4 resultados para type system

em Digital Commons - Michigan Tech


Relevância:

30.00% 30.00%

Publicador:

Resumo:

In 2005, Wetland Studies and Solutions, Inc. (WSSI) installed an extensive Low Impact Development (LID) stormwater management system on their new office site in Gainesville, Virginia. The 4-acre site is serviced by a network of LID components: permeable pavements (two proprietary and one gravel type), bioretention cell / rain garden, green roof, vegetated swale, rainwater harvesting and drip irrigation, and slow-release underground detention. The site consists of heavy clay soils, and the LID components are mostly integrated by a series of underdrain pipes. A comprehensive monitoring system has been designed and installed to measure hydrologic performance throughout the LID, underdrained network. The monitoring system measures flows into and out of each LID component independently while concurrently monitoring rainfall events. A sensitivity analysis and laboratory calibration has been performed on the flow measurement system. Field data has been evaluated to determine the hydrologic performance of the LID features. Finally, hydrologic models amenable to compact, underdrained LID sites have been reviewed and recommended for future modeling and design.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Phenylketonuria, an autosomal recessive Mendelian disorder, is one of the most common inborn errors of metabolism. Although currently treated by diet, many suboptimal outcomes occur for patients. Neuropathological outcomes include cognitive loss, white matter abnormalities, and hypo- or demyelination, resulting from high concentrations and/or fluctuating levels of phenylalanine. High phenylalanine can also result in competitive exclusion of other large neutral amino acids from the brain, including tyrosine and tryptophan (essential precursors of dopamine and serotonin). This competition occurs at the blood brain barrier, where the L-type amino acid transporter, LAT1, selectively facilitates entry of large neutral amino acids. The hypothesis of these studies is that certain non-physiological amino acids (NPAA; DL-norleucine (NL), 2-aminonorbornane (NB; 2-aminobicyclo-(2,1,1)-heptane-2-carboxylic acid), α-aminoisobutyrate (AIB), and α-methyl-aminoisobutyrate (MAIB)) would competitively inhibit LAT1 transport of phenylalanine (Phe) at the blood-brain barrier interface. To test this hypothesis, Pah-/- mice (n=5, mixed gender; Pah+/-(n=5) as controls) were fed either 5% NL, 0.5% NB, 5% AIB or 3% MAIB (w/w 18% protein mouse chow) for 3 weeks. Outcome measurements included food intake, body weight, brain LNAAs, and brain monoamines measured via LCMS/MS or HPLC. Brain Phe values at sacrifice were significantly reduced for NL, NB, and MAIB, verifying the hypothesis that these NPAAs could inhibit Phe trafficking into the brain. However, concomitant reductions in tyrosine and methionine occurred at the concentrations employed. Blood Phe levels were not altered indicating no effect of NPAA competitors in the gut. Brain NL and NB levels, measured with HPLC, verified both uptake and transport of NPAAs. Although believed predominantly unmetabolized, NL feeding significantly increased blood urea nitrogen. Pah-/-disturbances of monoamine metabolism were exacerbated by NPAA intervention, primarily with NB (the prototypical LAT inhibitor). To achieve the overarching goal of using NPAAs to stabilize Phe transport levels into the brain, a specific Phe-reducing combination and concentration of NPAAs must be found. Our studies represent the first in vivo use of NL, NB and MAIB in Pah-/- mice, and provide proof-of-principle for further characterization of these LAT inhibitors. Our data is the first to document an effect of MAIB, a specific system A transport inhibitor, on large neutral amino acid transport.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The integration of novel nanomaterials with highly-functional biological molecules has advanced multiple fields including electronics, sensing, imaging, and energy harvesting. This work focuses on the creation of a new type of bio-nano hybrid substrate for military biosensing applications. Specifically it is shown that the nano-scale interactions of the optical protein bacteriorhodopsin and colloidal semiconductor quantum dots can be utilized as a generic sensing substrate. This work spans from the basic creation of the protein to its application in a novel biosensing system. The functionality of this sensor design originates from the unique interactions between the quantum dot and bacteriorhodopsin molecule when in nanoscale proximity. A direct energy transfer relationship has been established between coreshell quantum dots and the optical protein bacteriorhodopsin that substantially enhances the protein’s native photovoltaic capabilities. This energy transfer phenomena is largely distance dependent, in the sub-10nm realm, and is characterized experimentally at multiple separation distances. Experimental results on the energy transfer efficiency in this hybrid system correlate closely to theoretical predictions. Deposition of the hybrid system with nano-scale control has allowed for the utilization of this energy transfer phenomena as a modulation point for a functional biosensor prototype. This work reveals that quantum dots have the ability to activate the bacteriorhodopsin photocycle through both photonic and non-photonic energy transfer mechanisms. By altering the energy transferred to the bacteriorhodopsin molecule from the quantum dot, the electrical output of the protein can be modulated. A biosensing prototype was created in which the energy transfer relationship is altered upon target binding, demonstrating the applicability of a quantum dot/bacteriorhodopsin hybrid system for sensor applications. The electrical nature of this sensing substrate will allow for its efficient integration into a nanoelectronics array form, potentially leading to a small-low power sensing platform for remote toxin detection applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.