972 resultados para Matrix Array Symmetric Key Encryption
Resumo:
Secure transmission of bulk data is of interest to many content providers. A commercially-viable distribution of content requires technology to prevent unauthorised access. Encryption tools are powerful, but have a performance cost. Without encryption, intercepted data may be illicitly duplicated and re-sold, or its commercial value diminished because its secrecy is lost. Two technical solutions make it possible to perform bulk transmissions while retaining security without too high a performance overhead. These are: 1. a) hierarchical encryption - the stronger the encryption, the harder it is to break but also the more computationally expensive it is. A hierarchical approach to key exchange means that simple and relatively weak encryption and keys are used to encrypt small chunks of data, for example 10 seconds of video. Each chunk has its own key. New keys for this bottom-level encryption are exchanged using a slightly stronger encryption, for example a whole-video key could govern the exchange of the 10-second chunk keys. At a higher level again, there could be daily or weekly keys, securing the exchange of whole-video keys, and at a yet higher level, a subscriber key could govern the exchange of weekly keys. At higher levels, the encryption becomes stronger but is used less frequently, so that the overall computational cost is minimal. The main observation is that the value of each encrypted item determines the strength of the key used to secure it. 2. b) non-symbolic fragmentation with signal diversity - communications are usually assumed to be sent over a single communications medium, and the data to have been encrypted and/or partitioned in whole-symbol packets. Network and path diversity break up a file or data stream into fragments which are then sent over many different channels, either in the same network or different networks. For example, a message could be transmitted partly over the phone network and partly via satellite. While TCP/IP does a similar thing in sending different packets over different paths, this is done for load-balancing purposes and is invisible to the end application. Network and path diversity deliberately introduce the same principle as a secure communications mechanism - an eavesdropper would need to intercept not just one transmission path but all paths used. Non-symbolic fragmentation of data is also introduced to further confuse any intercepted stream of data. This involves breaking up data into bit strings which are subsequently disordered prior to transmission. Even if all transmissions were intercepted, the cryptanalyst still needs to determine fragment boundaries and correctly order them. These two solutions depart from the usual idea of data encryption. Hierarchical encryption is an extension of the combined encryption of systems such as PGP but with the distinction that the strength of encryption at each level is determined by the "value" of the data being transmitted. Non- symbolic fragmentation suppresses or destroys bit patterns in the transmitted data in what is essentially a bit-level transposition cipher but with unpredictable irregularly-sized fragments. Both technologies have applications outside the commercial and can be used in conjunction with other forms of encryption, being functionally orthogonal.
Resumo:
Specific domains can determine protein structural functional relationships. For the Alzheimer’s Amyloid Precursor Protein (APP) several domains have been described, both in its intracellular and extracellular fragments. Many functions have been attributed to APP including an important role in cell adhesion and cell to cell recognition. This places APP at key biological responses, including synaptic transmission. To fulfil these functions, extracellular domains take on added significance. The APP extracellular domain RERMS is in fact a likely candidate to be involved in the aforementioned physiological processes. A multidisciplinary approach was employed to address the role of RERMS. The peptide RERMS was crosslinked to PEG (Polyethylene glycol) and the reaction validated by FTIR (Fourier transform infrared spectrometry). FTIR proved to be the most efficient at validating this reaction because it requires only a drop of sample, and it gives information about the reactions occurred in a mixture. The data obtained consist in an infrared spectra of the sample, where peaks positions give information about the structure of the molecules, and the intensity of peaks is related to the concentration of the molecules. Subsequently substrates of PEG impregnated with RERMS were prepared and SH-SY5Y (human neuroblastoma cell line) cells were plated and differentiated on the latter. Several morphological alterations were clearly evident. The RERMS peptide provoked cells to take on a flatter appearance and the cytoskeletal architecture changed, with the appearance of stress fibres, a clear indicator of actin reorganization. Given that focal adhesions play a key role in determining cellular structure the latter were directly investigated. Focal adhesion kinase (FAK) is one of the most highly expressed proteins in the CNS (central nervous system) during development. It has been described to be crucial for radial migration of neurons. FAK can be localized in growth cones and mediated the response to attractive and repulsive cues during migration. One of the mechanisms by which FAK becomes active is by auto phosphorylation at tyrosine 397. It became clearly evident that in the presence of the RERMS peptide pFAK staining at focal adhesions intensified and more focal adhesions became apparent. Furthermore speckled structures in the nucleus, putatively corresponding to increased expression activity, also increased with RERMS. Taken together these results indicate that the RERMS domain in APP plays a critical role in determining cellular physiological responses. Here is suggested a model by which RERMS domain is recognized by integrins and mediate intracellular responses involving FAK, talin, actin filaments and vinculin. This mechanism probably is responsible for mediating cell adhesion and neurite outgrowth on neurons.
