72 resultados para Simulator FTE DATCOM damage tolerance inspections algorithms
Resumo:
This paper presents SiMR, a simulator of the Rudimentary Machine designed to be used in a first course of computer architecture of Software Engineering and Computer Engineering programmes. The Rudimentary Machine contains all the basic elements in a RISC computer, and SiMR allows editing, assembling and executing programmes for this processor. SiMR is used at the Universitat Oberta de Catalunya as one of the most important resources in the Virtual Computing Architecture and Organisation Laboratory, since students work at home with the simulator and reports containing their work are automatically generated to be evaluated by lecturers. The results obtained from a survey show that most of the students consider SiMR as a highly necessary or even an indispensable resource to learn the basic concepts about computer architecture.
Resumo:
Networks are evolving toward a ubiquitous model in which heterogeneousdevices are interconnected. Cryptographic algorithms are required for developing securitysolutions that protect network activity. However, the computational and energy limitationsof network devices jeopardize the actual implementation of such mechanisms. In thispaper, we perform a wide analysis on the expenses of launching symmetric and asymmetriccryptographic algorithms, hash chain functions, elliptic curves cryptography and pairingbased cryptography on personal agendas, and compare them with the costs of basic operatingsystem functions. Results show that although cryptographic power costs are high and suchoperations shall be restricted in time, they are not the main limiting factor of the autonomyof a device.
Resumo:
This paper presents a Bayesian approach to the design of transmit prefiltering matrices in closed-loop schemes robust to channel estimation errors. The algorithms are derived for a multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) system. Two different optimizationcriteria are analyzed: the minimization of the mean square error and the minimization of the bit error rate. In both cases, the transmitter design is based on the singular value decomposition (SVD) of the conditional mean of the channel response, given the channel estimate. The performance of the proposed algorithms is analyzed,and their relationship with existing algorithms is indicated. As withother previously proposed solutions, the minimum bit error rate algorithmconverges to the open-loop transmission scheme for very poor CSI estimates.
Resumo:
Many engineering problems that can be formulatedas constrained optimization problems result in solutionsgiven by a waterfilling structure; the classical example is thecapacity-achieving solution for a frequency-selective channel.For simple waterfilling solutions with a single waterlevel and asingle constraint (typically, a power constraint), some algorithmshave been proposed in the literature to compute the solutionsnumerically. However, some other optimization problems result insignificantly more complicated waterfilling solutions that includemultiple waterlevels and multiple constraints. For such cases, itmay still be possible to obtain practical algorithms to evaluate thesolutions numerically but only after a painstaking inspection ofthe specific waterfilling structure. In addition, a unified view ofthe different types of waterfilling solutions and the correspondingpractical algorithms is missing.The purpose of this paper is twofold. On the one hand, itoverviews the waterfilling results existing in the literature from aunified viewpoint. On the other hand, it bridges the gap betweena wide family of waterfilling solutions and their efficient implementationin practice; to be more precise, it provides a practicalalgorithm to evaluate numerically a general waterfilling solution,which includes the currently existing waterfilling solutions andothers that may possibly appear in future problems.
Resumo:
In this paper, two probabilistic adaptive algorithmsfor jointly detecting active users in a DS-CDMA system arereported. The first one, which is based on the theory of hiddenMarkov models (HMM’s) and the Baum–Wech (BW) algorithm,is proposed within the CDMA scenario and compared withthe second one, which is a previously developed Viterbi-basedalgorithm. Both techniques are completely blind in the sense thatno knowledge of the signatures, channel state information, ortraining sequences is required for any user. Once convergencehas been achieved, an estimate of the signature of each userconvolved with its physical channel response (CR) and estimateddata sequences are provided. This CR estimate can be used toswitch to any decision-directed (DD) adaptation scheme. Performanceof the algorithms is verified via simulations as well as onexperimental data obtained in an underwater acoustics (UWA)environment. In both cases, performance is found to be highlysatisfactory, showing the near–far resistance of the analyzed algorithms.
Resumo:
The goal of this project is the integration of a set of technologies (graphics, physical simulation, input), with the azm of assembling an application framework in phyton. In this research, a set of key introductory concepts are presented in adoption of a deep study of the state of the art of 3D applications. Phyton is selected an justified as the programing language due to the features and advantages that it offers in front of other languages. Finally the design and implementation of the framework is presented in the last chapter with some client application examples.
