwilsonite arsenate mineral. A comparison is made with the roselite mineral group with formula Ca2B(AsO4)2⋅2H2O (where B may be Co, Fe2+, Mg, Mn, Ni, Zn). The Raman spectra of the arsenate related to tetrahedral arsenate clusters with stretching region shows strong differences between that of wendwilsonite and the roselite arsenate minerals which is attributed to the cation substitution for calcium in the structure. The Raman arsenate (AsO4)3− stretching region shows strong differences between that of wendwilsonite and the roselite arsenate minerals which is attributed to the cation substitution for calcium in the structure. In the infrared spectra complexity exists of multiple to tetrahedral (AsO4)3− clusters with antisymmetric stretching vibrations observed indicating a reduction of the tetrahedral symmetry. This loss of degeneracy is also reflected in the bending modes. Strong Raman bands around 450 cm−1 are assigned to ν4 bending modes. Multiple bands in the 350–300 cm−1 region assigned to ν2 bending modes provide evidence of symmetry reduction of the arsenate anion. Three broad bands for wendwilsonite found at 3332, 3119 and 3001 cm−1 are assigned to OH stretching bands. By using a Libowitzky empirical equation, hydrogen bond distances of 2.65 and 2.75 Å are estimated. Vibrational spectra enable the molecular structure of the wendwilsonite mineral to be determined and whilst similarities exist in the spectral patterns with the roselite mineral group, sufficient differences exist to be able to determine the identification of the minerals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The mineral glauberite is one of many minerals formed in evaporite deposits. The mineral glauberite has been studied using a combination of scanning electron microscopy with energy dispersive X-ray analysis and infrared and Raman spectroscopy. Qualitative chemical analysis shows a homogeneous phase, composed by sulphur, calcium and sodium. Glauberite is characterized by a very intense Raman band at 1002 cm-1 with Raman bands observed at 1107, 1141, 1156 and 1169 cm-1 attributed to the sulphate ν3 antisymmetric stretching vibration. Raman bands at 619, 636, 645 and 651 cm-1 are assigned to the ν4 sulphate bending modes. Raman bands at 454, 472 and 486 cm-1 are ascribed to the ν2 sulphate bending modes. The observation of multiple bands is attributed to the loss of symmetry of the sulphate anion. Raman spectroscopy is superior to infrared spectroscopy for the determination of glauberite.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The multianion mineral gartrellite PbCu(Fe3+,Cu)(AsO4)2(OH,H2O)2 has been studied by a combination of Raman and infrared spectroscopy. The molecular structure of gartrellite is assessed. Gartrellite is one of the tsumcorite mineral group based upon arsenate and/or sulphate anions. Crystal symmetry is either triclinic in the case of an ordered occupation of two cationic sites, triclinic due to ordering of the H bonds in the case of species with two water molecules per formula unit, or monoclinic in the other cases. Characteristic Raman spectra of the mineral gartrellite enable the assignment of the bands to specific vibrational modes. These spectra are related to the structure of gartrellite. The position of the hydroxyl and water stretching vibrations are related to the strength of the hydrogen bond formed between the OH unit and the AsO3/4 anion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Drosophila possesses the core gene silencing machinery but, like all insects, lacks the canonical RNA-dependent RNA polymerases (RdRps) that in C. elegans either trigger or enhance two major small RNA-dependent gene silencing pathways. Introduction of two different nematode RdRps into Drosophila showed them to be functional, resulting in differing silencing activities. While RRF-1 enhanced transitive dsRNA-dependent silencing, EGO-1 triggered dsRNA-independent silencing, specifically of transgenes. The strain w; da-Gal4; UAST-ego-1, constitutively expressing ego-1, is capable of silencing transgene including dsRNA hairpin upon a single cross, which created a powerful tool for research in Drosophila. In C. elegans, EGO-1 is involved in transcriptional gene silencing (TGS) of chromosome regions that are unpaired during meiosis. There was no opportunity for meiotic interactions involving EGO-1 in Drosophila that would explain the observed transgene silencing. Transgene DNA is, however, unpaired during the pairing of chromosomes in embryonic mitosis that is an unusual characteristic of Diptera, suggesting that in Drosophila, EGO-1 triggers transcriptional silencing of unpaired DNA during embryonic mitosis. © 2012 Springer Basel.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Sessional Academic Success (SAS) project is a sustainable, distributed model for supporting sessional staff at QUT. Developed by the Learning and Teaching Unit. SAS complements our Sessional Academic Program (SAP): a sequence of formal academic development workshops explained in complementary nomination. SAS recognises that while these programs are very well received and a crucial aspect of preparing and advancing sessional teachers, they are necessarily encapsulated in the moment of their delivery and are generic, as they address all faculties (with their varied cultures, processes and pedagogies). The SAS project extends this formal, centrally offered activity into local, ‘just in time’, ongoing support within schools. It takes a distributed leadership approach. Experienced sessional academics are recruited and employed as Sessional Academic Success Advisors (SASAs). They provide sessional staff in their schools with contextually specific, needs based, peer-to-peer development opportunities; one-on-one advice on classroom management and strategies for success; and help to trouble-shoot challenges. The SASAs are trained by the Learning and Teaching Unit co-ordinator, and ongoing support is provided centrally and by school-based co-ordinators. This team approach situates the SASAs at the centre of an organisation map (see diagram of support relationships below). The SAS project aims to support sessional staff in their professional development by: • Offering contextual, needs-based support at school level by harnessing local expertise; • Providing further development opportunities that are local and focal; SAS aims to retain Sessional Staff by: • Responding to self-nominated requests for support and ‘just in time’, safe and reliable advice in times of need; • Building sessional staff