879 resultados para encoding flexibility


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Burkholderia cenocepacia infects patients with cystic fibrosis. We have previously shown that B. cenocepacia can survive in macrophages within membrane vacuoles (BcCVs) that preclude fusion with the lysosome. The bacterial factors involved in B. cenocepacia intracellular survival are not fully elucidated. We report here that deletion of BCAM0628, encoding a predicted low-molecular weight protein tyrosine phosphatase (LMW-PTP) that is restricted to B. cenocepacia strains of the transmissible ET-12 clone, accelerates the maturation of the BcCVs. Compared to parental strain and deletion mutants in other LMW-PTPs that are widely conserved in Burkholderia species, a greater proportion of BcCVs containing the BCAM0628 mutant were targeted to the lysosome. Accelerated BcCV maturation was not due to reduced intracellular viability since BCAM0628 survived and replicated in macrophages similarly to the parental strain. Therefore, BCAM0628 was referred to as dpm (delayed phagosome maturation). We provide evidence that the Dpm protein is secreted during growth in vitro and upon macrophage infection. Dpm secretion requires an N-terminal signal peptide. Heterologous expression of Dpm in B. multivorans confers to this bacterium a similar phagosomal maturation delay as found with B. cenocepacia. We demonstrate that Dpm is an inactive phosphatase, suggesting that its contribution to phagosomal maturation arrest must be unrelated to tyrosine phosphatase activity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The main functions of the abundant polypeptide toxins present in scorpion venoms are the debilitation of arthropod prey or defence against predators. These effects are achieved mainly through the blocking of an array of ion channel types within the membranes of excitable cells. However, while these ion channel-blocking toxins are tightly-folded by multiple disulphide bridges between cysteine residues, there are additional groups of peptides in the venoms that are devoid of cysteine residues. These non-disulphide bridged peptides are the subject of much research interest, and among these are peptides that exhibit antimicrobial activity. Here, we describe two novel non-disulphide-bridged antimicrobial peptides that are present in the venom of the North African scorpion, Androctonus aeneas. The cDNAs encoding the biosynthetic precursors of both peptides were cloned from a venom-derived cDNA library using 3'- and 5'-RACE strategies. Both translated precursors contained open-reading frames of 74 amino acid residues, each encoding one copy of a putative novel nonadecapeptide, whose primary structures were FLFSLIPSVIAGLVSAIRN and FLFSLIPSAIAGLVSAIRN, respectively. Both peptides were C-terminally amidated. Synthetic versions of each natural peptide displayed broad-spectrum antimicrobial activities, but were devoid of antiproliferative activity against human cancer cell lines. However, synthetic analogues of each peptide, engineered for enhanced cationicity and amphipathicity, exhibited increases in antimicrobial potency and acquired antiproliferative activity against a range of human cancer cell lines. These data clearly illustrate the potential that natural peptide templates provide towards the design of synthetic analogues for therapeutic exploitation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a novel analysis of the utilisation of small grid scale energy storage to mitigate negative system operational impacts due to high penetrations of wind power. This was investigated by artificially lowering the minimum stable generation level of a gas thermal generating unit coupled to a storage device over a five hour storage charging window using a unit commitment and economic dispatch model. The key findings of the analysis were a 0.18% reduction in wind curtailment, a 2.35 MW/min reduction in the ramping rate required to be met by all generators in the test system during a representative period and a total generation cost reduction of €6.5 million.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

X-linked lymphoproliferative syndrome (XLP) is an inherited immunodeficiency characterized by increased susceptibility to Epstein-Barr virus (EBV). In affected males, primary EBV infection leads to the uncontrolled proliferation of virus-containing B cells and reactive cytotoxic T cells, often culminating in the development of high-grade lymphoma. The XLP gene has been mapped to chromosome band Xq25 through linkage analysis and the discovery of patients harboring large constitutional genomic deletions. We describe here the presence of small deletions and intragenic mutations that specifically disrupt a gene named DSHP in 6 of 10 unrelated patients with XLP. This gene encodes a predicted protein of 128 amino acids composing a single SH2 domain with extensive homology to the SH2 domain of SHIP, an inositol polyphosphate 5-phosphatase that functions as a negative regulator of lymphocyte activation. DSHP is expressed in transformed T cell lines and is induced following in vitro activation of peripheral blood T lymphocytes. Expression of DSHP is restricted in vivo to lymphoid tissues, and RNA in situ hybridization demonstrates DSHP expression in activated T and B cell regions of reactive lymph nodes and in both T and B cell neoplasms. These observations confirm the identity of DSHP as the gene responsible for XLP, and suggest a role in the regulation of lymphocyte activation and proliferation. Induction of DSHP may sustain the immune response by interfering with SHIP-mediated inhibition of lymphocyte activation, while its inactivation in XLP patients results in a selective immunodeficiency to EBV.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

