999 resultados para activation schemes
Resumo:
Voltage imbalance in capacitors is a well-known problem in compensator topologies which use two or more capacitors. This imbalance may exist even if the load does not contain any DC component, due to practical factors. However, when the load contains a DC part, the voltage imbalance problem becomes critical. In this paper, a two-quadrant chopper has been used to regulate the capacitor voltages in a two-capacitor compensator structure. Two different control strategies for the two-quadrant chopper to equalize the voltage of the capacitors have been proposed. The strategies are validated through detailed simulation studies. Experiments have also been carried out to validate the hysteresis control of chopper.
Resumo:
Robustness of the track allocation problem is rarely addressed in literatures and the obtained track allocation schemes (TAS) embody some bottlenecks. Therefore, an approach to detect bottlenecks is needed to support local optimization. First a TAS is transformed to an executable model by Petri nets. Then disturbances analysis is performed using the model and the indicators of the total trains' departure delays are collected to detect bottlenecks when each train suffers a disturbance. Finally, the results of the tests based on a rail hub linking six lines and a TAS about thirty minutes show that the minimum buffer time is 21 seconds and there are two bottlenecks where the buffer times are 57 and 44 seconds respectively, and it indicates that the bottlenecks do not certainly locate at the area where there is minimum buffer time. The proposed approach can further support selection of multi schemes and robustness optimization.
Resumo:
This paper describes a number of techniques for GNSS navigation message authentication. A detailed analysis of the security facilitated by navigation message authentication is given. The analysis takes into consideration the risk of critical applications that rely on GPS including transportation, finance and telecommunication networks. We propose a number of cryptographic authentication schemes for navigation data authentication. These authentication schemes provide authenticity and integrity of the navigation data to the receiver. Through software simulation, the performance of the schemes is quantified. The use of software simulation enables the collection of authentication performance data of different data channels, and the impact of various schemes on the infrastructure and receiver. Navigation message authentication schemes have been simulated at the proposed data rates of Galileo and GPS services, for which the resulting performance data is presented. This paper concludes by making recommendations for optimal implementation of navigation message authentication for Galileo and next generation GPS systems.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides being used to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted Networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor such encrypted traffic. We therefore describe how our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment.
Resumo:
Systemic acquired resistance (SAR) is a broad-spectrum resistance in plants that involves the upregulation of a battery of pathogenesis-related (PR) genes. NPR1 is a key regulator in the signal transduction pathway that leads to SAR. Mutations in NPR1 result in a failure to induce PR genes in systemic tissues and a heightened susceptibility to pathogen infection, whereas overexpression of the NPR1 protein leads to increased induction of the PR genes and enhanced disease resistance. We analyzed the subcellular localization of NPR1 to gain insight into the mechanism by which this protein regulates SAR. An NPR1–green fluorescent protein fusion protein, which functions the same as the endogenous NPR1 protein, was shown to accumulate in the nucleus in response to activators of SAR. To control the nuclear transport of NPR1, we made a fusion of NPR1 with the glucocorticoid receptor hormone binding domain. Using this steroid-inducible system, we clearly demonstrate that nuclear localization of NPR1 is essential for its activity in inducing PR genes.
Resumo:
BACKGROUND AND PURPOSE It has been proposed that BRL37344, SR58611 and CGP12177 activate b3-adrenoceptors in human atrium to increase contractility and L-type Ca2+ current (ICa-L). b3-adrenoceptor agonists are potentially beneficial for the treatment of a variety of diseases but concomitant cardiostimulation would be potentially harmful. It has also been proposed that (-)-CGP12177 activates the low affinity binding site of the b1-adrenoceptor in human atrium. We therefore used BRL37344, SR58611 and (-)-CGP12177 with selective b-adrenoceptor subtype antagonists to clarify cardiostimulant b-adrenoceptor subtypes in human atrium. EXPERIMENTAL APPROACH Human right atrium was obtained from patients without heart failure undergoing coronary artery bypass or valve surgery. Cardiomyocytes were prepared to test BRL37344, SR58611 and CGP12177 effects on ICa-L. Contractile effects were determined on right atrial trabeculae. KEY RESULTS BRL37344 increased force which was antagonized by blockade of b1- and b2-adrenoceptors but not by blockade of b3-adrenoceptors with b3-adrenoceptor-selective L-748,337 (1 mM). The b3-adrenoceptor agonist SR58611 (1 nM–10 mM) did not affect atrial force. BRL37344 and SR58611 did not increase ICa-L at 37°C, but did at 24°C which was prevented by L-748,337. (-)-CGP12177 increased force and ICa-L at both 24°C and 37°C which was prevented by (-)-bupranolol (1–10 mM), but not L-748,337. CONCLUSIONS AND IMPLICATIONS We conclude that the inotropic responses to BRL37344 are mediated through b1- and b2-adrenoceptors. The inotropic and ICa-L responses to (-)-CGP12177 are mediated through the low affinity site b1L-adrenoceptor of the b1-adrenoceptor. b3-adrenoceptor-mediated increases in ICa-L are restricted to low temperatures. Human atrial b3-adrenoceptors do not change contractility and ICa-L at physiological temperature.
