48 resultados para Batch Proof, Verification of Re-encryption, Verification of Decryption, Mix Network
em CentAUR: Central Archive University of Reading - UK
Resumo:
IoT, crowd sensing and smart cities will be a traffic challenge. New communication paradigms as asynchronous messaging carry and forward, scheduled delivery and temporary storage will be needed to manage network resources dynamically. Since traditional end to end security will require keeping security associations among devices for a long time draining valuable resources, we propose and evaluate the use of proxy re-encryption protocols in these scenarios as a solution for reliable and flexible security.
Resumo:
Buffer strips are refuges for a variety of plants providing resources, such as pollen, nectar and seeds, for higher trophic levels, including invertebrates, mammals and birds. Margins can also harbour plant species that are potentially injurious to the adjacent arable crop (undesirable species). Sowing perennial species in non-cropped buffer strips can reduce weed incidence, but limits the abundance of annuals with the potential to support wider biodiversity (desirable species). We investigated the responses of unsown plant species present in buffer strips established with three different seed mixes managed annually with three contrasting management regimes (cutting, sward scarification and selective graminicide). Sward scarification had the strongest influence on the unsown desirable (e.g. Sonchus spp.) and unsown pernicious (e.g. Elytrigia repens) species, and was generally associated with higher cover values of these species. However, abundances of several desirable weed species, in particular Poa annua, were not promoted by scarification. The treatments of cutting and graminicide tended to have negative impacts on the unsown species, except for Cirsium vulgare, which increased with graminicide application. Differences in unsown species cover between seed mixes were minimal, although the grass-only mix was more susceptible to establishment by C. vulgare and Galium aparine than the two grass and forb mixes. Annual scarification can enable desirable annuals and sown perennials to co-exist, however, this practice can also promote pernicious species, and so is unlikely to be widely adopted as a management tool in its current form.
Resumo:
The past decade has witnessed explosive growth of mobile subscribers and services. With the purpose of providing better-swifter-cheaper services, radio network optimisation plays a crucial role but faces enormous challenges. The concept of Dynamic Network Optimisation (DNO), therefore, has been introduced to optimally and continuously adjust network configurations, in response to changes in network conditions and traffic. However, the realization of DNO has been seriously hindered by the bottleneck of optimisation speed performance. An advanced distributed parallel solution is presented in this paper, as to bridge the gap by accelerating the sophisticated proprietary network optimisation algorithm, while maintaining the optimisation quality and numerical consistency. The ariesoACP product from Arieso Ltd serves as the main platform for acceleration. This solution has been prototyped, implemented and tested. Real-project based results exhibit a high scalability and substantial acceleration at an average speed-up of 2.5, 4.9 and 6.1 on a distributed 5-core, 9-core and 16-core system, respectively. This significantly outperforms other parallel solutions such as multi-threading. Furthermore, augmented optimisation outcome, alongside high correctness and self-consistency, have also been fulfilled. Overall, this is a breakthrough towards the realization of DNO.
Resumo:
The problem of complexity is particularly relevant to the field of control engineering, since many engineering problems are inherently complex. The inherent complexity is such that straightforward computational problem solutions often produce very poor results. Although parallel processing can alleviate the problem to some extent, it is artificial neural networks (in various forms) which have recently proved particularly effective, even in dealing with the causes of the problem itself. This paper presents an overview of the current neural network research being undertaken. Such research aims to solve the complex problems found in many areas of science and engineering today.
Resumo:
Electricity load shifting is becoming a big topic in the world of ‘green’ retail. Marks & Spencer (M&S) aim to become the world’s most sustainable retailer (1) and part of that commitment means contributing to the future electricity network. While intelligent operation of fridges and Heating, Ventilation and Air Conditioning (HVAC) systems are a wide area of research, standby generators should be considered too, as they are the most widely adopted form of distributed generation. In this paper, the experience of using standby generators in Northern Ireland to support the grid is shared and the logistics of future projects are discussed. Interactions with maintenance schedules, electricity costs, grid code, staffing and store opening times are discussed as well as the financial implications associated with running generators for grid support.
