943 resultados para single operation cycle
Resumo:
The ability to accurately observe the Earth's carbon cycles from space gives scientists an important tool to analyze climate change. Current space-borne Integrated-Path Differential Absorption (IPDA) Iidar concepts have the potential to meet this need. They are mainly based on the pulsed time-offlight principle, in which two high energy pulses of different wavelengths interrogate the atmosphere for its transmission properties and are backscattered by the ground. In this paper, feasibility study results of a Pseudo-Random Single Photon Counting (PRSPC) IPDA lidar are reported. The proposed approach replaces the high energy pulsed source (e.g. a solidstate laser), with a semiconductor laser in CW operation with a similar average power of a few Watts, benefiting from better efficiency and reliability. The auto-correlation property of Pseudo-Random Binary Sequence (PRBS) and temporal shifting of the codes can be utilized to transmit both wavelengths simultaneously, avoiding the beam misalignment problem experienced by pulsed techniques. The envelope signal to noise ratio has been analyzed, and various system parameters have been selected. By restricting the telescopes field-of-view, the dominant noise source of ambient light can be suppressed, and in addition with a low noise single photon counting detector, a retrieval precision of 1.5 ppm over 50 km along-track averaging could be attained. We also describe preliminary experimental results involving a negative feedback Indium Gallium Arsenide (InGaAs) single photon avalanche photodiode and a low power Distributed Feedback laser diode modulated with PRBS driven acoustic optical modulator. The results demonstrate that higher detector saturation count rates will be needed for use in future spacebourne missions but measurement linearity and precision should meet the stringent requirements set out by future Earthobserving missions.
Resumo:
The environmental performance of a 50 MW parabolic trough Concentrated Solar Power (CSP) plant hybridised with different fuels was determined using a Life Cycle Assessment methodology. Six different scenarios were investigated, half of which involved hybridisation with fossil fuels (natural gas, coal and fuel oil), and the other three involved hybridisation with renewable fuels (wheat straw, wood pellets and biogas). Each scenario was compared to a solar-only operation. Nine different environmental categories as well as the Cumulative Energy Demand and the Energy Payback Time (EPT) were evaluated using Simapro software for 1 MWh of electricity produced. The results indicate a worse environmental performance for a CSP plant producing 12% of the electricity from fuel than in a solar-only operation for every indicator, except for the eutrophication and toxicity categories, whose results for the natural gas scenario are slightly better. In the climate change category, the results ranged between 26.9 and 187 kg CO2 eq/MWh, where a solar-only operation had the best results and coal hybridisation had the worst. Considering a weighted single score indicator, the environmental impact of the renewable fuels scenarios is approximately half of those considered in fossil fuels, with the straw scenario showing the best results, and the coal scenario the worstones. EPT for solar-only mode is 1.44 years, while hybridisation scenarios EPT vary in a range of 1.72 -1.83 years for straw and pellets respectively. The fuels with more embodied energy are biomethane and wood pellets.
