913 resultados para Independant entity


Relevância:

10.00% 10.00%

Publicador:

Resumo:

A central scheduling problem in wireless communications is that of allocating resources to one of many mobile stations that have a common radio channel. Much attention has been given to the design of efficient and fair scheduling schemes that are centrally controlled by a base station (BS) whose decisions depend on the channel conditions reported by each mobile. The BS is the only entity taking decisions in this framework. The decisions are based on the reports of mobiles on their radio channel conditions. In this paper, we study the scheduling problem from a game-theoretic perspective in which some of the mobiles may be noncooperative or strategic, and may not necessarily report their true channel conditions. We model this situation as a signaling game and study its equilibria. We demonstrate that the only Perfect Bayesian Equilibria (PBE) of the signaling game are of the babbling type: the noncooperative mobiles send signals independent of their channel states, the BS simply ignores them, and allocates channels based only on the prior information on the channel statistics. We then propose various approaches to enforce truthful signaling of the radio channel conditions: a pricing approach, an approach based on some knowledge of the mobiles' policies, and an approach that replaces this knowledge by a stochastic approximations approach that combines estimation and control. We further identify other equilibria that involve non-truthful signaling.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Context-aware computing is useful in providing individualized services focusing mainly on acquiring surrounding context of user. By comparison, only very little research has been completed in integrating context from different environments, despite of its usefulness in diverse applications such as healthcare, M-commerce and tourist guide applications. In particular, one of the most important criteria in providing personalized service in a highly dynamic environment and constantly changing user environment, is to develop a context model which aggregates context from different domains to infer context of an entity at the more abstract level. Hence, the purpose of this paper is to propose a context model based on cognitive aspects to relate contextual information that better captures the observation of certain worlds of interest for a more sophisticated context-aware service. We developed a C-IOB (Context-Information, Observation, Belief) conceptual model to analyze the context data from physical, system, application, and social domains to infer context at the more abstract level. The beliefs developed about an entity (person, place, things) are primitive in most theories of decision making so that applications can use these beliefs in addition to history of transaction for providing intelligent service. We enhance our proposed context model by further classifying context information into three categories: a well-defined, a qualitative and credible context information to make the system more realistic towards real world implementation. The proposed model is deployed to assist a M-commerce application. The simulation results show that the service selection and service delivery of the system are high compared to traditional system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile ad hoc networks (MANETs) is one of the successful wireless network paradigms which offers unrestricted mobility without depending on any underlying infrastructure. MANETs have become an exciting and im- portant technology in recent years because of the rapid proliferation of variety of wireless devices, and increased use of ad hoc networks in various applications. Like any other networks, MANETs are also prone to variety of attacks majorly in routing side, most of the proposed secured routing solutions based on cryptography and authentication methods have greater overhead, which results in latency problems and resource crunch problems, especially in energy side. The successful working of these mechanisms also depends on secured key management involving a trusted third authority, which is generally difficult to implement in MANET environ-ment due to volatile topology. Designing a secured routing algorithm for MANETs which incorporates the notion of trust without maintaining any trusted third entity is an interesting research problem in recent years. This paper propose a new trust model based on cognitive reasoning,which associates the notion of trust with all the member nodes of MANETs using a novel Behaviors-Observations- Beliefs(BOB) model. These trust values are used for detec- tion and prevention of malicious and dishonest nodes while routing the data. The proposed trust model works with the DTM-DSR protocol, which involves computation of direct trust between any two nodes using cognitive knowledge. We have taken care of trust fading over time, rewards, and penalties while computing the trustworthiness of a node and also route. A simulator is developed for testing the proposed algorithm, the results of experiments shows incorporation of cognitive reasoning for computation of trust in routing effectively detects intrusions in MANET environment, and generates more reliable routes for secured routing of data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This recommendation proposes a definition for the term ``halogen bond'', which designates a specific subset of the inter- and intramolecular interactions involving a halogen atom in a molecular entity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recession flows in a basin are controlled by the temporal evolution of its active drainage network (ADN). The geomorphological recession flow model (GRFM) assumes that both the rate of flow generation per unit ADN length (q) and the speed at which ADN