confidence through help with dealing with challenges from a trusted peer; • Building a supportive academic community for sessional staff, which helps them feel a part of faculty life, and a community of teaching practice. SAS aims to support sessional staff in the development of academic teaching careers by: • Recognising the capacity of experienced sessional staff to support their peers in ways that are unique, valuable and valued and providing the agency to do so; • Providing career advancement and leadership opportunities for sessional staff. SAS takes unique approaches within each school using strategies such as: • Welcomes and schools orientation by SASAs; • Regular check ins; face-to-face advice and online support; • Compiling local resources to complement university wide resources. • Sessional-to-sessional ‘just in time’ training (eg. assessment and marking when marking commences); • Peer feedback and mentoring (the opportunities to sit in more experiences sessionals’ classes; • Sessional staff awards (nominated by students); • Communities of practice to discuss topics and issues with a view to (and support for) publishing on learning and teaching. In these ways, SASAs complement support offered by unit coordinators, administrators, and the Learning and Teaching Unit. Pairing senior and ‘understudy’ advisors ensures a line of succession, sustainability and continuity. A pilot program commenced in 2012 involving three schools (Psychology and Social Work; Electrical Engineering and Computer Science; Media, Entertainment and Creative Arts). It will be expanded across schools in 2013.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Clustering identities in a broadcast video is a useful task to aid in video annotation and retrieval. Quality based frame selection is a crucial task in video face clustering, to both improve the clustering performance and reduce the computational cost. We present a frame work that selects the highest quality frames available in a video to cluster the face. This frame selection technique is based on low level and high level features (face symmetry, sharpness, contrast and brightness) to select the highest quality facial images available in a face sequence for clustering. We also consider the temporal distribution of the faces to ensure that selected faces are taken at times distributed throughout the sequence. Normalized feature scores are fused and frames with high quality scores are used in a Local Gabor Binary Pattern Histogram Sequence based face clustering system. We present a news video database to evaluate the clustering system performance. Experiments on the newly created news database show that the proposed method selects the best quality face images in the video sequence, resulting in improved clustering performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map. Selective-identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in an adaptive-identity attack the adversary is allowed to choose this identity adaptively. Our first system—BB1—is based on the well studied decisional bilinear Diffie–Hellman assumption, and extends naturally to systems with hierarchical identities, or HIBE. Our second system—BB2—is based on a stronger assumption which we call the Bilinear Diffie–Hellman Inversion assumption and provides another approach to building IBE systems. Our first system, BB1, is very versatile and well suited for practical applications: the basic hierarchical construction can be efficiently secured against chosen-ciphertext attacks, and further extended to support efficient non-interactive threshold decryption, among others, all without using random oracles. Both systems, BB1 and BB2, can be modified generically to provide “full” IBE security (i.e., against adaptive-identity attacks), either using random oracles, or in the standard model at the expense of a non-polynomial but easy-to-compensate security reduction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Distributed-password public-key cryptography (DPwPKC) allows the members of a group of people, each one holding a small secret password only, to help a leader to perform the private operation, associated to a public-key cryptosystem. Abdalla et al. recently defined this tool [1], with a practical construction. Unfortunately, the latter applied to the ElGamal decryption only, and relied on the DDH assumption, excluding any recent pairing-based cryptosystems. In this paper, we extend their techniques to support, and exploit, pairing-based properties: we take advantage of pairing-friendly groups to obtain efficient (simulation-sound) zero-knowledge proofs, whose security relies on the Decisional Linear assumption. As a consequence, we provide efficient protocols, secure in the standard model, for ElGamal decryption as in [1], but also for Linear decryption, as well as extraction of several identity-based cryptosystems [6,4]. Furthermore, we strenghten their security model by suppressing the useless testPwd queries in the functionality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We offer an exposition of Boneh, Boyen, and Goh’s “uber-assumption” family for analyzing the validity and strength of pairing assumptions in the generic-group model, and augment the original BBG framework with a few simple but useful extensions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we address the control design problem of positioning of over-actuated marine vehicles with control allocation. The proposed design is based on a combined position and velocity loops in a multi-variable anti-windup implementation together with a control allocation mapping. The vehicle modelling is considered with appropriate simplifications related to low-speed manoeuvring hydrodynamics and vehicle symmetry. The control design is considered together with a control allocation mapping. We derive analytical tuning rules based on requirements of closed-loop stability and performance. The anti- windup implementation of the controller is obtained by mapping the actuator-force constraint set into a constraint set for the generalized forces. This approach ensures that actuation capacity is not violated by constraining the generalized control forces; thus, the control allocation is simplified since it can be formulated as an unconstrained problem. The mapping can also be modified on-line based on actuator availability to provide actuator-failure accommodation. We provide a proof of the closed-loop stability and illustrate the performance using simulation scenarios for an open-frame underwater vehicle.