Resumo:
Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es decir, el crimen perpetrado a través de la red para ganar dinero). Estos dos aspectos son las máquinas infectadas utilizadas para obtener beneficios económicos de la delincuencia a través de diferentes acciones (como por ejemplo, clickfraud, DDoS, correo no deseado) y la infraestructura de servidores utilizados para gestionar estas máquinas (por ejemplo, C & C, servidores explotadores, servidores de monetización, redirectores). En la primera parte se investiga la exposición a las amenazas de los ordenadores victimas. Para realizar este análisis hemos utilizado los metadatos contenidos en WINE-BR conjunto de datos de Symantec. Este conjunto de datos contiene metadatos de instalación de ficheros ejecutables (por ejemplo, hash del fichero, su editor, fecha de instalación, nombre del fichero, la versión del fichero) proveniente de 8,4 millones de usuarios de Windows. Hemos asociado estos metadatos con las vulnerabilidades en el National Vulnerability Database (NVD) y en el Opens Sourced Vulnerability Database (OSVDB) con el fin de realizar un seguimiento de la decadencia de la vulnerabilidad en el tiempo y observar la rapidez de los usuarios a remiendar sus sistemas y, por tanto, su exposición a posibles ataques. Hemos identificado 3 factores que pueden influir en la actividad de parches de ordenadores victimas: código compartido, el tipo de usuario, exploits. Presentamos 2 nuevos ataques contra el código compartido y un análisis de cómo el conocimiento usuarios y la disponibilidad de exploit influyen en la actividad de aplicación de parches. Para las 80 vulnerabilidades en nuestra base de datos que afectan código compartido entre dos aplicaciones, el tiempo entre el parche libera en las diferentes aplicaciones es hasta 118 das (con una mediana de 11 das) En la segunda parte se proponen nuevas técnicas de sondeo activos para detectar y analizar las infraestructuras de servidores maliciosos. Aprovechamos técnicas de sondaje activo, para detectar servidores maliciosos en el internet. Empezamos con el análisis y la detección de operaciones de servidores explotadores. Como una operación identificamos los servidores que son controlados por las mismas personas y, posiblemente, participan en la misma campaña de infección. Hemos analizado un total de 500 servidores explotadores durante un período de 1 año, donde 2/3 de las operaciones tenían un único servidor y 1/2 por varios servidores. Hemos desarrollado la técnica para detectar servidores explotadores a diferentes tipologías de servidores, (por ejemplo, C & C, servidores de monetización, redirectores) y hemos logrado escala de Internet de sondeo para las distintas categorías de servidores maliciosos. Estas nuevas técnicas se han incorporado en una nueva herramienta llamada CyberProbe. Para detectar estos servidores hemos desarrollado una novedosa técnica llamada Adversarial Fingerprint Generation, que es una metodología para generar un modelo único de solicitud-respuesta para identificar la familia de servidores (es decir, el tipo y la operación que el servidor apartenece). A partir de una fichero de malware y un servidor activo de una determinada familia, CyberProbe puede generar un fingerprint válido para detectar todos los servidores vivos de esa familia. Hemos realizado 11 exploraciones en todo el Internet detectando 151 servidores maliciosos, de estos 151 servidores 75% son desconocidos a bases de datos publicas de servidores maliciosos. Otra cuestión que se plantea mientras se hace la detección de servidores maliciosos es que algunos de estos servidores podrán estar ocultos detrás de un proxy inverso silente. Para identificar la prevalencia de esta configuración de red y mejorar el capacidades de CyberProbe hemos desarrollado RevProbe una nueva herramienta a través del aprovechamiento de leakages en la configuración de la Web proxies inversa puede detectar proxies inversos. RevProbe identifica que el 16% de direcciones IP maliciosas activas analizadas corresponden a proxies inversos, que el 92% de ellos son silenciosos en comparación con 55% para los proxies inversos benignos, y que son utilizado principalmente para equilibrio de carga a través de múltiples servidores. ABSTRACT In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize the crime and the malicious server infrastructures that are used to manage the infected machines. In the first part of this dissertation, we analyze how fast software vendors apply patches to secure client applications, identifying shared code as an important factor in patch deployment. Shared code is code present in multiple programs. When a vulnerability affects shared code the usual linear vulnerability life cycle is not anymore effective to describe how the patch deployment takes place. In this work we show which are the consequences of shared code vulnerabilities and we demonstrate two novel attacks that can be used to exploit this condition. In the second part of this dissertation we analyze malicious server infrastructures, our contributions are: a technique to cluster exploit server operations, a tool named CyberProbe to perform large scale detection of different malicious servers categories, and RevProbe a tool that detects silent reverse proxies. We start by identifying exploit server operations, that are, exploit servers managed by the same people. We investigate a total of 500 exploit servers over a period of more 13 months. We have collected malware from these servers and all the metadata related to the communication with the servers. Thanks to this metadata we have extracted different features to group together servers managed by the same entity (i.e., exploit server operation), we have discovered that 2/3 of the operations have a single server while 1/3 have multiple servers. Next, we present CyberProbe a tool that detects different malicious server types through a novel technique called adversarial fingerprint generation (AFG). The idea behind CyberProbe’s AFG is to run some piece of malware and observe its network communication towards malicious servers. Then it replays this communication to the malicious server and outputs a fingerprint (i.e. a port selection function, a probe generation function and a signature generation function). Once the fingerprint is generated CyberProbe scans the Internet with the fingerprint and finds all the servers of a given family. We have performed a total of 11 Internet wide scans finding 151 new servers starting with 15 seed servers. This gives to CyberProbe a 10 times amplification factor. Moreover we have compared CyberProbe with existing blacklists on the internet finding that only 40% of the server detected by CyberProbe were listed. To enhance the capabilities of CyberProbe we have developed RevProbe, a reverse proxy detection tool that can be integrated with CyberProbe to allow precise detection of silent reverse proxies used to hide malicious servers. RevProbe leverages leakage based detection techniques to detect if a malicious server is hidden behind a silent reverse proxy and the infrastructure of servers behind it. At the core of RevProbe is the analysis of differences in the traffic by interacting with a remote server.