heads move downstream (c) remain constant during a recession event. Thereby, it connects the power law exponent of -dQ/dt versus Q (discharge at the outlet at time t) curve, , with the structure of the drainage network, a fixed entity. In this study, we first reformulate the GRFM for Horton-Strahler networks and show that the geomorphic ((g)) is equal to D/(D-1), where D is the fractal dimension of the drainage network. We then propose a more general recession flow model by expressing both q and c as functions of Horton-Strahler stream order. We show that it is possible to have = (g) for a recession event even when q and c do not remain constant. The modified GRFM suggests that is controlled by the spatial distribution of subsurface storage within the basin. By analyzing streamflow data from 39 U.S. Geological Survey basins, we show that is having a power law relationship with recession curve peak, which indicates that the spatial distribution of subsurface storage varies across recession events. Key Points The GRFM is reformulated for Horton-Strahler networks. The GRFM is modified by allowing its parameters to vary along streams. Sub-surface storage distribution controls recession flow characteristics.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Conformational diversity or shapeshifting in cyclic peptide natural products can, in principle, confer a single molecular entity with the property of binding to multiple receptors. Conformational equilibria have been probed in the contryphans, which are peptides derived from Conus venom possessing a 23-membered cyclic disulfide moiety. The natural sequences derived from Conus inscriptus, GCV(D)LYPWC* (In936) and Conus loroisii, GCP(D)WDPWC* (Lo959) differ in the number of proline residues within the macrocyclic ring. Structural characterisation of distinct conformational states arising from cis-trans equilibria about Xxx-Pro bonds is reported. Isomerisation about the C2-P3 bond is observed in the case of Lo959 and about the Y5-P6 bond in In936. Evidence is presented for as many as four distinct species in the case of the synthetic analogue V3P In936. The Tyr-Pro-Trp segment in In936 is characterised by distinct sidechain orientations as a consequence of aromatic/proline interactions as evidenced by specific sidechain-sidechain nuclear Overhauser effects and ring current shifted proton chemical shifts. Molecular dynamics simulations suggest that Tyr5 and Trp7 sidechain conformations are correlated and depend on the geometry of the Xxx-Pro bond. Thermodynamic parameters are derived for the cis trans equilibrium for In936. Studies on synthetic analogues provide insights into the role of sequence effects in modulating isomerisation about Xxx-Pro bonds.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The structural landscape of acid-pyridine cocrystals is explored by adopting a combinatorial matrix method with 4-substituted benzoic acids and 4-substituted pyridines. The choice of the system restricts the primary synthon to the robust acid-pyridine entity. This methodology accordingly provides hints toward the formation of secondary synthons. The pK(a) rule is validated in the landscape by taking all components of the matrix together and exploring it as a whole. Along with the global features, the exploration of landscapes reveals some local features. Apart from the identification of secondary synthons, it also sheds light on the propensity of hydration in cocrystals, synthon competition, and certain topological similarities. The method described here combines two approaches, namely, database analysis and high throughput crystallography, to extract more information with minimal extra experimental effort.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a multipartite protocol in a counterfactual paradigm. In counterfactual quantum cryptography, secure information is transmitted between two spatially separated parties even when there is no physical travel of particles transferring the information between them. We propose here a tripartite counterfactual quantum protocol for the task of certificate authorization. Here a trusted third party, Alice, authenticates an entity Bob (e.g., a bank) that a client Charlie wishes to securely transact with. The protocol is counterfactual with respect to either Bob or Charlie. We prove its security against a general incoherent attack, where Eve attacks single particles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider the problem of ``fair'' scheduling the resources to one of the many mobile stations by a centrally controlled base station (BS). The BS is the only entity taking decisions in this framework based on truthful information from the mobiles on their radio channel. We study the well-known family of parametric alpha-fair scheduling problems from a game-theoretic perspective in which some of the mobiles may be noncooperative. We first show that if the BS is unaware of the noncooperative behavior from the mobiles, the noncooperative mobiles become successful in snatching the resources from the other cooperative mobiles, resulting in unfair allocations. If the BS is aware of the noncooperative mobiles, a new game arises with BS as an additional player. It can then do better by neglecting the signals from the noncooperative mobiles. The BS, however, becomes successful in eliciting the truthful signals from the mobiles only when it uses additional information (signal statistics). This new policy along with the truthful signals from mobiles forms a Nash equilibrium (NE) that we call a Truth Revealing Equilibrium. Finally, we propose new iterative algorithms to implement fair scheduling policies that robustify the otherwise nonrobust (in presence of noncooperation) alpha-fair scheduling algorithms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Identification and analysis of nonbonded interactions within a molecule and with the surrounding molecules are an essential part of structural studies, given the importance of these interactions in defining the structure and function of any supramolecular entity. MolBridge is an easy to use algorithm based purely on geometric criteria that can identify all possible nonbonded interactions, such as hydrogen bond, halogen bond, cation-pi, pi-pi and van der Waals, in small molecules as well as biomolecules. The user can either upload three-dimensional coordinate files or enter the molecular ID corresponding to the relevant database. The program is available in a standalone form and as an interactive web server with Jmol and JME incorporated into it. The program is freely downloadable and the web server version is also available at http://nucleix.mbu.iisc.ernet.in/molbridge/index.php.