972 resultados para DEPOLARIZATION SHIFT
Resumo:
In order to achieve to minimize car-based trips, transport planners have been particularly interested in understanding the factors that explain modal choices. In the transport modelling literature there has been an increasing awareness that socioeconomic attributes and quantitative variables are not sufficient to characterize travelers and forecast their travel behavior. Recent studies have also recognized that users? social interactions and land use patterns influence travel behavior, especially when changes to transport systems are introduced, but links between international and Spanish perspectives are rarely deal. In this paper, factorial and path analyses through a Multiple-Indicator Multiple-Cause (MIMIC) model are used to understand and describe the relationship between the different psychological and environmental constructs with social influence and socioeconomic variables. The MIMIC model generates Latent Variables (LVs) to be incorporated sequentially into Discrete Choice Models (DCM) where the levels of service and cost attributes of travel modes are also included directly to measure the effect of the transport policies that have been introduced in Madrid during the last three years in the context of the economic crisis. The data used for this paper are collected from a two panel smartphone-based survey (n=255 and 190 respondents, respectively) of Madrid.
Resumo:
A novel time-stepping shift-invert algorithm for linear stability analysis of laminar flows in complex geometries is presented. This method, based on a Krylov subspace iteration, enables the solution of complex non-symmetric eigenvalue problems in a matrix-free framework. Validations and comparisons to the classical exponential method have been performed in three different cases: (i) stenotic flow, (ii) backward-facing step and (iii) lid-driven swirling flow. Results show that this new approach speeds up the required Krylov subspace iterations and has the capability of converging to specific parts of the global spectrum. It is shown that, although the exponential method remains the method of choice if leading eigenvalues are sought, the performance of the present method could be dramatically improved with the use of a preconditioner. In addition, as opposed to other methods, this strategy can be directly applied to any time-stepper, regardless of the temporal or spatial discretization of the latter.
Resumo:
Los algoritmos basados en registros de desplazamiento con realimentación (en inglés FSR) se han utilizado como generadores de flujos pseudoaleatorios en aplicaciones con recursos limitados como los sistemas de apertura sin llave. Se considera canal primario a aquel que se utiliza para realizar una transmisión de información. La aparición de los ataques de canal auxiliar (en inglés SCA), que explotan información filtrada inintencionadamente a través de canales laterales como el consumo, las emisiones electromagnéticas o el tiempo empleado, supone una grave amenaza para estas aplicaciones, dado que los dispositivos son accesibles por un atacante. El objetivo de esta tesis es proporcionar un conjunto de protecciones que se puedan aplicar de forma automática y que utilicen recursos ya disponibles, evitando un incremento sustancial en los costes y alargando la vida útil de aplicaciones que puedan estar desplegadas. Explotamos el paralelismo existente en algoritmos FSR, ya que sólo hay 1 bit de diferencia entre estados de rondas consecutivas. Realizamos aportaciones en tres niveles: a nivel de sistema, utilizando un coprocesador reconfigurable, a través del compilador y a nivel de bit, aprovechando los recursos disponibles en el procesador. Proponemos un marco de trabajo que nos permite evaluar implementaciones de un algoritmo incluyendo los efectos introducidos por el compilador considerando que el atacante es experto. En el campo de los ataques, hemos propuesto un nuevo ataque diferencial que se adapta mejor a las condiciones de las implementaciones software de FSR, en las que el consumo entre rondas es muy similar. SORU2 es un co-procesador vectorial reconfigurable propuesto para reducir el consumo energético en aplicaciones con paralelismo y basadas en el uso de bucles. Proponemos el uso de SORU2, además, para ejecutar algoritmos basados en FSR de forma segura. Al ser reconfigurable, no supone un sobrecoste en recursos, ya que no está dedicado en exclusiva al algoritmo de cifrado. Proponemos una configuración que ejecuta múltiples algoritmos de cifrado similares de forma simultánea, con distintas implementaciones y claves. A partir de una implementación sin protecciones, que demostramos que es completamente vulnerable ante SCA, obtenemos una implementación segura a los ataques que hemos realizado. A nivel de compilador, proponemos un mecanismo para evaluar los efectos de las secuencias de optimización del compilador sobre una implementación. El número de posibles secuencias de optimizaciones de compilador es extremadamente alto. El marco de trabajo propuesto incluye un algoritmo para la selección de las secuencias