Resumo:
A procedure for measuring the overheating temperature (ΔT ) of a p-n junction area in the structure of photovoltaic (PV) cells converting laser or solar radiations relative to the ambient temperature has been proposed for the conditions of connecting to an electric load. The basis of the procedure is the measurement of the open-circuit voltage (VO C ) during the initial time period after the fast disconnection of the external resistive load. The simultaneous temperature control on an external heated part of a PV module gives the means for determining the value of VO C at ambient temperature. Comparing it with that measured after switching OFF the load makes the calculation of ΔT possible. Calibration data on the VO C = f(T ) dependences for single-junction AlGaAs/GaAs and triple-junction InGaP/GaAs/Ge PV cells are presented. The temperature dynamics in the PV cells has been determined under flash illumination and during fast commutation of the load. Temperature measurements were taken in two cases: converting continuous laser power by single-junction cells and converting solar power by triple-junction cells operating in the concentrator modules.
Induction of ARF tumor suppressor gene expression and cell cycle arrest by transcription factor DMP1
Resumo:
Expression of the DMP1 transcription factor, a cyclin D-binding Myb-like protein, induces growth arrest in mouse embryo fibroblast strains but is devoid of antiproliferative activity in primary diploid fibroblasts that lack the ARF tumor suppressor gene. DMP1 binds to a single canonical recognition site in the ARF promoter to activate gene expression, and in turn, p19ARF synthesis causes p53-dependent cell cycle arrest. Unlike genes such as Myc, adenovirus E1A, and E2F-1, which, when overexpressed, activate the ARF-p53 pathway and trigger apoptosis, DMP1, like ARF itself, does not induce programmed cell death. Therefore, apart from its recently recognized role in protecting cells from potentially oncogenic signals, ARF can be induced in response to antiproliferative stimuli that do not obligatorily lead to apoptosis.
Resumo:
We demonstrate, by using mathematical modeling of cell division cycle (CDC) dynamics, a potential mechanism for precisely controlling the frequency of cell division and regulating the size of a dividing cell. Control of the cell cycle is achieved by artificially expressing a protein that reversibly binds and inactivates any one of the CDC proteins. In the simplest case, such as the checkpoint-free situation encountered in early amphibian embryos, the frequency of CDC oscillations can be increased or decreased by regulating the rate of synthesis, the binding rate, or the equilibrium constant of the binding protein. In a more complex model of cell division, where size-control checkpoints are included, we show that the same reversible binding reaction can alter the mean cell mass in a continuously dividing cell. Because this control scheme is general and requires only the expression of a single protein, it provides a practical means for tuning the characteristics of the cell cycle in vivo.
