142 resultados para Regulated functions
Resumo:
Structural damage detection using measured dynamic data for pattern recognition is a promising approach. These pattern recognition techniques utilize artificial neural networks and genetic algorithm to match pattern features. In this study, an artificial neural network–based damage detection method using frequency response functions is presented, which can effectively detect nonlinear damages for a given level of excitation. The main objective of this article is to present a feasible method for structural vibration–based health monitoring, which reduces the dimension of the initial frequency response function data and transforms it into new damage indices and employs artificial neural network method for detecting different levels of nonlinearity using recognized damage patterns from the proposed algorithm. Experimental data of the three-story bookshelf structure at Los Alamos National Laboratory are used to validate the proposed method. Results showed that the levels of nonlinear damages can be identified precisely by the developed artificial neural networks. Moreover, it is identified that artificial neural networks trained with summation frequency response functions give higher precise damage detection results compared to the accuracy of artificial neural networks trained with individual frequency response functions. The proposed method is therefore a promising tool for structural assessment in a real structure because it shows reliable results with experimental data for nonlinear damage detection which renders the frequency response function–based method convenient for structural health monitoring.
Resumo:
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.
Resumo:
We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimage attack of Kelsey and Schneier, the herding attack of Kelsey and Kohno and the multicollision attack of Joux. Our attacks also apply to a large class of cascaded hash functions. Our second preimage attacks on the cascaded hash functions improve the results of Joux presented at Crypto’04. We also apply our attacks to the MD2 and GOST hash functions. Our second preimage attacks on the MD2 and GOST hash functions improve the previous best known short-cut second preimage attacks on these hash functions by factors of at least 226 and 254, respectively. Our herding and multicollision attacks on the hash functions based on generic checksum functions (e.g., one-way) are a special case of the attacks on the cascaded iterated hash functions previously analysed by Dunkelman and Preneel and are not better than their attacks. On hash functions with easily invertible checksums, our multicollision and herding attacks (if the hash value is short as in MD2) are more efficient than those of Dunkelman and Preneel.
Resumo:
In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.
Resumo:
Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.
Resumo:
In the modern era of information and communication technology, cryptographic hash functions play an important role in ensuring the authenticity, integrity, and nonrepudiation goals of information security as well as efficient information processing. This entry provides an overview of the role of hash functions in information security, popular hash function designs, some important analytical results, and recent advances in this field.
Resumo:
The laz gene of Neisseria meningitidis is predicted to encode a lipid-modified azurin (Laz). Laz is very similar to azurin, a periplasmic protein, which belongs to the copper-containing proteins in the cupredoxin superfamily. In other bacteria, azurin is an electron donor to nitrite reductase, an important enzyme in the denitrifying process. It is not known whether Laz could function as an electron transfer protein in this important pathogen. Laz protein was heterologously expressed in Escherichia coli and purified. Electrospray mass spectrometry indicated that the Laz protein contains one copper ion. Laz was shown to be redox-active in the presence of its redox center copper ion. When oxidized, Laz exhibits an intense blue colour and absorbs visible light around 626 nm. The absorption is lost when exposed to diethyldithiocarbamate, a copper chelating agent. Polyclonal antibodies were raised against purified Laz for detecting expression of Laz under different growth conditions and to determine the orientation of Laz on the outer membrane. The expression of Laz under microaerobic and microaerobic denitrifying conditions was slightly higher than that under aerobic conditions. However, the expression of Laz was similar between the wild type strain and an fnr mutant, suggesting that Fumarate/Nitrate reduction regulator (FNR) does not regulate the expression of Laz despite the presence of a partial FNR box upstream of the laz gene. We propose that some Laz protein is exposed on the outer membrane surface of N. meningitidis as the αLaz antibodies can increase killing by complement in a capsule deficient N. meningitidis strain, in a dose-dependent fashion.