Resumo:
The Mobile Network Optimization (MNO) technologies have advanced at a tremendous pace in recent years. And the Dynamic Network Optimization (DNO) concept emerged years ago, aimed to continuously optimize the network in response to variations in network traffic and conditions. Yet, DNO development is still at its infancy, mainly hindered by a significant bottleneck of the lengthy optimization runtime. This paper identifies parallelism in greedy MNO algorithms and presents an advanced distributed parallel solution. The solution is designed, implemented and applied to real-life projects whose results yield a significant, highly scalable and nearly linear speedup up to 6.9 and 14.5 on distributed 8-core and 16-core systems respectively. Meanwhile, optimization outputs exhibit self-consistency and high precision compared to their sequential counterpart. This is a milestone in realizing the DNO. Further, the techniques may be applied to similar greedy optimization algorithm based applications.
Resumo:
The Transition Network exemplifies the potential of social movements to create spaces of possibility for alternatives to emerge in the interstices of mainstream, neoliberal economies. Yet, little work has been carried out so far on the Transition Network or other grassroots innovations for sustainability in a way that reveals their actual patterns of diffusion. This graphic of the diffusion of the Transition Network visualises its spatial structure and compare diffusion patterns across Italy, France, Great Britain and Germany. The graphics show that the number of transition initiatives in the four countries has steadily increased over the past eight years, but the rate of increase has slowed down in all countries. The maps clearly show that in all four countries the diffusion of the Transition Network has not been spatially even. The graphic suggests that in each country transition initiatives are more likely to emerge in some geographical areas (hotspots) than in others (cold spots). While the existence of a spatial structure of the Transition Network may result from the combination of place-specific factors and diffusion mechanisms, these graphics illustrate the importance of better comprehending where grassroots innovations emerge.
Resumo:
This paper assesses the impact of the location and configuration of Battery Energy Storage Systems (BESS) on Low-Voltage (LV) feeders. BESS are now being deployed on LV networks by Distribution Network Operators (DNOs) as an alternative to conventional reinforcement (e.g. upgrading cables and transformers) in response to increased electricity demand from new technologies such as electric vehicles. By storing energy during periods of low demand and then releasing that energy at times of high demand, the peak demand of a given LV substation on the grid can be reduced therefore mitigating or at least delaying the need for replacement and upgrade. However, existing research into this application of BESS tends to evaluate the aggregated impact of such systems at the substation level and does not systematically consider the impact of the location and configuration of BESS on the voltage profiles, losses and utilisation within a given feeder. In this paper, four configurations of BESS are considered: single-phase, unlinked three-phase, linked three-phase without storage for phase-balancing only, and linked three-phase with storage. These four configurations are then assessed based on models of two real LV networks. In each case, the impact of the BESS is systematically evaluated at every node in the LV network using Matlab linked with OpenDSS. The location and configuration of a BESS is shown to be critical when seeking the best overall network impact or when considering specific impacts on voltage, losses, or utilisation separately. Furthermore, the paper also demonstrates that phase-balancing without energy storage can provide much of the gains on unbalanced networks compared to systems with energy storage.
Resumo:
This paper shows the process of the virtual production development of the mechanical connection between the top leaf of a dual composite leaf spring system to a shackle using finite element methods. The commercial FEA package MSC/MARC has been used for the analysis. In the original design the joint was based on a closed eye-end. Full scale testing results showed that this configuration achieved the vertical proof load of 150 kN and 1 million cycles of fatigue load. However, a problem with delamination occurred at the interface between the fibres going around the eye and the main leaf body. To overcome this problem, a second design was tried using transverse bandages of woven glass fibre reinforced tape to wrap the section that is prone to delaminate. In this case, the maximum interlaminar shear stress was reduced by a certain amount but it was still higher than the material’s shear strength. Based on the fact that, even with delamination, the top leaf spring still sustained the maximum static and fatigue loads required, the third design was proposed with an open eye-end, eliminating altogether the interface where the maximum shear stress occurs. The maximum shear stress predicted by FEA is reduced significantly and a safety factor of around 2 has been obtained. Thus, a successful and safe design has been achieved.