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Obsessive compulsive symptoms frequently occur in a substantial proportion of patients with schizophrenia. The term schizoobsessive has been proposed to delineate this subgroup of schizophrenia patients who present with obsessive compulsive symptoms/disorder. However, whether this co-occurrence is more than just co-morbidity and represents a distinct subgroup remains controversial. A striking variation is noted across studies examining prevalence of obsessive compulsive symptoms/disorder in schizophrenia patients and their impact on clinical profile of schizophrenia. Hence, in this study, we examined the prevalence of obsessive compulsive symptoms/disorder in a large sample of consecutively hospitalized schizophrenia patients and compared the clinical and functional characteristics of schizophrenia patients with and without obsessive compulsive symptoms/disorder. We evaluated 200 consecutive subjects with the DSM-IV diagnosis of schizophrenia using the Structured Clinical Interview for DSM-IV Axis I disorders, Positive and Negative Syndrome Scale, Yale Brown Obsessive Compulsive Scale, Brown Assessment of Beliefs Scale, Clinical Global Impression-Severity scale, Global Assessment of Functioning Scale, Family Interview for Genetic Studies and World Health Organization Quality of Life scale. The prevalence of obsessive compulsive symptoms in patients with schizophrenia was 24% (n = 48); 37 of them had obsessive compulsive disorder (OCD) and II had obsessive compulsive symptoms not amounting to a clinical diagnosis of OCD (OCS). Schizophrenia patients with OCS/OCD had an earlier age at onset of schizophrenia symptoms, lower positive symptoms score, higher co-morbidity with Axis II disorders, higher occurrence of OCD in family and better quality of life. Findings of the study indicate a higher prevalence of OCS/OCD in schizophrenia. Schizophrenia patients with and without OCS/OCD have comparable clinical profile with few exceptions. High rates of OCD in first degree relatives suggest possible genetic contributions and differences in neurobiology. Finally, evidence to consider schizoobsessive as a distinct diagnostic entity is inconclusive and warrants further studies. (C) 2014 Elsevier Inc. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Island systems from around the world have provided fascinating opportunities for studies pertaining to various evolutionary processes. One recurring feature of isolated islands is the presence of endemic radiations. In this regard, the Indian subcontinent is an interesting entity given it has been an island during much of its history following separation from Madagascar and currently is isolated from much of Eurasia by the Himalayas in the north and the Indian Ocean in the south. Not surprisingly, recent molecular studies on a number of endemic taxa from India have reported endemic radiations. These studies suggest that the uniqueness of Indian biota is not just due to its diverse origin, but also due to evolution in isolation. The isolation of India has generated some peculiarities typically seen on oceanic islands. However, these patterns might be confined to, groups with low dispersal ability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication). Alternatively an application might require that no one but a party can communicate on its behalf (a.k.a. message authentication). Yet, on the other hand privacy concerns also dictate that anonymity of a legitimate party should be preserved; that is no information concerning the identity of parties should be leaked to an outside entity eavesdropping on the communication. This conflict becomes even more acute when considering anonymity with respect to an active entity that may attempt to impersonate other parties in the system. In this work we resolve this conflict in two steps. First we formalize what it means for a system to provide both authenticity and anonymity even in the presence of an active man-in-the-middle adversary for various specific applications such as message and entity authentication using the constructive cryptography framework of Mau11, MR11]. Our approach inherits the composability statement of constructive cryptography and can therefore be directly used in any higher-level context. Next we demonstrate several simple protocols for realizing these systems, at times relying on a new type of (probabilistic) Message Authentication Code (MAC) called key indistinguishable (KI) MACs. Similar to the key hiding encryption schemes of BBDP01] they guarantee that tags leak no discernible information about the keys used to generate them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