19.Wang, Y, O’Neill, M, Kurugollu, F, Partial Encryption by Randomized Zig-Zag Scanning for Video Encoding, IEEE International Symposium on Circuits and Systems (ISCAS), Beijing, May 2013

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most cryptographic devices should inevitably have a resistance against the threat of side channel attacks. For this, masking and hiding schemes have been proposed since 1999. The security validation of these countermeasures is an ongoing research topic, as a wider range of new and existing attack techniques are tested against these countermeasures. This paper examines the side channel security of the balanced encoding countermeasure, whose aim is to process the secret key-related data under a constant Hamming weight and/or Hamming distance leakage. Unlike previous works, we assume that the leakage model coefficients conform to a normal distribution, producing a model with closer fidelity to real-world implementations. We perform analysis on the balanced encoded PRINCE block cipher with simulated leakage model and also an implementation on an AVR board. We consider both standard correlation power analysis (CPA) and bit-wise CPA. We confirm the resistance of the countermeasure against standard CPA, however, we find with a bit-wise CPA that we can reveal the key with only a few thousands traces.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Galactokinase catalyses the first committed step of the Leloir pathway, i.e. the ATP-dependent phosphorylation of α-D-galactose at C1-OH. Reduced galactokinase activity results in the inherited metabolic disease type II galactosaemia. However, inhibition of galactokinase is considered a viable approach to treating more severe forms of galactosaemia (types I and III). Considerable progress has been made in the identification of high affinity, selective inhibitors. Although the structure of galactokinase from a variety of species is known, its catalytic mechanism remains uncertain. Although the bulk of evidence suggests that the reaction proceeds via an active site base mechanism, some experimental and theoretical studies contradict this. The enzyme has potential as a biocatalyst in the production of sugar 1-phosphates. This potential is limited by its high specificity. A variety of approaches have been taken to identify galactokinase variants which are more promiscuous. These have broadened galactokinase's specificity to include a wide range of D- and L-sugars. Initial studies suggest that some of these alterations result in increased flexibility at the active site. It is suggested that modulation of protein flexibility is at least as important as structural modifications in determining the success or failure of enzyme engineering.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A means of encoding and decoding data using wireless orbital angular momentum (OAM) modes is proposed and analysed. Source data symbols are used to select an OAM mode, which is generated using an 8-element circular array. A 2-element array is used to detect the mode by estimating the phase gradient of the received signal, and hence identifying the transmitted data symbol. The results are presented in terms of mode estimation error.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The precautionary principle has the potential to act as a valuable tool in food law. It operates in areas of scientific uncertainty, calling for protective measures where there are potential threats to human health (or the environment). However, the manner of the principle’s incorporation and implementation within legislation are key to its effectiveness and general legitimacy. Specific considerations include the role and nature of risk assessments, assessors, sources of evidence, divergent opinions, risk communication, other legitimate factors and the weighting of interests. However, more fundamentally, the crystallisation of approaches and removal of all flexibility would undermine the principle’s central tenets. Firstly, principles crucially play a guiding and interpretative role. Secondly, reflexive modernisation and continuing scientific uncertainty call for the precautionary principle’s continued application – precautionary measures do not end the precautionary principle’s relevance. This can be partially achieved through the legislation so as to facilitate later precautionary measures, e.g. through temporary authorisations, derogations and safeguard clauses. However, crucially, it requires that the legislation also be interpreted in light of the precautionary principle. This paper investigates the logic behind the Court of Justice of the EU’s judgments and the circumstances that enable or deter the Court in taking, or permitting, stronger precautionary approaches. Although apparently inconsistent, a number of contextual factors including the legislative provisions and actors involved influence the judgments substantially. The analysis provides insight into improving the principle’s incorporation to facilitate its continued application and maintenance of flexibility, whilst bearing in mind the general desirability of objectivity and legal certainty.