Resumo:
Problem: Innate immune activation of human cells, for some intracellular pathogens, is advantageous for vacuole morphology and pathogenic viability. It is unknown whether innate immune activation is advantageous to Chlamydia trachomatis viability. ----- ----- Method of study: Innate immune activation of HEp-2 cells during Chlamydia infection was conducted using lipopolysaccharide (LPS), polyI:C, and wedelolactone (innate immune inhibitor) to investigate the impact of these conditions on viability of Chlamydia. ----- ----- Results: The addition of LPS and polyI:C to stimulate activation of the two distinct innate immune pathways (nuclear factor kappa beta and interferon regulatory factor) had no impact on the viability of Chlamydia. However, when compounds targeting either pathway were added in combination with the specific innate immune inhibitor (wedelolactone) a major impact on Chlamydia viability was observed. This impact was found to be due to the induction of apoptosis of the HEp-2 cells under these conditions. ----- ----- Conclusion: This is the first time that induction of apoptosis has been reported in C. trachomatis-infected cells when treated with a combination of innate immune activators and wedelolactone.
Resumo:
The Wilms’ tumor suppressor protein WT1 is a transcriptional regulator involved in differentiation and the regulation of cell growth. WT1 is subject to alternative splicing, one isoform including a 17–amino acid region that is specific to mammals. The function of this 17–amino acid insertion is not clear, however. Here, we describe a transcriptional activation domain in WT1 that is specific to the WT1 splice isoform that contains the 17–amino acid insertion. We show that the function of this domain in transcriptional activation is dependent on a specific interaction with the prostate apoptosis response factor par4. A mutation in WT1 found in Wilms’ tumor disturbs the interaction with par4 and disrupts the function of the activation domain. Analysis of WT1 derivatives in cells treated to induce par4 expression showed a strong correlation between the transcription function of the WT1 17–amino acid insertion and the ability of WT1 to regulate cell survival and proliferation. Our results provide a molecular mechanism by which alternative splicing of WT1 can regulate cell growth in development and disease.
Resumo:
Proposed transmission smart grids will use a digital platform for the automation of substations operating at voltage levels of 110 kV and above. The IEC 61850 series of standards, released in parts over the last ten years, provide a specification for substation communications networks and systems. These standards, along with IEEE Std 1588-2008 Precision Time Protocol version 2 (PTPv2) for precision timing, are recommended by the both IEC Smart Grid Strategy Group and the NIST Framework and Roadmap for Smart Grid Interoperability Standards for substation automation. IEC 61850-8-1 and IEC 61850-9-2 provide an inter-operable solution to support multi-vendor digital process bus solutions, allowing for the removal of potentially lethal voltages and damaging currents from substation control rooms, a reduction in the amount of cabling required in substations, and facilitates the adoption of non-conventional instrument transformers (NCITs). IEC 61850, PTPv2 and Ethernet are three complementary protocol families that together define the future of sampled value digital process connections for smart substation automation. This paper describes a specific test and evaluation system that uses real time simulation, protection relays, PTPv2 time clocks and artificial network impairment that is being used to investigate technical impediments to the adoption of SV process bus systems by transmission utilities. Knowing the limits of a digital process bus, especially when sampled values and NCITs are included, will enable utilities to make informed decisions regarding the adoption of this technology.
Resumo:
The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and show that the existing constructions for chosen ciphertext security from identity-based encryption also hold in the group encryption case. We then consider certificateless encryption as the special case of 2-out-of-2 group encryption and give constructions for highly efficient certificateless schemes in the standard model. Among these is the first construction of a lattice-based certificateless encryption scheme. Our next contribution is a highly efficient certificateless key encapsulation mechanism (KEM), that we prove secure in the standard model. We introduce a new way of proving the security of certificateless schemes based that are based on identity-based schemes. We leave the identity-based part of the proof intact, and just extend it to cover the part that is introduced by the certificateless scheme. We show that our construction is more efficient than any instanciation of generic constructions for certificateless key encapsulation in the standard model. The third area where the thesis contributes to the advancement of certificateless cryptography is key agreement. Swanson showed that many certificateless key agreement schemes are insecure if considered in a reasonable security model. We propose the first provably secure certificateless key agreement schemes in the strongest model for certificateless key agreement. We extend Swanson's definition for certificateless key agreement and give more power to the adversary. Our new schemes are secure as long as each party has at least one uncompromised secret. Our first construction is in the random oracle model and gives the adversary slightly more capabilities than our second construction in the standard model. Interestingly, our standard model construction is as efficient as the random oracle model construction.
Resumo:
In an attempt to curb online copyright infringement, copyright owners are increasingly seeking to enlist the assistance of Internet Service Providers (‘ISPs’) to enforce copyright and impose sanctions on their users.1 Commonly termed ‘graduated response’ schemes, these measures generally require that the ISP take some action against users suspected of infringing copyright, ranging from issuing warnings, to collating allegations made against subscribers and reporting to copyright owners, to suspension and eventual termination of service.