Resumo:
The energy of a symmetric matrix is the sum of the absolute values of its eigenvalues. We introduce a lower bound for the energy of a symmetric partitioned matrix into blocks. This bound is related to the spectrum of its quotient matrix. Furthermore, we study necessary conditions for the equality. Applications to the energy of the generalized composition of a family of arbitrary graphs are obtained. A lower bound for the energy of a graph with a bridge is given. Some computational experiments are presented in order to show that, in some cases, the obtained lower bound is incomparable with the well known lower bound $2\sqrt{m}$, where $m$ is the number of edges of the graph.
Resumo:
Matrix power converters are used for transforming one alternating-current power supply to another, with different peak voltage and frequency. There are three input lines, with sinusoidally varying voltages which are 120◦ out of phase one from another, and the output is to be delivered as a similar three-phase supply. The matrix converter switches rapidly, to connect each output line in sequence to each of the input lines in an attempt to synthesize the prescribed output voltages. The switching is carried out at high frequency and it is of practical importance to know the frequency spectra of the output voltages and of the input and output currents. We determine in this paper these spectra using a new method, which has significant advantages over the prior default method (a multiple Fourier series technique), leading to a considerably more direct calculation. In particular, the determination of the input current spectrum is feasible here, whereas it would be a significantly more daunting procedure using the prior method instead.
Resumo:
Nowadays, information security is a very important topic. In particular, wireless networks are experiencing an ongoing widespread diffusion, also thanks the increasing number of Internet Of Things devices, which generate and transmit a lot of data: protecting wireless communications is of fundamental importance, possibly through an easy but secure method. Physical Layer Security is an umbrella of techniques that leverages the characteristic of the wireless channel to generate security for the transmission. In particular, the Physical Layer based-Key generation aims at allowing two users to generate a random symmetric keys in an autonomous way, hence without the aid of a trusted third entity. Physical Layer based-Key generation relies on observations of the wireless channel, from which harvesting entropy: however, an attacker might possesses a channel simulator, for example a Ray Tracing simulator, to replicate the channel between the legitimate users, in order to guess the secret key and break the security of the communication. This thesis work is focused on the possibility to carry out a so called Ray Tracing attack: the method utilized for the assessment consist of a set of channel measurements, in different channel conditions, that are then compared with the simulated channel from the ray tracing, to compute the mutual information between the measurements and simulations. Furthermore, it is also presented the possibility of using the Ray Tracing as a tool to evaluate the impact of channel parameters (e.g. the bandwidth or the directivity of the antenna) on the Physical Layer based-Key generation. The measurements have been carried out at the Barkhausen Institut gGmbH in Dresden (GE), in the framework of the existing cooperation agreement between BI and the Dept. of Electrical, Electronics and Information Engineering "G. Marconi" (DEI) at the University of Bologna.