de optimización a considerar. Debido a que las optimizaciones del compilador transforman las implementaciones, se pueden generar automáticamente implementaciones diferentes combinamos para incrementar la seguridad ante SCA. Proponemos 2 mecanismos de aplicación de estas contramedidas, que aumentan la seguridad de la implementación original sin poder considerarse seguras. Finalmente hemos propuesto la ejecución paralela a nivel de bit del algoritmo en un procesador. Utilizamos la forma algebraica normal del algoritmo, que automáticamente se paraleliza. La implementación sobre el algoritmo evaluado mejora en rendimiento y evita que se filtre información por una ejecución dependiente de datos. Sin embargo, es más vulnerable ante ataques diferenciales que la implementación original. Proponemos una modificación del algoritmo para obtener una implementación segura, descartando parcialmente ejecuciones del algoritmo, de forma aleatoria. Esta implementación no introduce una sobrecarga en rendimiento comparada con las implementaciones originales. En definitiva, hemos propuesto varios mecanismos originales a distintos niveles para introducir aleatoridad en implementaciones de algoritmos FSR sin incrementar sustancialmente los recursos necesarios. ABSTRACT Feedback Shift Registers (FSR) have been traditionally used to implement pseudorandom sequence generators. These generators are used in Stream ciphers in systems with tight resource constraints, such as Remote Keyless Entry. When communicating electronic devices, the primary channel is the one used to transmit the information. Side-Channel Attack (SCA) use additional information leaking from the actual implementation, including power consumption, electromagnetic emissions or timing information. Side-Channel Attacks (SCA) are a serious threat to FSR-based applications, as an attacker usually has physical access to the devices. The main objective of this Ph.D. thesis is to provide a set of countermeasures that can be applied automatically using the available resources, avoiding a significant cost overhead and extending the useful life of deployed systems. If possible, we propose to take advantage of the inherent parallelism of FSR-based algorithms, as the state of a FSR differs from previous values only in 1-bit. We have contributed in three different levels: architecture (using a reconfigurable co-processor), using compiler optimizations, and at bit level, making the most of the resources available at the processor. We have developed a framework to evaluate implementations of an algorithm including the effects introduced by the compiler. We consider the presence of an expert attacker with great knowledge on the application and the device. Regarding SCA, we have presented a new differential SCA that performs better than traditional SCA on software FSR-based algorithms, where the leaked values are similar between rounds. SORU2 is a reconfigurable vector co-processor. It has been developed to reduce energy consumption in loop-based applications with parallelism. In addition, we propose its use for secure implementations of FSR-based algorithms. The cost overhead is discarded as the co-processor is not exclusively dedicated to the encryption algorithm. We present a co-processor configuration that executes multiple simultaneous encryptions, using different implementations and keys. From a basic implementation, which is proved to be vulnerable to SCA, we obtain an implementation where the SCA applied were unsuccessful. At compiler level, we use the framework to evaluate the effect of sequences of compiler optimization passes on a software implementation. There are many optimization passes available. The optimization sequences are combinations of the available passes. The amount of sequences is extremely high. The framework includes an algorithm for the selection of interesting sequences that require detailed evaluation. As existing compiler optimizations transform the software implementation, using different optimization sequences we can automatically generate different implementations. We propose to randomly switch between the generated implementations to increase the resistance against SCA.We propose two countermeasures. The results show that, although they increase the resistance against SCA, the resulting implementations are not secure. At bit level, we propose to exploit bit level parallelism of FSR-based implementations using pseudo bitslice implementation in a wireless node processor. The bitslice implementation is automatically obtained from the Algebraic Normal Form of the algorithm. The results show a performance improvement, avoiding timing information leakage, but increasing the vulnerability against differential SCA.We provide a secure version of the algorithm by randomly discarding part of the data obtained. The overhead in performance is negligible when compared to the original implementations. To summarize, we have proposed a set of original countermeasures at different levels that introduce randomness in FSR-based algorithms avoiding a heavy overhead on the resources required.
