912 resultados para HPLC Profiling
Resumo:
High-speed networks, such as ATM networks, are expected to support diverse Quality of Service (QoS) constraints, including real-time QoS guarantees. Real-time QoS is required by many applications such as those that involve voice and video communication. To support such services, routing algorithms that allow applications to reserve the needed bandwidth over a Virtual Circuit (VC) have been proposed. Commonly, these bandwidth-reservation algorithms assign VCs to routes using the least-loaded concept, and thus result in balancing the load over the set of all candidate routes. In this paper, we show that for such reservation-based protocols|which allow for the exclusive use of a preset fraction of a resource's bandwidth for an extended period of time-load balancing is not desirable as it results in resource fragmentation, which adversely affects the likelihood of accepting new reservations. In particular, we show that load-balancing VC routing algorithms are not appropriate when the main objective of the routing protocol is to increase the probability of finding routes that satisfy incoming VC requests, as opposed to equalizing the bandwidth utilization along the various routes. We present an on-line VC routing scheme that is based on the concept of "load profiling", which allows a distribution of "available" bandwidth across a set of candidate routes to match the characteristics of incoming VC QoS requests. We show the effectiveness of our load-profiling approach when compared to traditional load-balancing and load-packing VC routing schemes.
Resumo:
To support the diverse Quality of Service (QoS) requirements of real-time (e.g. audio/video) applications in integrated services networks, several routing algorithms that allow for the reservation of the needed bandwidth over a Virtual Circuit (VC) established on one of several candidate routes have been proposed. Traditionally, such routing is done using the least-loaded concept, and thus results in balancing the load across the set of candidate routes. In a recent study, we have established the inadequacy of this load balancing practice and proposed the use of load profiling as an alternative. Load profiling techniques allow the distribution of "available" bandwidth across a set of candidate routes to match the characteristics of incoming VC QoS requests. In this paper we thoroughly characterize the performance of VC routing using load profiling and contrast it to routing using load balancing and load packing. We do so both analytically and via extensive simulations of multi-class traffic routing in Virtual Path (VP) based networks. Our findings confirm that for routing guaranteed bandwidth flows in VP networks, load balancing is not desirable as it results in VP bandwidth fragmentation, which adversely affects the likelihood of accepting new VC requests. This fragmentation is more pronounced when the granularity of VC requests is large. Typically, this occurs when a common VC is established to carry the aggregate traffic flow of many high-bandwidth real-time sources. For VP-based networks, our simulation results show that our load-profiling VC routing scheme performs better or as well as the traditional load-balancing VC routing in terms of revenue under both skewed and uniform workloads. Furthermore, load-profiling routing improves routing fairness by proactively increasing the chances of admitting high-bandwidth connections.
Resumo:
Ribosome profiling (ribo-seq) is a recently developed technique that provides genomewide information on protein synthesis (GWIPS) in vivo. The high resolution of ribo-seq is one of the exciting properties of this technique. In Chapter 2, I present a computational method that utilises the sub-codon precision and triplet periodicity of ribosome profiling data to detect transitions in the translated reading frame. Application of this method to ribosome profiling data generated for human HeLa cells allowed us to detect several human genes where the same genomic segment is translated in more than one reading frame. Since the initial publication of the ribosome profiling technique in 2009, there has been a proliferation of studies that have used the technique to explore various questions with respect to translation. A review of the many uses and adaptations of the technique is provided in Chapter 1. Indeed, owing to the increasing popularity of the technique and the growing number of published ribosome profiling datasets, we have developed GWIPS-viz (http://gwips.ucc.ie), a ribo-seq dedicated genome browser. Details on the development of the browser and its usage are provided in Chapter 3. One of the surprising findings of ribosome profiling of initiating ribosomes carried out in 3 independent studies, was the widespread use of non-AUG codons as translation initiation start sites in mammals. Although initiation at non-AUG codons in mammals has been documented for some time, the extent of non-AUG initiation reported by these ribo-seq studies was unexpected. In Chapter 4, I present an approach for estimating the strength of initiating codons based on the leaky scanning model of translation initiation. Application of this approach to ribo-seq data illustrates that initiation at non-AUG codons is inefficient compared to initiation at AUG codons. In addition, our approach provides a probability of initiation score for each start site that allows its strength of initiation to be evaluated.