Resumo:
Mollusk shells are often found in archeological sites, given their great preservation potential and high value as a multipurpose resource. They are often the only available material to use for radiocarbon dating, due to a lack of well-preserved bones in many archeological sites, especially for the key period of the Middle to Upper Paleolithic transition. However, radiocarbon dating on mollusk shells is often regarded as less reliable compared to bones, wood, or charcoals due to the various factors influencing their radiocarbon content (e.g., Isotope fractionation, marine reservoir effect etc.). For the development of more accurate chronologies using shells, it is fundamental to continue improving the precision of the techniques applied, as has been done for other materials (wood and bones). Thus, improving the chemical pretreatment on mollusk shells might allow researchers to obtain more reliable radiocarbon determinations allowing for the construction of new radiocarbon chronologies in archeological sites where so far it has not been possible. Furthermore, mollusk shells can provide information on the climatic and environmental variables present during their growth. Using shells for paleoclimatic reconstruction adds more evidence helpful for the interpretation of scenarios of human migration, adaptation, and behavior. Standard methods for both radiocarbon and stable isotope studies use the carbonate fraction of the shell. However, being biogenic structures, mollusk shells also consist of a minor organic fraction. The shell organic matrix has an important role in the formation of the calcium carbonate structure and is still not fully understood. This thesis explores the potential of using the shell organic matrix for radiocarbon dating and paleoenvironmental studies. The results of the work performed for this thesis represent a starting point for future research to build on, and further develop the approach and methodology proposed here.
Resumo:
One of the main practical implications of quantum mechanical theory is quantum computing, and therefore the quantum computer. Quantum computing (for example, with Shor’s algorithm) challenges the computational hardness assumptions, such as the factoring problem and the discrete logarithm problem, that anchor the safety of cryptosystems. So the scientific community is studying how to defend cryptography; there are two defense strategies: the quantum cryptography (which involves the use of quantum cryptographic algorithms on quantum computers) and the post-quantum cryptography (based on classical cryptographic algorithms, but resistant to quantum computers). For example, National Institute of Standards and Technology (NIST) is collecting and standardizing the post-quantum ciphers, as it established DES and AES as symmetric cipher standards, in the past. In this thesis an introduction on quantum mechanics was given, in order to be able to talk about quantum computing and to analyze Shor’s algorithm. The differences between quantum and post-quantum cryptography were then analyzed. Subsequently the focus was given to the mathematical problems assumed to be resistant to quantum computers. To conclude, post-quantum digital signature cryptographic algorithms selected by NIST were studied and compared in order to apply them in today’s life.
Resumo:
IKK epsilon (IKKε) is induced by the activation of nuclear factor-κB (NF-κB). Whole-body IKKε knockout mice on a high-fat diet (HFD) were protected from insulin resistance and showed altered energy balance. We demonstrate that IKKε is expressed in neurons and is upregulated in the hypothalamus of obese mice, contributing to insulin and leptin resistance. Blocking IKKε in the hypothalamus of obese mice with CAYMAN10576 or small interfering RNA decreased NF-κB activation in this tissue, relieving the inflammatory environment. Inhibition of IKKε activity, but not TBK1, reduced IRS-1(Ser307) phosphorylation and insulin and leptin resistance by an improvement of the IR/IRS-1/Akt and JAK2/STAT3 pathways in the hypothalamus. These improvements were independent of body weight and food intake. Increased insulin and leptin action/signaling in the hypothalamus may contribute to a decrease in adiposity and hypophagia and an enhancement of energy expenditure accompanied by lower NPY and increased POMC mRNA levels. Improvement of hypothalamic insulin action decreases fasting glycemia, glycemia after pyruvate injection, and PEPCK protein expression in the liver of HFD-fed and db/db mice, suggesting a reduction in hepatic glucose production. We suggest that IKKε may be a key inflammatory mediator in the hypothalamus of obese mice, and its hypothalamic inhibition improves energy and glucose metabolism.
Resumo:
Congenital muscular dystrophy with laminin α2 chain deficiency (MDC1A) is one of the most severe forms of muscular disease and is characterized by severe muscle weakness and delayed motor milestones. The genetic basis of MDC1A is well known, yet the secondary mechanisms ultimately leading to muscle degeneration and subsequent connective tissue infiltration are not fully understood. In order to obtain new insights into the molecular mechanisms underlying MDC1A, we performed a comparative proteomic analysis of affected muscles (diaphragm and gastrocnemius) from laminin α2 chain-deficient dy(3K)/dy(3K) mice, using multidimensional protein identification technology combined with tandem mass tags. Out of the approximately 700 identified proteins, 113 and 101 proteins, respectively, were differentially expressed in the diseased gastrocnemius and diaphragm muscles compared with normal muscles. A large portion of these proteins are involved in different metabolic processes, bind calcium, or are expressed in the extracellular matrix. Our findings suggest that metabolic alterations and calcium dysregulation could be novel mechanisms that underlie MDC1A and might be targets that should be explored for therapy. Also, detailed knowledge of the composition of fibrotic tissue, rich in extracellular matrix proteins, in laminin α2 chain-deficient muscle might help in the design of future anti-fibrotic treatments. All MS data have been deposited in the ProteomeXchange with identifier PXD000978 (http://proteomecentral.proteomexchange.org/dataset/PXD000978).