Resumo:
Wireless power transfer (WPT) is an emerging technology with an increasing number of potential applications to transfer power from a transmitter to a mobile receiver over a relatively large air gap. However, its widespread application is hampered due to the relatively low efficiency of current Wireless power transfer (WPT) systems. This study presents a concept to maximize the efficiency as well as to increase the amount of extractable power of a WPT system operating in nonresonant operation. The proposed method is based on actively modifying the equivalent secondary-side load impedance by controlling the phase-shift of the active rectifier and its output voltage level. The presented hardware prototype represents a complete wireless charging system, including a dc-dc converter which is used to charge a battery at the output of the system. Experimental results are shown for the proposed concept in comparison to a conventional synchronous rectification approach. The presented optimization method clearly outperforms state-of-the-art solutions in terms of efficiency and extractable power.
Resumo:
The perceived speed of motion in one part of the visual field is influenced by the speed of motion in its surrounding fields. Little is known about the cellular mechanisms causing this phenomenon. Recordings from mammalian visual cortex revealed that speed preference of the cortical cells could be changed by displaying a contrast speed in the field surrounding the cell’s classical receptive field. The neuron’s selectivity shifted to prefer faster speed if the contextual surround motion was set at a relatively lower speed, and vice versa. These specific center–surround interactions may underlie the perceptual enhancement of speed contrast between adjacent fields.
Resumo:
The boronium-carbonium continuum was extended to include hypercoordinated protonated methanes and their boron analogs. The 11B NMR chemical shifts of the hypercoordinated hydriodo boron compounds and the 13C NMR chemical shifts of the corresponding isoelectronic and isostructural carbocations were calculated by using the GIAO-MP2 method. The data show good linear correlation between 11B and 13C NMR chemical shifts, which indicates that the same factors that determine the chemical shifts of the boron nuclei also govern the chemical shifts of carbon nuclei of these hypercoordinated hydriodo compounds.
Resumo:
In coming decades, global climate changes are expected to produce large shifts in vegetation distributions at unprecedented rates. These shifts are expected to be most rapid and extreme at ecotones, the boundaries between ecosystems, particularly those in semiarid landscapes. However, current models do not adequately provide for such rapid effects—particularly those caused by mortality—largely because of the lack of data from field studies. Here we report the most rapid landscape-scale shift of a woody ecotone ever documented: in northern New Mexico in the 1950s, the ecotone between semiarid ponderosa pine forest and piñon–juniper woodland shifted extensively (2 km or more) and rapidly (<5 years) through mortality of ponderosa pines in response to a severe drought. This shift has persisted for 40 years. Forest patches within the shift zone became much more fragmented, and soil erosion greatly accelerated. The rapidity and the complex dynamics of the persistent shift point to the need to represent more accurately these dynamics, especially the mortality factor, in assessments of the effects of climate change.
Resumo:
During light-driven proton transport bacteriorhodopsin shuttles between two protein conformations. A large-scale structural change similar to that in the photochemical cycle is produced in the D85N mutant upon raising the pH, even without illumination. We report here that (i) the pKa values for the change in crystallographic parameters and for deprotonation of the retinal Schiff base are the same, (ii) the retinal isomeric configuration is nearly unaffected by the protein conformation, and (iii) preventing rotation of the C13—C14 double bond by replacing the retinal with an all-trans locked analogue makes little difference to the Schiff base pKa. We conclude that the direct cause of the conformational shift is destabilization of the structure upon loss of interaction of the positively charged Schiff base with anionic residues that form its counter-ion.
