6 resultados para Structural modeling of digital informational environments

em DRUM (Digital Repository at the University of Maryland)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The first part of this study examines the relative roles of frontogenesis and tropopause undulation in determining the intensity and structural changes of Hurricane Sandy (2012) using a high-resolution cloud-resolving model. A 138-h simulation reproduces Sandy’s four distinct development stages: (i) rapid intensification, (ii) weakening, (iii) steady maximum surface wind but with large continued sea-level pressure (SLP) falls, and (iv) re-intensification. Results show typical correlations between intensity changes, sea-surface temperature and vertical wind shear during the first two stages. The large SLP falls during the last two stages are mostly caused by Sandy’s moving northward into lower-tropopause regions associated with an eastward-propagating midlatitude trough, where the associated lower-stratospheric warm air wraps into the storm and its surrounding areas. The steady maximum surface wind occurs because of the widespread SLP falls with weak pressure gradients lacking significant inward advection of absolute angular momentum (AAM). Meanwhile, there is a continuous frontogenesis in the outer region during the last three stages. Cyclonic inward advection of AAM along each frontal rainband accounts for the continued expansion of the tropical-storm-force wind and structural changes, while deep convection in the eyewall and merging of the final two survived frontal rainbands generate a spiraling jet in Sandy’s northwestern quadrant, leading to its re-intensification prior to landfall. The physical, kinematic and dynamic aspects of an upper-level outflow layer and its possible impact on the re-intensification of Sandy are examined in the second part of this study. Above the outflow layer isentropes are tilted downward with radius as a result of the development of deep convection and an approaching upper-level trough, causing weak subsidence. Its maximum outward radial velocity is located above the cloud top, so the outflow channel experiences cloud-induced long-wave cooling. Because Sandy has two distinct convective regions (an eyewall and a frontal rainband), it has multiple outflow layers, with the eyewall’s outflow layer located above that of the frontal rainband. During the re-intensification stage, the eyewall’s outflow layer interacts with a jet stream ahead of the upper-level trough axis. Because of the presence of inertial instability on the anticyclonic side of the jet stream and symmetric instability in the inner region of the outflow layer, Sandy’s secondary circulation intensifies. Its re-intensification ceases when these instabilities disappear. The relationship between the intensity of the secondary circulation and dynamic instabilities of the outflow layer suggests that the re-intensification occurs in response to these instabilities. Additionally, it is verified that the long-wave cooling in the outflow layer helps induce symmetric instability by reducing static stability.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Contemporary integrated circuits are designed and manufactured in a globalized environment leading to concerns of piracy, overproduction and counterfeiting. One class of techniques to combat these threats is circuit obfuscation which seeks to modify the gate-level (or structural) description of a circuit without affecting its functionality in order to increase the complexity and cost of reverse engineering. Most of the existing circuit obfuscation methods are based on the insertion of additional logic (called “key gates”) or camouflaging existing gates in order to make it difficult for a malicious user to get the complete layout information without extensive computations to determine key-gate values. However, when the netlist or the circuit layout, although camouflaged, is available to the attacker, he/she can use advanced logic analysis and circuit simulation tools and Boolean SAT solvers to reveal the unknown gate-level information without exhaustively trying all the input vectors, thus bringing down the complexity of reverse engineering. To counter this problem, some ‘provably secure’ logic encryption algorithms that emphasize methodical selection of camouflaged gates have been proposed previously in literature [1,2,3]. The contribution of this paper is the creation and simulation of a new layout obfuscation method that uses don't care conditions. We also present proof-of-concept of a new functional or logic obfuscation technique that not only conceals, but modifies the circuit functionality in addition to the gate-level description, and can be implemented automatically during the design process. Our layout obfuscation technique utilizes don’t care conditions (namely, Observability and Satisfiability Don’t Cares) inherent in the circuit to camouflage selected gates and modify sub-circuit functionality while meeting the overall circuit specification. Here, camouflaging or obfuscating a gate means replacing the candidate gate by a 4X1 Multiplexer which can be configured to perform all possible 2-input/ 1-output functions as proposed by Bao et al. [4]. It is important to emphasize that our approach not only obfuscates but alters sub-circuit level functionality in an attempt to make IP piracy difficult. The choice of gates to obfuscate determines the effort required to reverse engineer or brute force the design. As such, we propose a method of camouflaged gate selection based on the intersection of output logic cones. By choosing these candidate gates methodically, the complexity of reverse engineering can be made exponential, thus making it computationally very expensive to determine the true circuit functionality. We propose several heuristic algorithms to maximize the RE complexity based on don’t care based obfuscation and methodical gate selection. Thus, the goal of protecting the design IP from malicious end-users is achieved. It also makes it significantly harder for rogue elements in the supply chain to use, copy or replicate the same design with a different logic. We analyze the reverse engineering complexity by applying our obfuscation algorithm on ISCAS-85 benchmarks. Our experimental results indicate that significant reverse engineering complexity can be achieved at minimal design overhead (average area overhead for the proposed layout obfuscation methods is 5.51% and average delay overhead is about 7.732%). We discuss the strengths and limitations of our approach and suggest directions that may lead to improved logic encryption algorithms in the future. References: [1] R. Chakraborty and S. Bhunia, “HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 28, no. 10, pp. 1493–1502, 2009. [2] J. A. Roy, F. Koushanfar, and I. L. Markov, “EPIC: Ending Piracy of Integrated Circuits,” in 2008 Design, Automation and Test in Europe, 2008, pp. 1069–1074. [3] J. Rajendran, M. Sam, O. Sinanoglu, and R. Karri, “Security Analysis of Integrated Circuit Camouflaging,” ACM Conference on Computer Communications and Security, 2013. [4] Bao Liu, Wang, B., "Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks,"Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014 , vol., no., pp.1,6, 24-28 March 2014.