Resumo:
Subjects with spinal cord injury (SCI) exhibit impaired left ventricular (LV) diastolic function, which has been reported to be attenuated by regular physical activity. This study investigated the relationship between circulating matrix metalloproteinases (MMPs) and tissue inhibitors of MMPs (TIMPs) and echocardiographic parameters in SCI subjects and the role of physical activity in this regard. Forty-two men with SCI [19 sedentary (S-SCI) and 23 physically-active (PA-SCI)] were evaluated by clinical, anthropometric, laboratory, and echocardiographic analysis. Plasmatic pro-MMP-2, MMP-2, MMP-8, pro-MMP-9, MMP-9, TIMP-1 and TIMP-2 levels were determined by enzyme-linked immunosorbent assay and zymography. PA-SCI subjects presented lower pro-MMP-2 and pro-MMP-2/TIMP-2 levels and improved markers of LV diastolic function (lower E/Em and higher Em and E/A values) than S-SCI ones. Bivariate analysis showed that pro-MMP-2 correlated inversely with Em and directly with E/Em, while MMP-9 correlated directly with LV mass index and LV end-diastolic diameter in the whole sample. Following multiple regression analysis, pro-MMP-2, but not physical activity, remained associated with Em, while MMP-9 was associated with LV mass index in the whole sample. These findings suggest differing roles for MMPs in LV structure and function regulation and an interaction among pro-MMP-2, diastolic function and physical activity in SCI subjects.
Resumo:
Corynebacterium species (spp.) are among the most frequently isolated pathogens associated with subclinical mastitis in dairy cows. However, simple, fast, and reliable methods for the identification of species of the genus Corynebacterium are not currently available. This study aimed to evaluate the usefulness of matrix-assisted laser desorption ionization/mass spectrometry (MALDI-TOF MS) for identifying Corynebacterium spp. isolated from the mammary glands of dairy cows. Corynebacterium spp. were isolated from milk samples via microbiological culture (n=180) and were analyzed by MALDI-TOF MS and 16S rRNA gene sequencing. Using MALDI-TOF MS methodology, 161 Corynebacterium spp. isolates (89.4%) were correctly identified at the species level, whereas 12 isolates (6.7%) were identified at the genus level. Most isolates that were identified at the species level with 16 S rRNA gene sequencing were identified as Corynebacterium bovis (n=156; 86.7%) were also identified as C. bovis with MALDI-TOF MS. Five Corynebacterium spp. isolates (2.8%) were not correctly identified at the species level with MALDI-TOF MS and 2 isolates (1.1%) were considered unidentified because despite having MALDI-TOF MS scores >2, only the genus level was correctly identified. Therefore, MALDI-TOF MS could serve as an alternative method for species-level diagnoses of bovine intramammary infections caused by Corynebacterium spp.