Resumo:
Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underlying structure of a cipher. Side-channel attacks, however, look to extract secret key information based on the leakage from the device on which the cipher is implemented, be it smart-card, microprocessor, dedicated hardware or personal computer. Attacks based on the power consumption, electromagnetic emanations and execution time have all been practically demonstrated on a range of devices to reveal partial secret-key information from which the full key can be reconstructed. The focus of this thesis is power analysis, more specifically a class of attacks known as profiling attacks. These attacks assume a potential attacker has access to, or can control, an identical device to that which is under attack, which allows him to profile the power consumption of operations or data flow during encryption. This assumes a stronger adversary than traditional non-profiling attacks such as differential or correlation power analysis, however the ability to model a device allows templates to be used post-profiling to extract key information from many different target devices using the power consumption of very few encryptions. This allows an adversary to overcome protocols intended to prevent secret key recovery by restricting the number of available traces. In this thesis a detailed investigation of template attacks is conducted, along with how the selection of various attack parameters practically affect the efficiency of the secret key recovery, as well as examining the underlying assumption of profiling attacks in that the power consumption of one device can be used to extract secret keys from another. Trace only attacks, where the corresponding plaintext or ciphertext data is unavailable, are then investigated against both symmetric and asymmetric algorithms with the goal of key recovery from a single trace. This allows an adversary to bypass many of the currently proposed countermeasures, particularly in the asymmetric domain. An investigation into machine-learning methods for side-channel analysis as an alternative to template or stochastic methods is also conducted, with support vector machines, logistic regression and neural networks investigated from a side-channel viewpoint. Both binary and multi-class classification attack scenarios are examined in order to explore the relative strengths of each algorithm. Finally these machine-learning based alternatives are empirically compared with template attacks, with their respective merits examined with regards to attack efficiency.
Resumo:
Potatoes (Solanum Tuberosum L.) contain secondary metabolites that may have an impact on human health. The aim of this study was to assess the levels of some of these compounds in a wide range of varieties, including rare, heritage and commercial cultivars. Vitamin C, total carotenoids, phenolics, flavonoids, antioxidant activity and glycoalkaloids were determined, using spectroscopy and chromatography, in the skin and flesh of tubers grown in field trials. Transcript levels of key synthetic enzymes were assessed by qPCR. Accumulation of selected metabolites was higher in the skin than in the flesh of tubers, except ascorbate, which was undetected in the skin. Differences were on average 2.5 to 3-fold for carotenoids, 6-fold for phenolics, 15 to 16-fold for flavonoids, 21-fold for glycoalkaloids and 9 to 10-fold for antioxidant activity. Higher contents of carotenoids were associated with yellow skin or flesh, and higher values of phenolics, flavonoids and antioxidant activity with blue flesh. Variety ‘Burren’ had maxima values of carotenoids in skin and flesh, variety ‘Nicola’ of ascorbate, variety ‘Congo’ of phenolics, flavonoids and antioxidant activity in both tissues, except antioxidant activity in the skin, which was higher in ‘Edzell Blue’. Varieties ‘May Queen’ and ‘International Kidney’ had highest glycoalkaloid content in skin and flesh respectively. The effect of the environment was diverse: year of cultivation was significant for all metabolites, but site of cultivation was not for carotenoids and glycoalkaloids. Levels of expression of phenylalanine ammonia-lyase and chalcone synthase were higher in varieties accumulating high contents of phenolic compounds. However, levels of expression of phytoene synthase and L-galactono-1,4-lactone dehydrogenase were not different between varieties showing contrasting levels of carotenoids and ascorbate respectively. This work will help identify varieties that could be marketed as healthier and the most suitable varieties for extraction of high-value metabolites such as glycoalkaloids.
Resumo:
Purpose: Nicardipine is a member of a family of calcium channel blockers named dihydropiridines that are known to be photolabile and may cause phototoxicity. It is therefore vital to develop analytical method which can study the photodegradation of nicardipine. Method: Forced acid degradation of nicardipine was conducted by heating 12 ml of 1 mg/ml nicardipine with 3 ml of 2.5 M HCl for two hours. A gradient HPLC medthod was developed using Agilent Technologies 1200 series quaternary system. Separation was achieved with a Hichrome (250 x 4.6 mm) 5 μm C18 reversed phase column and mobile phase composition of 70% A(100%v/v water) and 30% B(99%v/v acetonitrile + 1%v/v formic acid) at time zero, composition of A and B was then charged to 60%v/v A;40%v/v B at 10minutes, 50%v/v A; 50%v/v B at 30minutes and 70%v/v A; 30%v/v B at 35minutes. 20μl of 0.8mg/ml of nicardipine degradation was injected at room temperature (25oC). The gradient method was transferred onto a HPLC-ESI-MS system (HP 1050 series - AQUAMAX mass detector) and analysis conducted with an acid degradation concentration of 0.25mg/ml and 20μl injection volume. ESI spectra were acquired in positive ionisation mode with MRM 0-600 m/z. Results: Eleven nicardipine degradation products were detected in the HPLC analysis and the resolution (RS) between the respective degradants where 1.0, 1.2, 6.0, 0.4, 1.7, 3.7, 1.8, 1.0, and 1.7 respectively. Nine degradation products were identified in the ESI spectra with the respective m/z ratio; 171.0, 166.1, 441.2, 423.2, 455.2, 455.2, 331.1, 273.1, and 290.1. The possible molecular formulae for each degradants were ambiguously determined. Conclusion: A sensitive and specific method was developed for the analysis of nicardipine degradants. Method enables detection and quantification of nicardipine degradation products that can be used for the study of the kinetics of nicardipine degradation processes.