Resumo:
Dominant paradigms of causal explanation for why and how Western liberal-democracies go to war in the post-Cold War era remain versions of the 'liberal peace' or 'democratic peace' thesis. Yet such explanations have been shown to rest upon deeply problematic epistemological and methodological assumptions. Of equal importance, however, is the failure of these dominant paradigms to account for the 'neoliberal revolution' that has gripped Western liberal-democracies since the 1970s. The transition from liberalism to neoliberalism remains neglected in analyses of the contemporary Western security constellation. Arguing that neoliberalism can be understood simultaneously through the Marxian concept of ideology and the Foucauldian concept of governmentality – that is, as a complementary set of 'ways of seeing' and 'ways of being' – the thesis goes on to analyse British security in policy and practice, considering it as an instantiation of a wider neoliberal way of war. In so doing, the thesis draws upon, but also challenges and develops, established critical discourse analytic methods, incorporating within its purview not only the textual data that is usually considered by discourse analysts, but also material practices of security. This analysis finds that contemporary British security policy is predicated on a neoliberal social ontology, morphology and morality – an ideology or 'way of seeing' – focused on the notion of a globalised 'network-market', and is aimed at rendering circulations through this network-market amenable to neoliberal techniques of government. It is further argued that security practices shaped by this ideology imperfectly and unevenly achieve the realisation of neoliberal 'ways of being' – especially modes of governing self and other or the 'conduct of conduct' – and the re-articulation of subjectivities in line with neoliberal principles of individualism, risk, responsibility and flexibility. The policy and practice of contemporary British 'security' is thus recontextualised as a component of a broader 'neoliberal way of war'.
Resumo:
An integrated approach to climate change impact assessment is explored by linking established models of regional climate (SDSM), water resources (CATCHMOD) and water quality (INCA) within a single framework. A case study of the River Kennet illustrates how the system can be used to investigate aspects of climate change uncertainty, deployable water resources, and water quality dynamics in upper and lower reaches of the drainage network. The results confirm the large uncertainty in climate change scenarios and freshwater impacts due to the choice of general circulation model (GCM). This uncertainty is shown to be greatest during summer months as evidenced by large variations between GCM-derived projections of future tow river flows, deployable yield from groundwater, severity of nutrient flushing episodes, and Long-term trends in surface water quality. Other impacts arising from agricultural land-use reform or delivery of EU Water Framework Directive objectives under climate change could be evaluated using the same framework. (c) 2006 Elsevier B.V. All rights reserved.
Resumo:
Real-time rainfall monitoring in Africa is of great practical importance for operational applications in hydrology and agriculture. Satellite data have been used in this context for many years because of the lack of surface observations. This paper describes an improved artificial neural network algorithm for operational applications. The algorithm combines numerical weather model information with the satellite data. Using this algorithm, daily rainfall estimates were derived for 4 yr of the Ethiopian and Zambian main rainy seasons and were compared with two other algorithms-a multiple linear regression making use of the same information as that of the neural network and a satellite-only method. All algorithms were validated against rain gauge data. Overall, the neural network performs best, but the extent to which it does so depends on the calibration/validation protocol. The advantages of the neural network are most evident when calibration data are numerous and close in space and time to the validation data. This result emphasizes the importance of a real-time calibration system.
