3 resultados para NRS
em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast
Resumo:
The glycan chain of the S-layer glycoprotein of Geobacillus stearothermophilus NRS 2004/3a is composed of repeating units [-->2)-alpha-l-Rhap-(1-->3)-beta-l-Rhap-(1-->2)-alpha-l-Rhap-(1-->], with a 2-O-methyl modification of the terminal trisaccharide at the nonreducing end of the glycan chain, a core saccharide composed of two or three alpha-l-rhamnose residues, and a beta-d-galactose residue as a linker to the S-layer protein. In this study, we report the biochemical characterization of WsaP of the S-layer glycosylation gene cluster as a UDP-Gal:phosphoryl-polyprenol Gal-1-phosphate transferase that primes the S-layer glycoprotein glycan biosynthesis of Geobacillus stearothermophilus NRS 2004/3a. Our results demonstrate that the enzyme transfers in vitro a galactose-1-phosphate from UDP-galactose to endogenous phosphoryl-polyprenol and that the C-terminal half of WsaP carries the galactosyltransferase function, as already observed for the UDP-Gal:phosphoryl-polyprenol Gal-1-phosphate transferase WbaP from Salmonella enterica. To confirm the function of the enzyme, we show that WsaP is capable of reconstituting polysaccharide biosynthesis in WbaP-deficient strains of Escherichia coli and Salmonella enterica serovar Typhimurium.
Resumo:
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multi-antenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the cellular base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, we propose a new power transfer policy, namely, best power beacon (BPB) power transfer. To characterize the power transfer reliability of the proposed policy, we derive new closed-form expressions for the exact power outage probability and the asymptotic power outage probability with large antenna arrays at PBs. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), and 2) nearest receiver selection (NRS). To assess the secrecy performance, we derive new expressions for the secrecy throughput considering the two receiver selection schemes using the BPB power transfer policies. We show that secrecy performance improves with increasing densities of PBs and D2D receivers because of a larger multiuser diversity gain. A pivotal conclusion is reached that BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead.
Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model
Resumo:
In this paper, we investigate secure device-to-device (D2D) communication in energy harvesting large-scale cognitive cellular networks. The energy constrained D2D transmitter harvests energy from multiantenna equipped power beacons (PBs), and communicates with the corresponding receiver using the spectrum of the primary base stations (BSs). We introduce a power transfer model and an information signal model to enable wireless energy harvesting and secure information transmission. In the power transfer model, three wireless power transfer (WPT) policies are proposed: 1) co-operative power beacons (CPB) power transfer, 2) best power beacon (BPB) power transfer, and 3) nearest power beacon (NPB) power transfer. To characterize the power transfer reliability of the proposed three policies, we derive new expressions for the exact power outage probability. Moreover, the analysis of the power outage probability is extended to the case when PBs are equipped with large antenna arrays. In the information signal model, we present a new comparative framework with two receiver selection schemes: 1) best receiver selection (BRS), where the receiver with the strongest channel is selected; and 2) nearest receiver selection (NRS), where the nearest receiver is selected. To assess the secrecy performance, we derive new analytical expressions for the secrecy outage probability and the secrecy throughput considering the two receiver selection schemes using the proposed WPT policies. We presented Monte carlo simulation results to corroborate our analysis and show: 1) secrecy performance improves with increasing densities of PBs and D2D receivers due to larger multiuser diversity gain; 2) CPB achieves better secrecy performance than BPB and NPB but consumes more power; and 3) BRS achieves better secrecy performance than NRS but demands more instantaneous feedback and overhead. A pivotal conclusion- is reached that with increasing number of antennas at PBs, NPB offers a comparable secrecy performance to that of BPB but with a lower complexity.