949 resultados para Proof.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a sound and complete decision procedure for the bounded process cryptographic protocol insecurity problem, based on the notion of normal proofs [2] and classical unification. We also show a result about the existence of attacks with “high” normal cuts. Our proof of correctness provides an alternate proof and new insights into the fundamental result of Rusinowitch and Turuani [9] for the same setting.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We derive and study a C(0) interior penalty method for a sixth-order elliptic equation on polygonal domains. The method uses the cubic Lagrange finite-element space, which is simple to implement and is readily available in commercial software. After introducing some notation and preliminary results, we provide a detailed derivation of the method. We then prove the well-posedness of the method as well as derive quasi-optimal error estimates in the energy norm. The proof is based on replacing Galerkin orthogonality with a posteriori analysis techniques. Using this approach, we are able to obtain a Cea-like lemma with minimal regularity assumptions on the solution. Numerical experiments are presented that support the theoretical findings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Multi-domain proteins have many advantages with respect to stability and folding inside cells. Here we attempt to understand the intricate relationship between the domain-domain interactions and the stability of domains in isolation. We provide quantitative treatment and proof for prevailing intuitive ideas on the strategies employed by nature to stabilize otherwise unstable domains. We find that domains incapable of independent stability are stabilized by favourable interactions with tethered domains in the multi-domain context. Stability of such folds to exist independently is optimized by evolution. Specific residue mutations in the sites equivalent to inter-domain interface enhance the overall solvation, thereby stabilizing these domain folds independently. A few naturally occurring variants at these sites alter communication between domains and affect stability leading to disease manifestation. Our analysis provides safe guidelines for mutagenesis which have attractive applications in obtaining stable fragments and domain constructs essential for structural studies by crystallography and NMR.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the present investigation, a strongly bonded strip of an aluminium-magnesium based alloy AA5086 is successfully produced through accumulative roll bonding (ARB). A maximum of up to eight passes has been used for the purpose. Microstructural characterization using electron backscatter diffraction (EBSD) technique indicates the formation of submicron sized (similar to 200-300 nm) subgrains inside the layered microstructure. The material is strongly textured where individual layers possess typical FCC rolling texture components. More than three times enhancement in 0.2% proof stress (PS) has been obtained after 8 passes due to grain refinement and strain hardening. (C) 2011 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Swarm intelligence algorithms are applied for optimal control of flexible smart structures bonded with piezoelectric actuators and sensors. The optimal locations of actuators/sensors and feedback gain are obtained by maximizing the energy dissipated by the feedback control system. We provide a mathematical proof that this system is uncontrollable if the actuators and sensors are placed at the nodal points of the mode shapes. The optimal locations of actuators/sensors and feedback gain represent a constrained non-linear optimization problem. This problem is converted to an unconstrained optimization problem by using penalty functions. Two swarm intelligence algorithms, namely, Artificial bee colony (ABC) and glowworm swarm optimization (GSO) algorithms, are considered to obtain the optimal solution. In earlier published research, a cantilever beam with one and two collocated actuator(s)/sensor(s) was considered and the numerical results were obtained by using genetic algorithm and gradient based optimization methods. We consider the same problem and present the results obtained by using the swarm intelligence algorithms ABC and GSO. An extension of this cantilever beam problem with five collocated actuators/sensors is considered and the numerical results obtained by using the ABC and GSO algorithms are presented. The effect of increasing the number of design variables (locations of actuators and sensors and gain) on the optimization process is investigated. It is shown that the ABC and GSO algorithms are robust and are good choices for the optimization of smart structures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We show that the Wiener Tauberian property holds for the Heisenberg Motion group TnBproof are relatively simple.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Type IA DNA topoisomerases, typically found in bacteria, are essential enzymes that catalyse the DNA relaxation of negative supercoils. DNA gyrase is the only type II topoisomerase that can carry out the opposite reaction (i.e. the introduction of the DNA supercoils). A number of diverse molecules target DNA gyrase. However, inhibitors that arrest the activity of bacterial topoisomerase I at low concentrations remain to be identified. Towards this end, as a proof of principle, monoclonal antibodies that inhibit Mycobacterium smegmatis topoisomerase I have been characterized and the specific inhibition of Mycobacterium smegmatis topoisomerase I by a monoclonal antibody, 2F3G4, at a nanomolar concentration is described. The enzyme-bound monoclonal antibody stimulated the first transesterification reaction leading to enhanced DNA cleavage, without significantly altering the religation activity of the enzyme. The stimulated DNA cleavage resulted in perturbation of the cleavagereligation equilibrium, increasing single-strand nicks and proteinDNA covalent adducts. Monoclonal antibodies with such a mechanism of inhibition can serve as invaluable tools for probing the structure and mechanism of the enzyme, as well as in the design of novel inhibitors that arrest enzyme activity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Water brings its remarkable thermodynamic and dynamic anomalies in the pure liquid state to biological world where water molecules face a multitude of additional interactions that frustrate its hydrogen bond network. Yet the water molecules participate and control enormous number of biological processes in manners which are yet to be understood at a molecular level. We discuss thermodynamics, structure, dynamics and properties of water around proteins and DNA, along with those in reverse micelles. We discuss the roles of water in enzyme kinetics, in drug-DNA intercalation and in kinetic-proof reading ( the theory of lack of errors in biosynthesis). We also discuss how water may play an important role in the natural selection of biomolecules. (C) 2011 Elsevier B. V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this article is to