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A presente tese investiga o processo de tomada de decisão na gestão de cadeias de abastecimento, utilizando um quadro de análise de opções reais. Especificamente, estudamos tópicos como o nível de inventário ideal para protecção contra a incerteza da procura, o momento para implementação de capacidade flexível em mercados onde existe complexidade no mix de produtos, o tempo para o reforço do factor trabalho visando requisitos de serviço ao mercado, e as decisões entre integração e outsourcing num ambiente de incerteza. Foram usadas metodologias de tempo discreto e contínuo para identificar o valor ideal e o calendário das opções a adoptar, quando a procura é estocástica. Além disso, foram considerados os efeitos dos requisitos dos mercados, como a complexidade na oferta de produtos e o nível de serviço. A procura é representada recorrendo a diferentes processos estocásticos, o impacto de saltos inesperados também é explorado, reforçando a generalização dos modelos a diferentes condições de negócio. A aplicabilidade dos modelos que apresentamos permite a diversificação e o enriquecimento da literatura sobre a abordagem de opções reais, no âmbito das cadeias de abastecimento. Níveis de inventário flexíveis e capacidades flexíveis são característicos das cadeias de abastecimento e podem ser usados como resposta à incerteza do mercado. Esta tese é constituída por ensaios que suportam a aplicação dos modelos, e consiste num capítulo introdutório (designado por ensaio I) e mais seis ensaios sobre factores que discutem o uso de medidas de flexibilidade nas cadeias de abastecimento, em ambientes de incerteza, e um último ensaio sobre a extensão do conceito de flexibilidade ao tratamento da avaliação de planos de negócio. O segundo ensaio que apresentamos é sobre o valor do inventário num único estádio, enquanto medida de flexibilidade, sujeita ao crescente condicionalismo dos custos com posse de activos. Introduzimos uma nova classificação de artigos para suportar o indicador designado por overstock. No terceiro e quarto ensaio ampliamos a exploração do conceito de overstock, promovendo a interacção e o balanceamento entre vários estádios de uma cadeia de abastecimento, como forma de melhorar o desempenho global. Para sustentar a aplicação prática das abordagens, adaptamos o ensaio número três à gestão do desempenho, para suportar o estabelecimento de metas coordenadas e alinhadas; e adaptamos o quarto ensaio à coordenação das cadeias de abastecimento, como auxiliar ao planeamento integrado e sequencial dos níveis de inventário. No ensaio cinco analisamos o factor de produção “tecnologia”, em relação directa com a oferta de produtos de uma empresa, explorando o conceito de investimento, como medida de flexibilidade nas componentes de volume da procura e gama de produtos. Dedicamos o ensaio número seis à análise do factor de produção “Mão-de-Obra”, explorando as condicionantes para aumento do número de turnos na perspectiva económica e determinando o ponto crítico para a tomada de decisão em ambientes de incerteza. No ensaio número sete exploramos o conceito de internalização de operações, demarcando a nossa análise das demais pela definição do momento crítico que suporta a tomada de decisão em ambientes dinâmicos. Complementamos a análise com a introdução de factores temporais de perturbação, nomeadamente, o estádio de preparação necessário e anterior a uma eventual alteração de estratégia. Finalmente, no último ensaio, estendemos a análise da flexibilidade em ambientes de incerteza ao conceito de planos de negócio. Em concreto, exploramos a influência do número de pontos de decisão na flexibilidade de um plano, como resposta à crescente incerteza dos mercados. A título de exemplo, usamos o mecanismo de gestão sequencial do orçamento para suportar o nosso modelo. A crescente incerteza da procura obrigou a um aumento da agilidade e da flexibilidade das cadeias de abastecimento, limitando o uso de muitas das técnicas tradicionais de suporte à gestão, pela incapacidade de incorporarem os efeitos da incerteza. A flexibilidade é claramente uma vantagem competitiva das empresas que deve, por isso, ser quantificada. Com os modelos apresentados e com base nos resultados analisados, pretendemos demonstrar a utilidade da consideração da incerteza nos instrumentos de gestão, usando exemplos numéricos para suportar a aplicação dos modelos, o que claramente promove a aproximação dos desenvolvimentos aqui apresentados às práticas de negócio.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