Resumo:
The anthocyanin biosynthetic pathway is regulated by a transcription factor complex consisting of an R2R3 MYB, a bHLH, and a WD40. Although R2R3 MYBs belonging to the anthocyanin-activating class have been identified in many plants, and their role well elucidated, the subgroups of bHLH implicated in anthocyanin regulation seem to be more complex. It is not clear whether these potential bHLH partners are biologically interchangeable with redundant functions, or even if heterodimers are involved. In this study, AcMYB110, an R2R3 MYB isolated from kiwifruit (Actinidia sp.) showing a strong activation of the anthocyanin pathway in tobacco (Nicotiana tabacum) was used to examine the function of interacting endogenous bHLH partners. Constitutive expression of AcMYB110 in tobacco leaves revealed different roles for two bHLHs, NtAN1 and NtJAF13. A hierarchical mechanism is shown to control the regulation of transcription factors and consequently of the anthocyanin biosynthetic pathway. Here, a model is proposed for the regulation of the anthocyanin pathway in Solanaceous plants in which AN1 is directly involved in the activation of the biosynthetic genes, whereas JAF13 is involved in the regulation of AN1 transcription.
Resumo:
Ascorbate (vitamin C) is an essential antioxidant and enzyme cofactor in both plants and animals. Ascorbate concentration is tightly regulated in plants, partly to respond to stress. Here, we demonstrate that ascorbate concentrations are determined via the posttranscriptional repression of GDP-l-galactose phosphorylase (GGP), a major control enzyme in the ascorbate biosynthesis pathway. This regulation requires a cis-acting upstream open reading frame (uORF) that represses the translation of the downstream GGP open reading frame under high ascorbate concentration. Disruption of this uORF stops the ascorbate feedback regulation of translation and results in increased ascorbate concentrations in leaves. The uORF is predicted to initiate at a noncanonical codon (ACG rather than AUG) and encode a 60- to 65-residue peptide. Analysis of ribosome protection data from Arabidopsis thaliana showed colocation of high levels of ribosomes with both the uORF and the main coding sequence of GGP. Together, our data indicate that the noncanonical uORF is translated and encodes a peptide that functions in the ascorbate inhibition of translation. This posttranslational regulation of ascorbate is likely an ancient mechanism of control as the uORF is conserved in GGP genes from mosses to angiosperms.
Resumo:
Germline mutations in BRCA1 predispose carriers to a high incidence of breast and ovarian cancers. BRCA1 functions to maintain genomic stability through critical roles in DNA repair, cell cycle arrest and transcriptional control. A major question has been why BRCA1 loss or mutation leads to tumors mainly in estrogen-regulated tissues, given that BRCA1 has essential functions in all cell types. Here we report that estrogen and estrogen metabolites can cause DNA double strand breaks (DSB) in estrogen receptor-α negative breast cells and that BRCA1 is required to repair these DSBs to prevent metabolite-induced genomic instability. We found that BRCA1 also regulates estrogen metabolism and metabolite-mediated DNA damage by repressing the transcription of estrogen-metabolising enzymes, such as CYP1A1, in breast cells. Lastly, we used a knock-in human cell model with a heterozygous BRCA1 pathogenic mutation to show how BRCA1 haploinsufficiency affects these processes. Our findings provide pivotal new insights into why BRCA1 mutation drives the formation of tumours in estrogen-regulated tissues, despite the general role of BRCA1 in DNA repair in all cell types.
Resumo:
Mode indicator functions (MIFs) are used in modal testing and analysis as a means of identifying modes of vibration, often as a precursor to modal parameter estimation. Various methods have been developed since the MIF was introduced four decades ago. These methods are quite useful in assisting the analyst to identify genuine modes and, in the case of the complex mode indicator function, have even been developed into modal parameter estimation techniques. Although the various MIFs are able to indicate the existence of a mode, they do not provide the analyst with any descriptive information about the mode. This paper uses the simple summation type of MIF to develop five averaged and normalised MIFs that will provide the analyst with enough information to identify whether a mode is longitudinal, vertical, lateral or torsional. The first three functions, termed directional MIFs, have been noted in the literature in one form or another; however, this paper introduces a new twist on the MIF by introducing two MIFs, termed torsional MIFs, that can be used by the analyst to identify torsional modes and, moreover, can assist in determining whether the mode is of a pure torsion or sway type (i.e., having a rigid cross-section) or a distorted twisting type. The directional and torsional MIFs are tested on a finite element model based simulation of an experimental modal test using an impact hammer. Results indicate that the directional and torsional MIFs are indeed useful in assisting the analyst to identify whether a mode is longitudinal, vertical, lateral, sway, or torsion.