Resumo:
Background: Wine Saccharomyces cerevisiae strains, adapted to anaerobic must fermentations, suffer oxidative stress when they are grown under aerobic conditions for biomass propagation in the industrial process of active dry yeast production. Oxidative metabolism of sugars favors high biomass yields but also causes increased oxidation damage of cell components. The overexpression of the TRX2 gene, coding for a thioredoxin, enhances oxidative stress resistance in a wine yeast strain model. The thioredoxin and also the glutathione/glutaredoxin system constitute the most important defense against oxidation. Trx2p is also involved in the regulation of Yap1p-driven transcriptional response against some reactive oxygen species. Results: Laboratory scale simulations of the industrial active dry biomass production process demonstrate that TRX2 overexpression increases the wine yeast final biomass yield and also its fermentative capacity both after the batch and fed-batch phases. Microvinifications carried out with the modified strain show a fast start phenotype derived from its enhanced fermentative capacity and also increased content of beneficial aroma compounds. The modified strain displays an increased transcriptional response of Yap1p regulated genes and other oxidative stress related genes. Activities of antioxidant enzymes like Sod1p, Sod2p and catalase are also enhanced. Consequently, diminished oxidation of lipids and proteins is observed in the modified strain, which can explain the improved performance of the thioredoxin overexpressing strain. Conclusions: We report several beneficial effects of overexpressing the thioredoxin gene TRX2 in a wine yeast strain. We show that this strain presents an enhanced redox defense. Increased yield of biomass production process in TRX2 overexpressing strain can be of special interest for several industrial applications.
Resumo:
En els darrers anys, la criptografia amb corbes el.líptiques ha adquirit una importància creixent, fins a arribar a formar part en la actualitat de diferents estàndards industrials. Tot i que s'han dissenyat variants amb corbes el.líptiques de criptosistemes clàssics, com el RSA, el seu màxim interès rau en la seva aplicació en criptosistemes basats en el Problema del Logaritme Discret, com els de tipus ElGamal. En aquest cas, els criptosistemes el.líptics garanteixen la mateixa seguretat que els construïts sobre el grup multiplicatiu d'un cos finit primer, però amb longituds de clau molt menor. Mostrarem, doncs, les bones propietats d'aquests criptosistemes, així com els requeriments bàsics per a que una corba sigui criptogràficament útil, estretament relacionat amb la seva cardinalitat. Revisarem alguns mètodes que permetin descartar corbes no criptogràficament útils, així com altres que permetin obtenir corbes bones a partir d'una de donada. Finalment, descriurem algunes aplicacions, com són el seu ús en Targes Intel.ligents i sistemes RFID, per concloure amb alguns avenços recents en aquest camp.
Resumo:
Mitochondrial dysfunction, caspase activation and caspase-dependent DNA fragmentation are involved in cell damage in many tissues. However, differentiated cardiomyocytes repress the expression of the canonical apoptotic pathway and their death during ischemia is caspase-independent. The atypical BH3-only protein Bnip3 is involved in the process leading to caspase-independent DNA fragmentation in cardiomyocytes. However, the pathway by which DNA degradation ensues following Bnip3 activation is not resolved. To identify the mechanism involved, we analyzed the interdependence of Bnip3, Nix and EndoG in mitochondrial damage and DNA fragmentation during experimental ischemia in neonatal rat ventricular cardiomyocytes. Our results show that the expression of EndoG and Bnip3 increases in the heart throughout development, while the caspase-dependent machinery is silenced. TUNEL-positive DNA damage, which depends on caspase activity in other cells, is caspase-independent in ischemic cardiomyocytes and ischemia-induced DNA high and low molecular weight fragmentation is blocked by repressing EndoG expression. Ischemia-induced EndoG translocation and DNA degradation are prevented by silencing the expression of Bnip3, but not Nix, or by overexpressing Bcl-xL. These data establish a link between Bnip3 and EndoG-dependent, TUNEL-positive, DNA fragmentation in ischemic cardiomyocytes in the absence of caspases, defining an alternative cell death pathway in postmitotic cells.
Resumo:
Chemical reactions in living cells are under strict enzyme control and conform to a tightly regulated metabolic program. However, uncontrolled and potentially deleterious endogenous reactions occur, even under physiological conditions. Aging, in this chemical context, could be viewed as an entropic process, the result of chemical side reactions that chronically and cumulatively degrade the function of biological systems. Mitochondria are a main source of reactive oxygen species (ROS) and chemical sidereactions in healthy aerobic tissues and are the only known extranuclear cellular organelles in animal cells that contain their own DNA (mtDNA). ROS can modify mtDNA directly at the sugar-phosphate backbone or at the bases, producing many different oxidatively modified purines and pyrimidines, as well as single and double strand breaks and DNA mutations. In this scenario, natural selection tends to decrease the mitochondrial ROS generation, the oxidative damage to mtDNA, and the mitochondrial mutation rate in long-lived species, in agreement with the mitochondrial oxidative stress theory of aging.