Resumo:
Background: We report an analysis of a protein network of functionally linked proteins, identified from a phylogenetic statistical analysis of complete eukaryotic genomes. Phylogenetic methods identify pairs of proteins that co-evolve on a phylogenetic tree, and have been shown to have a high probability of correctly identifying known functional links. Results: The eukaryotic correlated evolution network we derive displays the familiar power law scaling of connectivity. We introduce the use of explicit phylogenetic methods to reconstruct the ancestral presence or absence of proteins at the interior nodes of a phylogeny of eukaryote species. We find that the connectivity distribution of proteins at the point they arise on the tree and join the network follows a power law, as does the connectivity distribution of proteins at the time they are lost from the network. Proteins resident in the network acquire connections over time, but we find no evidence that 'preferential attachment' - the phenomenon of newly acquired connections in the network being more likely to be made to proteins with large numbers of connections - influences the network structure. We derive a 'variable rate of attachment' model in which proteins vary in their propensity to form network interactions independently of how many connections they have or of the total number of connections in the network, and show how this model can produce apparent power-law scaling without preferential attachment. Conclusion: A few simple rules can explain the topological structure and evolutionary changes to protein-interaction networks: most change is concentrated in satellite proteins of low connectivity and small phenotypic effect, and proteins differ in their propensity to form attachments. Given these rules of assembly, power law scaled networks naturally emerge from simple principles of selection, yielding protein interaction networks that retain a high-degree of robustness on short time scales and evolvability on longer evolutionary time scales.
Resumo:
A Cu-II complex of protonated 4,4'-bipyridine (Hbyp) and 2-picolinate (pic), [Cu-2(pic)(3)(Hbyp)(H2O)(ClO4)(2)], has been synthesised and characterised by single-crystal X-ray analysis. The structure consists of two copper atoms that have different environments, bridged by a carboxylate group. The equatorial plane is formed by the two bidentate picolinate groups in one Cu-II, and one picolinate, one monodentate 4,4'-bipyridyl ligand and a water molecule in the other. Each copper atom is also weakly bonded to a perchlorate anion in an axial position. One of the coordinated perchlorate groups displays anion-pi interaction with the coordinated pyridine ring. The noncoordinated carboxylate oxygen is involved in lone-pair (l.p.)-pi interaction with the protonated pyridine ring. In addition there are pi-pi and H-bonding interactions in the structure. Bader's theory of "atoms in molecules" (AIM) is used to characterise the anion-pi and l.p.-pi interactions observed in the solid state. A high-level ab initio study (RI-MP2/aug-cc-pVTZ level of theory) has been performed to analyse the anion-pi binding affinity of the pyridine ring when it is coordinated to a transition metal and also when the other pyridine ring of the 4,4'-bipyridine moiety is protonated. Theoretical investigations support the experimental findings of an intricate network of intermolecular interactions, which is characterised in the studied complex, and also indicate that protonation as well as coordination to the transition metal have important roles in influencing the pi-binding properties of the aromatic ring. ((C) Wiley-VCH Verlag GmbH & Co. KGaA, 69451 Weinheim, Germany, 2009)
Resumo:
Two-component systems capable of self-assembling into soft gel-phase materials are of considerable interest due to their tunability and versatility. This paper investigates two-component gels based on a combination of a L-lysine-based dendron and a rigid diamine spacer (1,4-diaminobenzene or 1,4-diaminocyclohexane). The networked gelator was investigated using thermal measurements, circular dichroism, NMR spectroscopy and small angle neutron scattering (SANS) giving insight into the macroscopic properties, nanostructure and molecular-scale organisation. Surprisingly, all of these techniques confirmed that irrespective of the molar ratio of the components employed, the "solid-like" gel network always consisted of a 1:1 mixture of dendron/diamine. Additionally, the gel network was able to tolerate a significant excess of diamine in the "liquid-like" phase before being disrupted. In the light of this observation, we investigated the ability of the gel network structure to evolve from mixtures of different aromatic diamines present in excess. We found that these two-component gels assembled in a component-selective manner, with the dendron preferentially recognising 1,4-diaminobenzene (>70%). when similar competitor diamines (1,2- and 1,3-diaminobenzene) are present. Furthermore, NMR relaxation measurements demonstrated that the gel based oil 1,4-diaminobenzene was better able to form a selective ternary complex with pyrene than the gel based oil 1,4-diaminocyclohexane, indicative of controlled and selective pi-pi interactions within a three-component assembly. As such, the results ill this paper demonstrate how component selection processes in two-component gel systems call control hierarchical self-assembly.