Resumo:
Fast transverse relaxation of 1H, 15N, and 13C by dipole-dipole coupling (DD) and chemical shift anisotropy (CSA) modulated by rotational molecular motions has a dominant impact on the size limit for biomacromolecular structures that can be studied by NMR spectroscopy in solution. Transverse relaxation-optimized spectroscopy (TROSY) is an approach for suppression of transverse relaxation in multidimensional NMR experiments, which is based on constructive use of interference between DD coupling and CSA. For example, a TROSY-type two-dimensional 1H,15N-correlation experiment with a uniformly 15N-labeled protein in a DNA complex of molecular mass 17 kDa at a 1H frequency of 750 MHz showed that 15N relaxation during 15N chemical shift evolution and 1HN relaxation during signal acquisition both are significantly reduced by mutual compensation of the DD and CSA interactions. The reduction of the linewidths when compared with a conventional two-dimensional 1H,15N-correlation experiment was 60% and 40%, respectively, and the residual linewidths were 5 Hz for 15N and 15 Hz for 1HN at 4°C. Because the ratio of the DD and CSA relaxation rates is nearly independent of the molecular size, a similar percentagewise reduction of the overall transverse relaxation rates is expected for larger proteins. For a 15N-labeled protein of 150 kDa at 750 MHz and 20°C one predicts residual linewidths of 10 Hz for 15N and 45 Hz for 1HN, and for the corresponding uniformly 15N,2H-labeled protein the residual linewidths are predicted to be smaller than 5 Hz and 15 Hz, respectively. The TROSY principle should benefit a variety of multidimensional solution NMR experiments, especially with future use of yet somewhat higher polarizing magnetic fields than are presently available, and thus largely eliminate one of the key factors that limit work with larger molecules.
Resumo:
N-type and P/Q-type Ca2+ channels are inhibited by neurotransmitters acting through G protein-coupled receptors in a membrane-delimited pathway involving Gβγ subunits. Inhibition is caused by a shift from an easily activated “willing” (W) state to a more-difficult-to-activate “reluctant” (R) state. This inhibition can be reversed by strong depolarization, resulting in prepulse facilitation, or by protein kinase C (PKC) phosphorylation. Comparison of regulation of N-type Ca2+ channels containing Cav2.2a α1 subunits and P/Q-type Ca2+ channels containing Cav2.1 α1 subunits revealed substantial differences. In the absence of G protein modulation, Cav2.1 channels containing Cavβ subunits were tonically in the W state, whereas Cav2.1 channels without β subunits and Cav2.2a channels with β subunits were tonically in the R state. Both Cav2.1 and Cav2.2a channels could be shifted back toward the W state by strong depolarization or PKC phosphorylation. Our results show that the R state and its modulation by prepulse facilitation, PKC phosphorylation, and Cavβ subunits are intrinsic properties of the Ca2+ channel itself in the absence of G protein modulation. A common allosteric model of G protein modulation of Ca2+-channel activity incorporating an intrinsic equilibrium between the W and R states of the α1 subunits and modulation of that equilibrium by G proteins, Cavβ subunits, membrane depolarization, and phosphorylation by PKC accommodates our findings. Such regulation will modulate transmission at synapses that use N-type and P/Q-type Ca2+ channels to initiate neurotransmitter release.
Resumo:
Accumulation of misfolded proteins in the cell at high temperature may cause entry into a nonproliferating, heat-shocked state. The imino acid analog azetidine 2-carboxylic acid (AZC) is incorporated into cellular protein competitively with proline and can misfold proteins into which it is incorporated. AZC addition to budding yeast cells at concentrations sufficient to inhibit proliferation selectively activates heat shock factor (HSF). We find that AZC treatment fails to cause accumulation of glycogen and trehalose (Msn2/4-dependent processes) or to induce thermotolerance (a protein kinase C-dependent process). However, AZC-arrested cells can accumulate glycogen and trehalose and can acquire thermotolerance in response to a subsequent heat shock. We find that AZC treatment arrests cells in a viable state and that this arrest is reversible. We find that cells at high temperature or cells deficient in the ubiquitin-conjugating enzymes Ubc4 and Ubc5 are hypersensitive to AZC-induced proliferation arrest. We find that AZC treatment mimics temperature up-shift in arresting cells in G1 and represses expression of CLN1 and CLN2. Mutants with reduced G1 cyclin-Cdc28 activity are hypersensitive to AZC-induced proliferation arrest. Expression of the hyperstable Cln3–2 protein prevents G1 arrest upon AZC treatment and temperature up-shift. Finally, we find that the EXA3–1 mutation, encoding a defective HSF, prevents efficient G1 arrest in response to both temperature up-shift and AZC treatment. We conclude that nontoxic levels of misfolded proteins (induced by AZC treatment or by high temperature) selectively activate HSF, which is required for subsequent G1 arrest.