Resumo:
The goal of this work is to try to create a statistical model, based only on easily computable parameters from the CSP problem to predict runtime behaviour of the solving algorithms, and let us choose the best algorithm to solve the problem. Although it seems that the obvious choice should be MAC, experimental results obtained so far show, that with big numbers of variables, other algorithms perfom much better, specially for hard problems in the transition phase.
Resumo:
Glutaredoxins are members of a superfamily of thiol disulfide oxidoreductases involved in maintaining the redox state of target proteins. In Saccharomyces cerevisiae, two glutaredoxins (Grx1 and Grx2) containing a cysteine pair at the active site had been characterized as protecting yeast cells against oxidative damage. In this work, another subfamily of yeast glutaredoxins (Grx3, Grx4, and Grx5) that differs from the first in containing a single cysteine residue at the putative active site is described. This trait is also characteristic for a number of glutaredoxins from bacteria to humans, with which the Grx3/4/5 group has extensive homology over two regions. Mutants lacking Grx5 are partially deficient in growth in rich and minimal media and also highly sensitive to oxidative damage caused by menadione and hydrogen peroxide. A significant increase in total protein carbonyl content is constitutively observed in grx5cells, and a number of specific proteins, including transketolase, appear to be highly oxidized in this mutant. The synthetic lethality of the grx5 and grx2 mutations on one hand and ofgrx5 with the grx3 grx4 combination on the other points to a complex functional relationship among yeast glutaredoxins, with Grx5 playing a specially important role in protection against oxidative stress both during ordinary growth conditions and after externally induced damage. Grx5-deficient mutants are also sensitive to osmotic stress, which indicates a relationship between the two types of stress in yeast cells.
Resumo:
Article sobre la tolerància a la sequera i les necessitats de llum d'espècies de l'alt i baix sublitoral de macroalgues de la Mediterrània del gènere Cystoseira C. Agardh (Fucales, Phaeophyceae)
Resumo:
In this paper we design and develop several filtering strategies for the analysis of data generated by a resonant bar gravitational wave (GW) antenna, with the goal of assessing the presence (or absence) therein of long-duration monochromatic GW signals, as well as the eventual amplitude and frequency of the signals, within the sensitivity band of the detector. Such signals are most likely generated in the fast rotation of slightly asymmetric spinning stars. We develop practical procedures, together with a study of their statistical properties, which will provide us with useful information on the performance of each technique. The selection of candidate events will then be established according to threshold-crossing probabilities, based on the Neyman-Pearson criterion. In particular, it will be shown that our approach, based on phase estimation, presents a better signal-to-noise ratio than does pure spectral analysis, the most common approach.
Resumo:
Background In an agreement assay, it is of interest to evaluate the degree of agreement between the different methods (devices, instruments or observers) used to measure the same characteristic. We propose in this study a technical simplification for inference about the total deviation index (TDI) estimate to assess agreement between two devices of normally-distributed measurements and describe its utility to evaluate inter- and intra-rater agreement if more than one reading per subject is available for each device. Methods We propose to estimate the TDI by constructing a probability interval of the difference in paired measurements between devices, and thereafter, we derive a tolerance interval (TI) procedure as a natural way to make inferences about probability limit estimates. We also describe how the proposed method can be used to compute bounds of the coverage probability. Results The approach is illustrated in a real case example where the agreement between two instruments, a handle mercury sphygmomanometer device and an OMRON 711 automatic device, is assessed in a sample of 384 subjects where measures of systolic blood pressure were taken twice by each device. A simulation study procedure is implemented to evaluate and compare the accuracy of the approach to two already established methods, showing that the TI approximation produces accurate empirical confidence levels which are reasonably close to the nominal confidence level. Conclusions The method proposed is straightforward since the TDI estimate is derived directly from a probability interval of a normally-distributed variable in its original scale, without further transformations. Thereafter, a natural way of making inferences about this estimate is to derive the appropriate TI. Constructions of TI based on normal populations are implemented in most standard statistical packages, thus making it simpler for any practitioner to implement our proposal to assess agreement.