consider two themes, both of which emanate from and involve the Kobayashi and the Carath,odory metric. First, we study the biholomorphic invariant introduced by B. Fridman on strongly pseudoconvex domains, on weakly pseudoconvex domains of finite type in C (2), and on convex finite type domains in C (n) using the scaling method. Applications include an alternate proof of the Wong-Rosay theorem, a characterization of analytic polyhedra with noncompact automorphism group when the orbit accumulates at a singular boundary point, and a description of the Kobayashi balls on weakly pseudoconvex domains of finite type in C (2) and convex finite type domains in C (n) in terms of Euclidean parameters. Second, a version of Vitushkin's theorem about the uniform extendability of a compact subgroup of automorphisms of a real analytic strongly pseudoconvex domain is proved for C (1)-isometries of the Kobayashi and Carath,odory metrics on a smoothly bounded strongly pseudoconvex domain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this note, we show that a quasi-free Hilbert module R defined over the polydisk algebra with kernel function k(z,w) admits a unique minimal dilation (actually an isometric co-extension) to the Hardy module over the polydisk if and only if S (-1)(z, w)k(z, w) is a positive kernel function, where S(z,w) is the Szego kernel for the polydisk. Moreover, we establish the equivalence of such a factorization of the kernel function and a positivity condition, defined using the hereditary functional calculus, which was introduced earlier by Athavale [8] and Ambrozie, Englis and Muller [2]. An explicit realization of the dilation space is given along with the isometric embedding of the module R in it. The proof works for a wider class of Hilbert modules in which the Hardy module is replaced by more general quasi-free Hilbert modules such as the classical spaces on the polydisk or the unit ball in a'', (m) . Some consequences of this more general result are then explored in the case of several natural function algebras.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Regenerating codes are a class of recently developed codes for distributed storage that, like Reed-Solomon codes, permit data recovery from any arbitrary of nodes. However regenerating codes possess in addition, the ability to repair a failed node by connecting to any arbitrary nodes and downloading an amount of data that is typically far less than the size of the data file. This amount of download is termed the repair bandwidth. Minimum storage regenerating (MSR) codes are a subclass of regenerating codes that require the least amount of network storage; every such code is a maximum distance separable (MDS) code. Further, when a replacement node stores data identical to that in the failed node, the repair is termed as exact. The four principal results of the paper are (a) the explicit construction of a class of MDS codes for d = n - 1 >= 2k - 1 termed the MISER code, that achieves the cut-set bound on the repair bandwidth for the exact repair of systematic nodes, (b) proof of the necessity of interference alignment in exact-repair MSR codes, (c) a proof showing the impossibility of constructing linear, exact-repair MSR codes for d < 2k - 3 in the absence of symbol extension, and (d) the construction, also explicit, of high-rate MSR codes for d = k+1. Interference alignment (IA) is a theme that runs throughout the paper: the MISER code is built on the principles of IA and IA is also a crucial component to the nonexistence proof for d < 2k - 3. To the best of our knowledge, the constructions presented in this paper are the first explicit constructions of regenerating codes that achieve the cut-set bound.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A scheme for stabilizing stochastic approximation iterates by adaptively scaling the step sizes is proposed and analyzed. This scheme leads to the same limiting differential equation as the original scheme and therefore has the same limiting behavior, while avoiding the difficulties associated with projection schemes. The proof technique requires only that the limiting o.d.e. descend a certain Lyapunov function outside an arbitrarily large bounded set. (C) 2012 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The metal organic frameworks (MOFs) have evolved to be an important family and a corner stone for research in the area of inorganic chemistry. The progress made since 2000 has attracted researchers from other disciplines to actively engage themselves in this area. This cooperative synergy of different scientific believes have provided important edge and spread to the chemistry of metal-organic frameworks. The ease of synthesis coupled with the observation of properties in the areas of catalysis, sorption, separation, luminescence, bioactivity, magnetism, etc., are a proof of this synergism. In this article, we present the recent developments in this area.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper deals with the influence of crystallographic texture on room temperature mechanical behavior of the sheets of the aluminum alloy AA7020 processed to different thicknesses. Three different thicknesses of the alloy sheet, namely 1, 1.85, and 3.6 mm, corresponding to different textures were investigated. Tensile tests were carried out at 0°, 45° and 90° with respect to sheet rolling direction and the resulting in-plane anisotropy in 0.2 proof stress, work hardening and plastic strain ratio (r-value) were determined. Texture derived r-values are also calculated and discussed vis-à -vis the experimentally obtained r-values. Finally the formability of the optimal alloy was studied using forming limit diagrams. Effect of natural aging, with a simulated heat treatment of 70 °C for 2 h on FLD was studied and compared with the as solutionized samples. It was observed that, the strain levels in the bi-axial region of the FLD were not much affected by the heat treatment. © 2012 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Berge's elegant dipath partition conjecture from 1982 states that in a dipath partition P of the vertex set of a digraph minimizing , there exists a collection Ck of k disjoint independent sets, where each dipath P?P meets exactly min{|P|, k} of the independent sets in C. This conjecture extends Linial's conjecture, the GreeneKleitman Theorem and Dilworth's Theorem for all digraphs. The conjecture is known to be true for acyclic digraphs. For general digraphs, it is known for k=1 by the GallaiMilgram Theorem, for k?? (where ?is the number of vertices in the longest dipath in the graph), by the GallaiRoy Theorem, and when the optimal path partition P contains only dipaths P with |P|?k. Recently, it was proved (Eur J Combin (2007)) for k=2. There was no proof that covers all the known cases of Berge's conjecture. In this article, we give an algorithmic proof of a stronger version of the conjecture for acyclic digraphs, using network flows, which covers all the known cases, except the case k=2, and the new, unknown case, of k=?-1 for all digraphs. So far, there has been no proof that unified all these cases. This proof gives hope for finding a proof for all k.