Resumo:
The infected cell protein no. 0 (ICP0), the product of the alpha 0 gene, and an important herpes simplex virus 1 regulatory protein is encoded by three exons. We report that intron 1 forms a family of four stable nonpolyadenylylated cytoplasmic RNAs sharing a common 5' end but differing in 3' ends. The 5' and 3' ends correspond to the accepted splice donor and four splice acceptor sites within the mapped intron domain. The most distant splice acceptor site yields the mRNA encoding the 775-aa protein known as ICP0. The mRNAs resulting from the use of alternative splice acceptor sites were also present in the cytoplasm of infected cells and would be predicted to encode proteins of 152 (ICP0-B), 87 (ICP0-C), and 90 (ICP0-D) amino acids, respectively. Both the stability of the alpha 0 mRNA and the utilization of at least one splice acceptor site was regulated by ICP22 and or US1.5 protein inasmuch as cells infected with a mutant from which these genes had been deleted accumulated smaller amounts of alpha 0 mRNA than would be predicted from the amounts of accumulated intron RNAs. In addition, one splice acceptor site was at best underutilized. These results indicate that both the splicing pattern and longevity of alpha 0 mRNA are regulated. These and other recent examples indicate that herpes simplex virus 1 regulates its own gene expression and that of the infected cells through control of mRNA splicing and longevity.
Resumo:
Na+-Ca2+ exchanger and Ca2+ channel are two major sarcolemmal Ca2+-transporting proteins of cardiac myocytes. Although the Ca2+ channel is effectively regulated by protein kinase A-dependent phosphorylation, no enzymatic regulation of the exchanger protein has been identified as yet. Here we report that in frog ventricular myocytes, isoproterenol down-regulates the Na+-Ca2+ exchanger, independent of intracellular Ca2+ and membrane potential, by activation of the beta-receptor/adenylate-cyclase/cAMP-dependent cascade, resulting in suppression of transmembrane Ca2+ transport via the exchanger and providing for the well-documented contracture-suppressant effect of the hormone on frog heart. The beta-blocker propranolol blocks the isoproterenol effect, whereas forskolin, cAMP, and theophylline mimic it. In the frog heart where contractile Ca2+ is transported primarily by the Na+-Ca2+ exchanger, the beta-agonists' simultaneous enhancement of Ca2+ current, ICa, and suppression of Na+-Ca2+ exchanger current, INa-Ca would enable the myocyte to develop force rapidly at the onset of depolarization (enhancement of ICa) and to decrease Ca2+ influx (suppression of INa-Ca) later in the action potential. This unique adrenergically induced shift in the Ca2+ influx pathways may have evolved in response to paucity of the sarcoplasmic reticulum Ca2+-ATPase/phospholamban complex and absence of significant intracellular Ca2+ release pools in the frog heart.
Resumo:
The present study was designed to determine the magnitude of the relationship between amount, frequency, and length of shift work completed by female transportation employees and the number, degree, and extent of problems related to physical, menstrual and psychological health including depression. It was hypothesized that workers that are employed in areas such as transportation who are working shift work on a regular basis place themselves at higher risk for developing health or psychosocial related effects. These health related outcomes can have a profound impact on an employee’s job performance, daily functioning, and personal life. The present study sought to understand the potential relationship between working shift work and higher disturbances to the bodies’ natural functioning. The present study has the potential for explaining new ways to decrease the risk factors for those working shift work by contributing to the overall understanding of this multifaceted relationship. This study has many important findings and implications. This study has implications for explaining that the effects of disturbances to the circadian rhythm as a result of certain shift work schedules can result in ill-related health effects. Additionally, this study sought to challenge limitations to current research that has been conducted on the topic as the majority of studies have been performed on men. The overall purpose of the study was to gain a better understanding of the negative effects of shift work on females working within the transportation industry. This study sought to explain the health implications specifically for female workers as fewer studies have been conducted with gender as a main effect in the analysis. The present study suggests that due to the circadian rhythm controlling hormone secretion within the body, disturbances to its natural rhythm can have additional effects on female cycles such as menstruation. Overall, this study offers implications for further research on females working shift work and highlights the continued importance for further exploration into recent developments. These implications have the potential to further our current understanding of the relationship between shift work and ill-health effects, particularly the factors that women face.