880 resultados para Network security constraints


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article presents Monte Carlo techniques for estimating network reliability. For highly reliable networks, techniques based on graph evolution models provide very good performance. However, they are known to have significant simulation cost. An existing hybrid scheme (based on partitioning the time space) is available to speed up the simulations; however, there are difficulties with optimizing the important parameter associated with this scheme. To overcome these difficulties, a new hybrid scheme (based on partitioning the edge set) is proposed in this article. The proposed scheme shows orders of magnitude improvement of performance over the existing techniques in certain classes of network. It also provides reliability bounds with little overhead.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Insulin stimulates glucose transport in fat and muscle cells by triggering exocytosis of the glucose transporter GLUT4. To define the intracellular trafficking of GLUT4, we have studied the internalization of an epitope-tagged version of GLUT4 from the cell surface. GLUT4 rapidly traversed the endosomal system en route to a perinuclear location. This perinuclear GLUT4 compartment did not colocalize with endosomal markers (endosomal antigen I protein, transferrin) or TGN38, but showed significant overlap with the TGN target (t)-soluble N-ethylmaleimide-sensitive factor attachment protein receptors (SNAREs) Syntaxins 6 and 16. These results were confirmed by vesicle immunoisolation. Consistent with a role for Syntaxins 6 and 16 in GLUT4 trafficking we found that their expression was up-regulated significantly during adipocyte differentiation and insulin stimulated their movement to the cell surface. GLUT4 trafficking between endosomes and trans-Golgi network was regulated via an acidic targeting motif in the carboxy terminus of GLUT4, because a mutant lacking this motif was retained in endosomes. We conclude that GLUT4 is rapidly transported from the cell surface to a subdomain of the trans-Golgi network that is enriched in the t-SNAREs Syntaxins 6 and 16 and that an acidic targeting motif in the C-terminal tail of GLUT4 plays an important role in this process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We investigated how the relative direction of limb movements in external space (iso- and non-isodirectionality), muscular constraints (the relative timing of homologous muscle activation) and the egocentric frame of reference (moving simultaneously toward/away the longitudinal axis of the body) contribute to the stability of coordinated movements. In the first experiment, we attempted to determine the respective stability of isodirectional and non-isodirectional movements in between-persons coordination. In a second experiment, we determined the effect of the relative direction in external space, and of muscular constraints, on pattern stability during a within-person bimanual coordination task. In the third experiment we dissociated the effects on pattern stability of the muscular constraints, relative direction and egocentric frame of reference. The results showed that (1) simultaneous activation of homologous muscles resulted in more stable performance than simultaneous activation of non-homologous muscles during within-subject coordination, and that (2) isodirectional movements were more stable than non-isodirectional movements during between-persons coordination, confirming the role of the relative direction of the moving limbs in the stability of bimanual coordination. Moreover, the egocentric constraint was to some extent found distinguishable from the effect of the relative direction of the moving limbs in external space, and from the effect of the relative timing of muscle activation. In summary, the present study showed that relative direction of the moving limbs in external space and muscular constraints may interact either to stabilize or destabilize coordination patterns. (C) 2003 Published by Elsevier B.V.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The GRIP domain is a targeting sequence found in a family of coiled-coil peripheral Golgi proteins. Previously we demonstrated that the GRIP domain of p230/golgin245 is specifically recruited to tubulovesicular structures of the traps-Golgi network (TGN). Here we have characterized two novel Golgi proteins with functional GRIP domains, designated GCC88 and GCC185. GCC88 cDNA encodes a protein of 88 kDa, and GCC185 cDNA encodes a protein of 185 kDa. Both molecules are brefeldin A-sensitive peripheral membrane proteins and are predicted to have extensive coiled-coil regions with the GRIP domain at the C terminus. By immunofluorescence and immunoelectron microscopy GCC88 and GCC185, and the GRIP protein golgin97, are all localized to the TGN of Hela cells. Overexpression of full-length GCC88 leads to the formation of large electron dense structures that extend from the traps-Golgi. These de novo structures contain GCC88 and co-stain for the TGN markers syntaxin 6 and TGN38 but not for alpha2,6-sialyltransferase, beta-COP, or cis-Golgi GM130. The formation of these abnormal structures requires the N-terminal domain of GCC88. TGN38, which recycles between the TGN and plasma membrane, was transported into and out of the GCC88 decorated structures. These data introduce two new GRIP domain proteins and implicate a role for GCC88 in the organization of a specific TGN subcompartment involved with membrane transport.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Galpha interacting protein (GAIP) is a regulator of G protein signaling protein that associates dynamically with vesicles and has been implicated in membrane trafficking, although its specific role is not yet known. Using an in vitro budding assay, we show that GAIP is recruited to a specific population of trans-Golgi network-derived vesicles and that these are distinct from coatomer or clathrin-coated vesicles. A truncation mutant (NT-GAIP) encoding only the N-terminal half of GAIP is recruited to trans -Golgi network membranes during the formation of vesicle carriers. Overexpression of NT-GAIP induces the formation of long, coated tubules, which are stabilized by microtubules. Results from the budding assay and from imaging in live cells show that these tubules remain attached to the Golgi stack rather than being released as carrier vesicles. NT-GAIP expression blocks membrane budding and results in the accumulation of tubular carrier intermediates. NT-GAIP-decorated tubules are competent to load vesicular stomatitis virus protein G-green fluorescent protein as post-Golgi, exocytic cargo and in cells expressing NT-GAIP there is reduced surface delivery of vesicular stomatitis virus protein G-green fluorescent protein. We conclude that GAIP functions as an essential part of the membrane budding machinery for a subset of post-Golgi exocytic carriers derived from the trans-Golgi network.