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ubiquitylation or covalent attachment of ubiquitin (Ub) to a variety of substrate proteins in cells is a versatile post-translational modification involved in the regulation of numerous cellular processes. The distinct messages that polyubiquitylation encodes are attributed to the multitude of conformations possible through attachment of ubiquitin monomers within a polyubiquitin chain via a specific lysine residue. Thus the hypothesis is that linkage defines polyubiquitin conformation which in turn determines specific recognition by cellular receptors. Ubiquitylation of membrane surface receptor proteins plays a very important role in regulating receptor-mediated endocytosis as well as endosomal sorting for lysosomal degradation. Epsin1 is an endocytic adaptor protein with three tandem UIMs (Ubiquitin Interacting Motifs) which are responsible for the highly specific interaction between epsin and ubiquitylated receptors. Epsin1 is also an oncogenic protein and its expression is upregulated in some types of cancer. Recently it has been shown that novel K11 and K63 mixed-linkage polyubiquitin chains serve as internalization signal for MHC I (Major Histocompatibility Complex I) molecule through their association with the tUIMs of epsin1. However the molecular mode of action and structural details of the interaction between polyubiquitin chains on receptors and tUIMs of epsin1 is yet to be determined. This information is crucial for the development of anticancer therapeutics targeting epsin1. The molecular basis for the linkage-specific recognition of K11 and K63 mixed-linkage polyubiquitin chains by the tandem UIMs of the endocytic adaptor protein epsin1 is investigated using a combination of NMR methods.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Turnip crinkle virus (TCV) and Pea enation mosaic virus (PEMV) are two positive (+)-strand RNA viruses that are used to investigate the regulation of translation and replication due to their small size and simple genomes. Both viruses contain cap-independent translation elements (CITEs) within their 3´ untranslated regions (UTRs) that fold into tRNA-shaped structures (TSS) according to nuclear magnetic resonance and small angle x-ray scattering analysis (TCV) and computational prediction (PEMV). Specifically, the TCV TSS can directly associate with ribosomes and participates in RNA-dependent RNA polymerase (RdRp) binding. The PEMV kissing-loop TSS (kl-TSS) can simultaneously bind to ribosomes and associate with the 5´ UTR of the viral genome. Mutational analysis and chemical structure probing methods provide great insight into the function and secondary structure of the two 3´ CITEs. However, lack of 3-D structural information has limited our understanding of their functional dynamics. Here, I report the folding dynamics for the TCV TSS using optical tweezers (OT), a single molecule technique. My study of the unfolding/folding pathways for the TCV TSS has provided an unexpected unfolding pathway, confirmed the presence of Ψ3 and hairpin elements, and suggested an interconnection between the hairpins and pseudoknots. In addition, this study has demonstrated the importance of the adjacent upstream adenylate-rich sequence for the formation of H4a/Ψ3 along with the contribution of magnesium to the stability of the TCV TSS. In my second project, I report on the structural analysis of the PEMV kl-TSS using NMR and SAXS. This study has re-confirmed the base-pair pattern for the PEMV kl-TSS and the proposed interaction of the PEMV kl-TSS with its interacting partner, hairpin 5H2. The molecular envelope of the kl-TSS built from SAXS analysis suggests the kl-TSS has two functional conformations, one of which has a different shape from the previously predicted tRNA-shaped form. Along with applying biophysical methods to study the structural folding dynamics of RNAs, I have also developed a technique that improves the production of large quantities of recombinant RNAs in vivo for NMR study. In this project, I report using the wild-type and mutant E.coli strains to produce cost-effective, site-specific labeled, recombinant RNAs. This technique was validated with four representative RNAs of different sizes and complexity to produce milligram amounts of RNAs. The benefit of using site-specific labeled RNAs made from E.coli was demonstrated with several NMR techniques.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Twin-screw extrusion is used to compound fillers into a polymer matrix in order to improve the properties of the final product. The resultant properties of the composite are determined by the operating conditions used during extrusion processing. Changes in the operating conditions affect the physics of the melt flow, inducing unique composite properties. In the following work, the Residence Stress Distribution methodology has been applied to model both the stress behavior and the property response of a twin-screw compounding process as a function of the operating conditions. The compounding of a pigment into a polymer melt has been investigated to determine the effect of stress on the degree of mixing, which will affect the properties of the composite. In addition, the pharmaceutical properties resulting from the compounding of an active pharmaceutical ingredient are modeled as a function of the operating conditions, indicating the physical behavior inducing the property responses.