Resumo:
We propose a new information-theoretic metric, the symmetric Kullback-Leibler divergence (sKL-divergence), to measure the difference between two water diffusivity profiles in high angular resolution diffusion imaging (HARDI). Water diffusivity profiles are modeled as probability density functions on the unit sphere, and the sKL-divergence is computed from a spherical harmonic series, which greatly reduces computational complexity. Adjustment of the orientation of diffusivity functions is essential when the image is being warped, so we propose a fast algorithm to determine the principal direction of diffusivity functions using principal component analysis (PCA). We compare sKL-divergence with other inner-product based cost functions using synthetic samples and real HARDI data, and show that the sKL-divergence is highly sensitive in detecting small differences between two diffusivity profiles and therefore shows promise for applications in the nonlinear registration and multisubject statistical analysis of HARDI data.
Resumo:
In plants and nematodes, RNAi can spread from cells from which it is initiated to other cells in the organism. The underlying mechanism controlling the mobility of RNAi signals is not known, especially in the case of plants. A genetic screen designed to recover plants impaired in the movement but not the production or effectiveness of the RNAi signal identified RCI3, which encodes a hydrogen peroxide (H2O2)-producing type III peroxidase, as a key regulator of silencing mobility in Arabidopsis thaliana. Silencing initiated in the roots of rci3 plants failed to spread into leaf tissue or floral tissue. Application of exogenous H2O2 reinstated the spread in rci3 plants and accelerated it in wild-type plants. The addition of catalase or MnO2, which breaks down H2O2, slowed the spread of silencing in wild-type plants. We propose that endogenous H2O2, under the control of peroxidases, regulates the spread of gene silencing by altering plasmodesmata permeability through remodelling of local cell wall structure, and may play a role in regulating systemic viral defence.
Resumo:
Cancer is the second leading cause of death with 14 million new cases and 8.2 million cancer-related deaths worldwide in 2012. Despite the progress made in cancer therapies, neoplastic diseases are still a major therapeutic challenge notably because of intra- and inter-malignant tumour heterogeneity and adaptation/escape of malignant cells to/from treatment. New targeted therapies need to be developed to improve our medical arsenal and counter-act cancer progression. Human kallikrein-related peptidases (KLKs) are secreted serine peptidases which are aberrantly expressed in many cancers and have great potential in developing targeted therapies. The potential of KLKs as cancer biomarkers is well established since the demonstration of the association between KLK3/PSA (prostate specific antigen) levels and prostate cancer progression. In addition, a constantly increasing number of in vitro and in vivo studies demonstrate the functional involvement of KLKs in cancer-related processes. These peptidases are now considered key players in the regulation of cancer cell growth, migration, invasion, chemo-resistance, and importantly, in mediating interactions between cancer cells and other cell populations found in the tumour microenvironment to facilitate cancer progression. These functional roles of KLKs in a cancer context further highlight their potential in designing new anti-cancer approaches. In this review, we comprehensively review the biochemical features of KLKs, their functional roles in carcinogenesis, followed by the latest developments and the successful utility of KLK-based therapeutics in counteracting cancer progression.
Resumo:
To gain insight into the mechanisms by which the Myb transcription factor controls normal hematopoiesis and particularly, how it contributes to leukemogenesis, we mapped the genome-wide occupancy of Myb by chromatin immunoprecipitation followed by massively parallel sequencing (ChIP-Seq) in ERMYB myeloid progenitor cells. By integrating the genome occupancy data with whole genome expression profiling data, we identified a Myb-regulated transcriptional program. Gene signatures for leukemia stem cells, normal hematopoietic stem/progenitor cells and myeloid development were overrepresented in 2368 Myb regulated genes. Of these, Myb bound directly near or within 793 genes. Myb directly activates some genes known critical in maintaining hematopoietic stem cells, such as Gfi1 and Cited2. Importantly, we also show that, despite being usually considered as a transactivator, Myb also functions to repress approximately half of its direct targets, including several key regulators of myeloid differentiation, such as Sfpi1 (also known as Pu.1), Runx1, Junb and Cebpb. Furthermore, our results demonstrate that interaction with p300, an established coactivator for Myb, is unexpectedly required for Myb-mediated transcriptional repression. We propose that the repression of the above mentioned key pro-differentiation factors may contribute essentially to Myb's ability to suppress differentiation and promote self-renewal, thus maintaining progenitor cells in an undifferentiated state and promoting leukemic transformation. © 2011 The Author(s).