INTRODUCTION: Recent studies in other European countries suggest that the prevalence of congenital cryptorchidism continues to increase. This study aimed to explore the prevalence and natural history of congenital cryptorchidism in a UK centre. METHODS: Between October 2001 and July 2008, 784 male infants were born in the prospective Cambridge Baby Growth Study. 742 infants were examined by trained research nurses at birth; testicular position was assessed using standard techniques. Follow-up assessments were completed at ages 3, 12, 18 and 24 months in 615, 462, 393 and 326 infants, respectively. RESULTS: The prevalence of cryptorchidism at birth was 5.9% (95% CI 4.4% to 7.9%). Congenital cryptorchidism was associated with earlier gestational age (p<0.001), lower birth weight (p<0.001), birth length (p<0.001) and shorter penile length at birth (p<0.0001) compared with other infants, but normal size after age 3 months. The prevalence of cryptorchidism declined to 2.4% at 3 months, but unexpectedly rose again to 6.7% at 12 months as a result of new cases. The cumulative incidence of "acquired cryptorchidism" by age 24 months was 7.0% and these cases had shorter penile length during infancy than other infants (p = 0.003). CONCLUSIONS: The prevalence of congenital cryptorchidism was higher than earlier estimates in UK populations. Furthermore, this study for the first time describes acquired cryptorchidism or "ascending testis" as a common entity in male infants, which is possibly associated with reduced early postnatal androgen activity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen: Este trabajo analiza la acción colectiva sindical postnacional en el MERCOSUR en un período histórico signado por profundas mutaciones políticas, económicas, y productivas sociales (1991-2012) a partir de los relatos y representaciones de sus protagonistas. El trabajo cualitativo intentará explicar la configuración del sindicalismo internacional en la globalización, y describir las estrategias del movimiento obrero mercosureño. La metodología cualitativa ilustra un trabajo de campo a partir de entrevistas en profundidad a 34 sindicalistas del Mercosur, y entrevistas adicionales a tres representantes de la Confederación Sindical de las Américas, dos empresarios del Mercosur, un especialista académico en la dimensión sociolaboral de la integración regional y un representante de la OIT en la región. La metodología de análisis e interpretación de dichas entrevistas ha sido la teoría fundamentada, entendida como la técnica más idónea de aprehender los procesos sociales a través de las voces de los líderes obreros, comprender su realidad, sus representaciones y sistema de valores, sus ideas y su acción colectiva. La literatura de los movimientos sociales en la globalización capitalista ha puesto el énfasis en la emergencia de nuevos colectivos cuyos reclamos se concentran en el reconocimiento (Fraser y Honneth, 2006) de sus identidades que el modelo fordista de producción pareció invisibilizar y soslayar ante la primacía de las prácticas económicas y demandas distributivas. Esta tesis conjuga una perspectiva dualista y demuestra que las estrategias de reconocimiento y las reivindicaciones de redistribución de tipo clasista se resignificaron en el escenario postnacional a través de la Coordinadora de Centrales Sindicales del Cono Sur –CCSCS- (subregional) y, con un desarrollo menor: los Sindicatos Globales (FSI, GUFs) en la acción sectorial [1991-2012]. Para arribar al núcleo configurativo de sus representaciones y su sistema de valores, la investigación transitó por los sentidos y significados del trabajo, las mutaciones productivas y de las condiciones del trabajo, las teorías del fin del trabajo, la precarización y la representación de los trabajadores más frágiles: mujeres, jóvenes y migrantes. En un segundo orden se interpeló sobre la gobernanza mundial, los organismos internacionales, el régimen normativo internacional, la civilización capitalista, para luego abordar el estudio específico del Mercosur y la acción obrera en dicho proceso. El núcleo determinó que para los representantes obreros la acción colectiva sindical debe ser postnacional y su objetivo es limitar la globalización capitalista neoliberal. La CCSCS conformó desde sus inicios un movimiento capaz de elevarse al rango supranacional para representar la voz de los trabajadores del MERCOSUR. La pluralidad configuró su mayor virtud durante sus primeros 20 años, reconociendo una experiencia de aprendizaje de tolerancia y respeto, que ellos definen como la unidad en la diversidad. Esta entidad constituye un patrimonio único como paradigma del sindicalismo postnacional. Los sindicatos del Cono Sur adoptaron diversas modalidades de acción colectiva: a) reactiva (con repertorios de insubordinación, de lucha y resistencia al modelo neoliberal), b) proactiva (con repertorios de incidencia normativa en el MERCOSUR) y c) participativa (con repertorios de producción propositiva de incidencia en la dimensión social del MERCOSUR). Su acción colectiva reactiva, normativa y propositiva fue eficaz a mediano plazo para participar e incidir en el MERCOSUR, crear una dimensión social del bloque y dotar de derechos normativos a los ciudadanos de la región. Su acción tuvo un sentido político de gran poder instituyente, con capacidad movilización y alta exposición pública. Sin embargo, en la segunda década su lógica de construcción quedó subordinada a los procesos nacionales y a los partidos gobernantes, dejó de ser performativa y de creación política, dirimiéndose en la esfera social junto a otros movimientos sociales emergentes, y provocó un ciclo de desmovilización. Simultáneamente, emergió con fuerza otra modalidad de sindicalismo postnacional con la fusión y refundación de los Sindicatos Globales. Su acción sectorial contribuye a restaurar las demandas de distribución que habían quedado soslayadas, pero esta tesis manifiesta que los protagonistas afirman que sus marcos de acción colectiva deberán ser conjuntos para ser exitosa. El sindicalismo postnacional en el MERCOSUR se define a sí mismos como agente de desarrollo, protagonista del modelo socioproductivo, pero también como vehículo partícipe de la democracia y de una matriz sustentable de desarrollo