Resumo:
High phosphate (Pi) levels and extracellular matrix (ECM) accumulation are associated with chronic kidney disease progression. However, how high Pi levels contribute to ECM accumulation in mesangial cells is unknown. The present study investigated the role and mechanism of high Pi levels in ECM accumulation in immortalized human mesangial cells (iHMCs). iHMCs were exposed to normal (0.9 mM) or increasing Pi concentrations (2.5 and 5 mM) with or without diferent blockers or activators. NOX4, phosphorylated AMPK (p-AMPK), phosphorylated SMAD3 (p-SMAD3), fibronectin (F/N), collagen IV (C-IV) and alpha-smooth muscle actin (α-SMA) expression was assessed via western blot and immunofluorescence. Lucigenin-enhanced chemiluminescence, and dihydroethidium (DHE) assessed NADPH oxidase activity and superoxide (SO), respectively. In iHMCs, a Pi transporter blocker (PFA) abrogated high Pi-induced AMPK inactivation, increase in NADPH oxidase-induced reactive oxygen species (ROS) levels, NOX4, p-SMAD3, α-SMA and C-IV expression. AMPK activation by AICAR, NOX4 silencing or NADPH oxidase blocker prevented high Pi-induced DHE levels, p-SMAD3, F/N, C-IV and α-SMA expression. AMPK inactivation with NOX4-induced ROS formation and transforming growth factor ß-1 (TGFß-1) signaling activation mediates high Pi-induced ECM accumulation in iHMCs. Maneuvers increasing AMPK or reducing NOX4 activity may contribute to renal protection under hyperphosphatemia.
Biased Random-key Genetic Algorithms For The Winner Determination Problem In Combinatorial Auctions.
Resumo:
Abstract In this paper, we address the problem of picking a subset of bids in a general combinatorial auction so as to maximize the overall profit using the first-price model. This winner determination problem assumes that a single bidding round is held to determine both the winners and prices to be paid. We introduce six variants of biased random-key genetic algorithms for this problem. Three of them use a novel initialization technique that makes use of solutions of intermediate linear programming relaxations of an exact mixed integer-linear programming model as initial chromosomes of the population. An experimental evaluation compares the effectiveness of the proposed algorithms with the standard mixed linear integer programming formulation, a specialized exact algorithm, and the best-performing heuristics proposed for this problem. The proposed algorithms are competitive and offer strong results, mainly for large-scale auctions.
Resumo:
The basic reproduction number is a key parameter in mathematical modelling of transmissible diseases. From the stability analysis of the disease free equilibrium, by applying Routh-Hurwitz criteria, a threshold is obtained, which is called the basic reproduction number. However, the application of spectral radius theory on the next generation matrix provides a different expression for the basic reproduction number, that is, the square root of the previously found formula. If the spectral radius of the next generation matrix is defined as the geometric mean of partial reproduction numbers, however the product of these partial numbers is the basic reproduction number, then both methods provide the same expression. In order to show this statement, dengue transmission modelling incorporating or not the transovarian transmission is considered as a case study. Also tuberculosis transmission and sexually transmitted infection modellings are taken as further examples.
Resumo:
The SLC8A1 gene, which encodes the Na(+)/Ca(2+) exchanger, plays a key role in calcium homeostasis. Our previous gene expression oligoarray data revealed SLC8A1 underexpression in penile carcinoma (PeCa). The aim of this study was to investigate whether the dysregulation of SLC8A1 expression is associated with apoptosis and cell proliferation in PeCa, via modulation of calcium concentration. The underlying mechanisms of SLC8A1 underexpression were also explored, focusing on copy number alteration and microRNA. Transcript levels of SLC8A1 gene and miR-223 were evaluated by quantitative PCR, comparing PeCa samples with normal glans tissues. SLC8A1 copy number was evaluated by microarray-based comparative genomic hybridization (array-CGH). Caspase-3 and Ki-67 immunostaining, as well as calcium distribution by Laser Ablation Imaging Inductively Coupled Plasma Mass Spectrometry [LA(i)-ICP-MS], were investigated in both normal and tumor samples. Confirming our previous data, SLC8A1 underexpression was detected in PeCa samples (P=0.001) and was not associated with gene copy number loss. In contrast, overexpression of miR-223 (P=0.002) was inversely correlated with SLC8A1 (P=0.015, r=-0.426), its putative repressor. In addition, SLC8A1 underexpression was associated with decreased calcium distribution, high Ki-67 and low caspase-3 immunoexpression in PeCa when compared with normal tissues. Down-regulation of the SLC8A1 gene, most likely mediated by its regulator miR-223, can lead to reduced calcium levels in PeCa and, consequently, to suppression of apoptosis and increased tumor cell proliferation. These data suggest that the miR-223-NCX1-calcium-signaling axis may represent a potential therapeutic approach in PeCa.