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper is concerned with evaluating the performance of loss networks. Accurate determination of loss network performance can assist in the design and dimen- sioning of telecommunications networks. However, exact determination can be difficult and generally cannot be done in reasonable time. For these reasons there is much interest in developing fast and accurate approximations. We develop a reduced load approximation that improves on the famous Erlang fixed point approximation (EFPA) in a variety of circumstances. We illustrate our results with reference to a range of networks for which the EFPA may be expected to perform badly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The idea of “human security” is gaining attention among policy-makers and security analysts. Little scholarly attention has been given to the questions of why states accept (or reject) a human security agenda or how such an agenda is incorporated into policy practices. The article suggests that a human security approach is most likely to be applied when both humanitarian and national interests combine. Yet when states or organisations adopt a human security approach, they often misjudge the complex and long-term commitment required of such an approach. There is also the potential for such an agenda to be manipulated to justify questionable courses of action. These issues frame an analysis of six recent case studies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The effect of pore-network connectivity on binary liquid-phase adsorption equilibria using the ideal adsorbed solution theory (LAST) was studied. The liquid-phase binary adsorption experiments used ethyl propionate, ethyl butyrate, and ethyl isovalerate as the adsorbates and commercial activated carbons Filtrasorb-400 and Norit ROW 0.8 as adsorbents. As the single-component isotherm, a modified Dubinin-Radushkevich equation was used. A comparison with experimental data shows that incorporating the connectivity of the pore network and considering percolation processes associated with different molecular sizes of the adsorptives in the mixture, as well as their different corresponding accessibility, can improve the prediction of binary adsorption equilibria using the LAST Selectivity of adsorption for the larger molecule in binary systems increases with an increase in the pore-network coordination number, as well with an increase in the mean pore width and in the spread of the pore-size distribution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As sociedades estatais s??o importantes organiza????es societ??rias, que podem servir ao administrador p??blico para a realiza????o de atividades econ??micas que configurem relevante interesse coletivo ou motivo de seguran??a nacional. Com a finalidade de adequarem-se aos limites de investimento p??blico e com vistas ao cumprimento do princ??pio da efici??ncia, elas podem utilizar-se de mecanismos societ??rios e contratuais de gest??o disponibilizados a empresas, sejam elas estatais ou privadas. Os movimentos societ??rios, os mecanismos de controle e partilha de controle e a ado????o das pr??ticas de governan??a corporativa s??o alternativas jur??dicas disponibilizadas aos administradores das empresas estatais. A an??lise do caso da Companhia Paranaense de Energia El??trica (Copel) ?? realizada no artigo com o prop??sito de auxiliar na visualiza????o da aplica????o de tais institutos.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study explores the impact of Turkey's likely entry in the European Union (EU) in terms of the EU's foreign, security and defense policies. It reviews Turkish capabilities, namely its military capabilities, which could provide the EU with valuable defense assets. There are differences related to Turkey's relations with the EU, which have increasingly spilled over into the NATO, hindering the development of cooperation over crisis management operations. The article then delves in the implications of Turkey's strategic geographical location to EU policies. It reviews how far the EU and Turkey may have convergent interests in some of the neighboring regions, especially in the Middle East.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Brazil's security agenda during Lula's administration was not homogeneous through the two mandates: the first tenure (2002-2006) revealed a reactive approach towards security topics, while the second one (2006-2010) was more assertive. More specifically, the shift occurred in terms of both its geographical scope - once it incorporated global issues in a more systematic way -, and instruments through which the security agenda was exercised, given the multilateral initiative of Unasur's CDS

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The conventional approach in the discipline of International Relations is to treat terrorist organizations as "non-state" actors of international relations. However, this approach is problematic due to the fact that most terrorist organizations are backed or exploited by some states. In this article, I take issue with the non-stateness of terrorist organizations and seek to answer the question of why so many states, at times, support terrorist organizations. I argue that in the face of rising threats to national security in an age of devastating wars, modern nation states tend to provide support to foreign terrorist organizations that work against their present and imminent enemies. I elaborate on my argument studying three cases of state support for terrorism: Iranian support for Hamas, Syrian support for the PKK, and American support for the MEK. The analyses suggest that, for many states, terror is nothing but war by other means.