Resumo:
We examined the MLL genomic translocation breakpoint in acute myeloid leukemia of infant twins. Southern blot analysis in both cases showed two identical MLL gene rearrangements indicating chromosomal translocation. The rearrangements were detectable in the second twin before signs of clinical disease and the intensity relative to the normal fragment indicated that the translocation was not constitutional. Fluorescence in situ hybridization with an MLL-specific probe and karyotype analyses suggested t(11;22)(q23;q11.2) disrupting MLL. Known 5′ sequence from MLL but unknown 3′ sequence from chromosome band 22q11.2 formed the breakpoint junction on the der(11) chromosome. We used panhandle variant PCR to clone the translocation breakpoint. By ligating a single-stranded oligonucleotide that was homologous to known 5′ MLL genomic sequence to the 5′ ends of BamHI-digested DNA through a bridging oligonucleotide, we formed the stem–loop template for panhandle variant PCR which yielded products of 3.9 kb. The MLL genomic breakpoint was in intron 7. The sequence of the partner DNA from band 22q11.2 was identical to the hCDCrel (human cell division cycle related) gene that maps to the region commonly deleted in DiGeorge and velocardiofacial syndromes. Both MLL and hCDCrel contained homologous CT, TTTGTG, and GAA sequences within a few base pairs of their respective breakpoints, which may have been important in uniting these two genes by translocation. Reverse transcriptase-PCR amplified an in-frame fusion of MLL exon 7 to hCDCrel exon 3, indicating that an MLL-hCDCrel chimeric mRNA had been transcribed. Panhandle variant PCR is a powerful strategy for cloning translocation breakpoints where the partner gene is undetermined. This application of the method identified a region of chromosome band 22q11.2 involved in both leukemia and a constitutional disorder.
Resumo:
Isotretinoin (13-cis retinoic acid) is frequently prescribed for severe acne [Peck, G. L., Olsen, T. G., Yoder, F. W., Strauss, J. S., Downing, D. T., Pandya, M., Butkus, D. & Arnaud-Battandier, J. (1979) N. Engl. J. Med. 300, 329–333] but can impair night vision [Fraunfelder, F. T., LaBraico, J. M. & Meyer, S. M. (1985) Am. J. Ophthalmol. 100, 534–537] shortly after the beginning of therapy [Shulman, S. R. (1989) Am. J. Public Health 79, 1565–1568]. As rod photoreceptors are responsible for night vision, we administered isotretinoin to rats to learn whether night blindness resulted from rod cell death or from rod functional impairment. High-dose isotretinoin was given daily for 2 months and produced systemic toxicity, but this caused no histological loss of rod photoreceptors, and rod-driven electroretinogram amplitudes were normal after prolonged dark adaptation. Additional studies showed, however, that even a single dose of isotretinoin slowed the recovery of rod signaling after exposure to an intense bleaching light, and that rhodopsin regeneration was markedly slowed. When only a single dose was given, rod function recovered to normal within several days. Rods and cones both showed slow recovery from bleach after isotretinoin in rats and in mice. HPLC analysis of ocular retinoids after isotretinoin and an intense bleach showed decreased levels of rhodopsin chromophore, 11-cis retinal, and the accumulation of the biosynthetic intermediates, 11-cis and all-trans retinyl esters. Isotretinoin was also found to protect rat photoreceptors from light-induced damage, suggesting that strategies of altering retinoid cycling may have therapeutic implications for some forms of retinal and macular degeneration.
Resumo:
We analyzed the kinetics of nonphotochemical quenching of chlorophyll fluorescence (qN) in spinach (Spinacia oleracea) leaves, chloroplasts, and purified light-harvesting complexes. The characteristic biphasic pattern of fluorescence quenching in dark-adapted leaves, which was removed by preillumination, was evidence of light activation of qN, a process correlated with the de-epoxidation state of the xanthophyll cycle carotenoids. Chloroplasts isolated from dark-adapted and light-activated leaves confirmed the nature of light activation: faster and greater quenching at a subsaturating transthylakoid pH gradient. The light-harvesting chlorophyll a/b-binding complexes of photosystem II were isolated from dark-adapted and light-activated leaves. When isolated from light-activated leaves, these complexes showed an increase in the rate of quenching in vitro compared with samples prepared from dark-adapted leaves. In all cases, the quenching kinetics were fitted to a single component hyperbolic function. For leaves, chloroplasts, and light-harvesting complexes, the presence of zeaxanthin was associated with an increased rate constant for the induction of quenching. We discuss the significance of these observations in terms of the mechanism and control of qN.