La compression des données est la technique informatique qui vise à réduire la taille de l’information pour minimiser l’espace de stockage nécessaire et accélérer la transmission des données dans les réseaux à bande passante limitée. Plusieurs techniques de compression telles que LZ77 et ses variantes souffrent d’un problème que nous appelons la redondance causée par la multiplicité d’encodages. La multiplicité d’encodages (ME) signifie que les données sources peuvent être encodées de différentes manières. Dans son cas le plus simple, ME se produit lorsqu’une technique de compression a la possibilité, au cours du processus d’encodage, de coder un symbole de différentes manières. La technique de compression par recyclage de bits a été introduite par D. Dubé et V. Beaudoin pour minimiser la redondance causée par ME. Des variantes de recyclage de bits ont été appliquées à LZ77 et les résultats expérimentaux obtenus conduisent à une meilleure compression (une réduction d’environ 9% de la taille des fichiers qui ont été compressés par Gzip en exploitant ME). Dubé et Beaudoin ont souligné que leur technique pourrait ne pas minimiser parfaitement la redondance causée par ME, car elle est construite sur la base du codage de Huffman qui n’a pas la capacité de traiter des mots de code (codewords) de longueurs fractionnaires, c’est-à-dire qu’elle permet de générer des mots de code de longueurs intégrales. En outre, le recyclage de bits s’appuie sur le codage de Huffman (HuBR) qui impose des contraintes supplémentaires pour éviter certaines situations qui diminuent sa performance. Contrairement aux codes de Huffman, le codage arithmétique (AC) peut manipuler des mots de code de longueurs fractionnaires. De plus, durant ces dernières décennies, les codes arithmétiques ont attiré plusieurs chercheurs vu qu’ils sont plus puissants et plus souples que les codes de Huffman. Par conséquent, ce travail vise à adapter le recyclage des bits pour les codes arithmétiques afin d’améliorer l’efficacité du codage et sa flexibilité. Nous avons abordé ce problème à travers nos quatre contributions (publiées). Ces contributions sont présentées dans cette thèse et peuvent être résumées comme suit. Premièrement, nous proposons une nouvelle technique utilisée pour adapter le recyclage de bits qui s’appuie sur les codes de Huffman (HuBR) au codage arithmétique. Cette technique est nommée recyclage de bits basé sur les codes arithmétiques (ACBR). Elle décrit le cadriciel et les principes de l’adaptation du HuBR à l’ACBR. Nous présentons aussi l’analyse théorique nécessaire pour estimer la redondance qui peut être réduite à l’aide de HuBR et ACBR pour les applications qui souffrent de ME. Cette analyse démontre que ACBR réalise un recyclage parfait dans tous les cas, tandis que HuBR ne réalise de telles performances que dans des cas très spécifiques. Deuxièmement, le problème de la technique ACBR précitée, c’est qu’elle requiert des calculs à précision arbitraire. Cela nécessite des ressources illimitées (ou infinies). Afin de bénéficier de cette dernière, nous proposons une nouvelle version à précision finie. Ladite technique devienne ainsi efficace et applicable sur les ordinateurs avec les registres classiques de taille fixe et peut être facilement interfacée avec les applications qui souffrent de ME. Troisièmement, nous proposons l’utilisation de HuBR et ACBR comme un moyen pour réduire la redondance afin d’obtenir un code binaire variable à fixe. Nous avons prouvé théoriquement et expérimentalement que les deux techniques permettent d’obtenir une amélioration significative (moins de redondance). À cet égard, ACBR surpasse HuBR et fournit une classe plus étendue des sources binaires qui pouvant bénéficier d’un dictionnaire pluriellement analysable. En outre, nous montrons qu’ACBR est plus souple que HuBR dans la pratique. Quatrièmement, nous utilisons HuBR pour réduire la redondance des codes équilibrés générés par l’algorithme de Knuth. Afin de comparer les performances de HuBR et ACBR, les résultats théoriques correspondants de HuBR et d’ACBR sont présentés. Les résultats montrent que les deux techniques réalisent presque la même réduction de redondance sur les codes équilibrés générés par l’algorithme de Knuth.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Investigations into the evolutionary origins of human cognition has shown that individuals’ memory for others is influenced by the latter’s behaviour in social contracts. Such research is primarily based on hypothetical or more abstract forms of social contracts, whereas an application of this knowledge to everyday health behaviours can be of great value. To address this, the current study investigated whether participants who were asked to imagine themselves in a hypothetical hazardous health scenario showed differential response sensitivity (d’) and latency (RT) to faces of hospital staff tagged with contrasting hand hygiene before touching patients: clean hands, dirty hands, or unknown hand-washing behaviour (control). The test used a two alternative forced-choice (2AFC: “old/new”) face recognition paradigm. The findings showed that d’ to dirty and clean hands was similar, but higher than for controls. Moreover, d’ was not affected by the occupation of hospital staff (nurses vs porters). The absence of memory gains towards clean or dirty hands points to the need for new strategies to remind patients to observe (and remember) the hand hygiene of others when exposed to hazardous health environments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We study the effects of product differentiation in a Stackelberg model with demand uncertainty for the first mover. We do an ex-ante and ex-post analysis of the profits of the leader and of the follower firms in terms of product differentiation and of the demand uncertainty. We show that even with small uncertainty about the demand, the follower firm can achieve greater profits than the leader, if their products are sufficiently differentiated. We also compute the probability of the second firm having higher profit than the leading firm, subsequently showing the advantages and disadvantages of being either the leader or the follower firm.