Resumo:
In wheat (Triticum aestivum) seedlings subjected to a mild water stress (water potential of −0.3 MPa), the leaf-elongation rate was reduced by one-half and the mitotic activity of mesophyll cells was reduced to 42% of well-watered controls within 1 d. There was also a reduction in the length of the zone of mesophyll cell division to within 4 mm from the base compared with 8 mm in control leaves. However, the period of division continued longer in the stressed than in the control leaves, and the final cell number in the stressed leaves reached 85% of controls. Cyclin-dependent protein kinase enzymes that are required in vivo for DNA replication and mitosis were recovered from the meristematic zone of leaves by affinity for p13suc1. Water stress caused a reduction in H1 histone kinase activity to one-half of the control level, although amounts of the enzyme were unaffected. Reduced activity was correlated with an increased proportion of the 34-kD Cdc2-like kinase (an enzyme sharing with the Cdc2 protein of other eukaryotes the same size, antigenic sites, affinity for p13suc1, and H1 histone kinase catalytic activity) deactivated by tyrosine phosphorylation. Deactivation to 50% occurred within 3 h of stress imposition in cells at the base of the meristematic zone and was therefore too fast to be explained by a reduction in the rate at which cells reached mitosis because of slowing of growth; rather, stress must have acted more immediately on the enzyme. The operation of controls slowing the exit from the G1 and G2 phases is discussed. We suggest that a water-stress signal acts on Cdc2 kinase by increasing phosphorylation of tyrosine, causing a shift to the inhibited form and slowing cell production.
Resumo:
In Saccharomyces cerevisiae, entry into mitosis requires activation of the cyclin-dependent kinase Cdc28 in its cyclin B (Clb)-associated form. Clb-bound Cdc28 is susceptible to inhibitory tyrosine phosphorylation by Swe1 protein kinase. Swe1 is itself negatively regulated by Hsl1, a Nim1-related protein kinase, and by Hsl7, a presumptive protein-arginine methyltransferase. In vivo all three proteins localize to the bud neck in a septin-dependent manner, consistent with our previous proposal that formation of Hsl1-Hsl7-Swe1 complexes constitutes a checkpoint that monitors septin assembly. We show here that Hsl7 is phosphorylated by Hsl1 in immune-complex kinase assays and can physically associate in vitro with either Hsl1 or Swe1 in the absence of any other yeast proteins. With the use of both the two-hybrid method and in vitro binding assays, we found that Hsl7 contains distinct binding sites for Hsl1 and Swe1. A differential interaction trap approach was used to isolate four single-site substitution mutations in Hsl7, which cluster within a discrete region of its N-terminal domain, that are specifically defective in binding Hsl1. When expressed in hsl7Δ cells, each of these Hsl7 point mutants is unable to localize at the bud neck and cannot mediate down-regulation of Swe1, but retains other functions of Hsl7, including oligomerization and association with Swe1. GFP-fusions of these Hsl1-binding defective Hsl7 proteins localize as a bright perinuclear dot, but never localize to the bud neck; likewise, in hsl1Δ cells, a GFP-fusion to wild-type Hsl7 or native Hsl7 localizes to this dot. Cell synchronization studies showed that, normally, Hsl7 localizes to the dot, but only in cells in the G1 phase of the cell cycle. Immunofluorescence analysis and immunoelectron microscopy established that the dot corresponds to the outer plaque of the spindle pole body (SPB). These data demonstrate that association between Hsl1 and Hsl7 at the bud neck is required to alleviate Swe1-imposed G2-M delay. Hsl7 localization at the SPB during G1 may play some additional role in fine-tuning the coordination between nuclear and cortical events before mitosis.
Resumo:
Proliferation, migration-associated differentiation, and cell death occur continuously and in a spatially well-organized fashion along the crypt-villus axis of the mouse small intestine, making it an attractive system for studying how these processes are regulated and interrelated. A pathway for producing glycoconjugates was engineered in adult FVB/N transgenic mice by expressing a human alpha 1,3/4-fucosyltransferase (alpha 1,3/4-FT; EC 2.4.1.65) along the length of this crypt-villus axis. The alpha 1,3/4-FT can use lacto-N-tetraose or lacto-neo-N-tetraose core chains to generate Lewis (Le) blood group antigens Le(a) or Le(x), respectively, and H type 1 or H type 2 core chains to produce Leb and Le(y). Single- and multilabel immunohistochemical studies revealed that expression of the alpha 1,3/4-FT results in production of Le(a) and Leb antigens in both undifferentiated proliferated crypt cells and in differentiated postmitotic villus-associated epithelial cells. In contrast, Le(x) antigens were restricted to crypt cells. Villus enterocytes can be induced to reenter the cell cycle by expression of simian virus 40 tumor antigen under the control of a promoter that only functions in differentiated members of this lineage. Bitransgenic animals, generated from a cross of FVB/N alpha 1,3/4-FT with FVB/N simian virus 40 tumor antigen mice, expand the range of Le(x) expression to include villus-associated enterocytes that have reentered the cell cycle. Thus, the fucosylations unveil a proliferation-dependent switch in oligosaccharide production, as defined by a monoclonal antibody specific for the Le(x) epitope. These findings show that genetic engineering of oligosaccharide biosynthetic pathways can be used to define markers for entry into, or progression through, the cell cycle and to identify changes in endogenous carbohydrate metabolism that occur when proliferative status is altered in a manner that is not deleterious to the system under study.
Resumo:
The retinoblastoma protein (RB) has been proposed to function as a negative regulator of cell proliferation by complexing with cellular proteins such as the transcription factor E2F. To study the biological consequences of the RB/E2F-1 interaction, point mutants of E2F-1 which fail to bind to RB were isolated by using the yeast two-hybrid system. Sequence analysis revealed that within the minimal 18-amino acid peptide of E2F-1 required for RB binding, five residues, Tyr (position 411), Glu (419), and Asp-Leu-Phe (423-425), are critical. These amino acids are conserved among the known E2F family members. While mutation of any of these five amino acids abolished binding to RB, all mutants retained their full transactivation potential. Expression of mutated E2F-1, when compared with that of wild-type, significantly accelerated entry into S phase and subsequent apoptosis. These results provide direct genetic evidence for the biological significance of the RB/E2F interaction and strongly suggest that the interplay between RB and E2F is critical for proper cell cycle progression.
Resumo:
The majority of translocations involving BCL2 are very narrowly targeted to three breakpoint clusters evenly spaced over a 100-bp region of the gene's terminal exon. We have recently shown that the immediate upstream boundary of this major breakpoint region (mbr) is a specific recognition site for single-strand DNA (ssDNA) binding proteins on the sense and antisense strands. The downstream flank of the mbr is a helicase binding site. In this report we demonstrate that the helicase and ssDNA binding proteins show reciprocal changes in binding activity over the cell cycle. The helicase is maximally active in G1 and early S phases; the ssDNA binding proteins are maximally active in late S and G2/M phases. An inhibitor of helicase binding appears in late S and G2/M. Finally, at least one component of the helicase binding complex is the Ku antigen. Thus, a protein with helicase activity implicated in repair of double-strand breaks, variable (diversity) joining recombination, and, potentially, cell-cycle regulation is targeted to the BCL2 mbr.
Resumo:
The Schizosaccharomyces pombe cell cycle-regulatory protein suc1, named as the suppressor of cdc2 temperature-sensitive mutations, is essential for cell cycle progression. To understand suc1 structure-function relationships and to help resolve conflicting interpretations of suc1 function based on genetic studies of suc1 and its functional homologs in both lower and higher eukaryotes, we have determined the crystal structure of the beta-interchanged suc1 dimer. Each domain consists of three alpha-helices and a four-stranded beta-sheet, completed by the interchange of terminal beta-strands between the two subunits. This beta-interchanged suc1 dimer, when compared with the beta-hairpin single-domain folds of suc1, reveals a beta-hinge motif formed by the conserved amino acid sequence HVPEPH. This beta-hinge mediates the subunit conformation and assembly of suc1: closing produces the intrasubunit beta-hairpin and single-domain fold, whereas opening leads to the intersubunit beta-strand interchange and interlocked dimer assembly reported here. This conformational switch markedly changes the surface accessibility of sequence-conserved residues available for recognition of cyclin-dependent kinase, suggesting a structural mechanism for beta-hinge-mediated regulation of suc1 biological function. Thus, suc1 belongs to the family of domain-swapping proteins, consisting of intertwined and dimeric protein structures in which the dual assembly modes regulate their function.