951 resultados para BRANCH-POINTS


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Photogrammetric reanalysis of 1985 aerial photos has revealed substantial submarine melting of the floating ice tongue of Jakobshavn Isbrae, west Greenland. The thickness of the floating tongue determined from hydrostatic equilibrium tapers from ~940 m near the grounding zone to ~600 m near the terminus. Feature tracking on orthophotos shows speeds on the July 1985 ice tongue to be nearly constant (~18.5 m/d), indicating negligible dynamic thinning. The thinning of the ice tongue is mostly due to submarine melting with average rates of 228 ± 49 m/yr (0.62 ± 0.13 m/d) between the summers of 1984 and 1985. The cause of the high melt rate is the circulation of warm seawater (thermal forcing of up to 4.2°C) beneath the tongue with convection driven by the substantial discharge of subglacial freshwater from the grounding zone. We believe that this buoyancy-driven convection is responsible for a deep channel incised into the sole of the floating tongue. A dramatic thinning, retreat, and speedup began in 1998 and continues today. The timing of the change is coincident with a 1.1°C warming of deep ocean waters entering the fjord after 1997. Assuming a linear relationship between thermal forcing and submarine melt rate, average melt rates should have increased by ~25% (~57 m/yr), sufficient to destabilize the ice tongue and initiate the ice thinning and the retreat that followed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sequences of two chloroplast photosystem genes, psaA and psbB, together comprising about 3,500 bp, were obtained for all five major groups of extant seed plants and several outgroups among other vascular plants. Strongly supported, but significantly conflicting, phylogenetic signals were obtained in parsimony analyses from partitions of the data into first and second codon positions versus third positions. In the former, both genes agreed on a monophyletic gymnosperms, with Gnetales closely related to certain conifers. In the latter, Gnetales are inferred to be the sister group of all other seed plants, with gymnosperms paraphyletic. None of the data supported the modern ‘‘anthophyte hypothesis,’’ which places Gnetales as the sister group of flowering plants. A series of simulation studies were undertaken to examine the error rate for parsimony inference. Three kinds of errors were examined: random error, systematic bias (both properties of finite data sets), and statistical inconsistency owing to long-branch attraction (an asymptotic property). Parsimony reconstructions were extremely biased for third-position data for psbB. Regardless of the true underlying tree, a tree in which Gnetales are sister to all other seed plants was likely to be reconstructed for these data. None of the combinations of genes or partitions permits the anthophyte tree to be reconstructed with high probability. Simulations of progressively larger data sets indicate the existence of long-branch attraction (statistical inconsistency) for third-position psbB data if either the anthophyte tree or the gymnosperm tree is correct. This is also true for the anthophyte tree using either psaA third positions or psbB first and second positions. A factor contributing to bias and inconsistency is extremely short branches at the base of the seed plant radiation, coupled with extremely high rates in Gnetales and nonseed plant outgroups. M. J. Sanderson,* M. F. Wojciechowski,*† J.-M. Hu,* T. Sher Khan,* and S. G. Brady

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis is devoted to the study of linear relationships in symmetric block ciphers. A block cipher is designed so that the ciphertext is produced as a nonlinear function of the plaintext and secret master key. However, linear relationships within the cipher can still exist if the texts and components of the cipher are manipulated in a number of ways, as shown in this thesis. There are four main contributions of this thesis. The first contribution is the extension of the applicability of integral attacks from word-based to bitbased block ciphers. Integral attacks exploit the linear relationship between texts at intermediate stages of encryption. This relationship can be used to recover subkey bits in a key recovery attack. In principle, integral attacks can be applied to bit-based block ciphers. However, specific tools to define the attack on these ciphers are not available. This problem is addressed in this thesis by introducing a refined set of notations to describe the attack. The bit patternbased integral attack is successfully demonstrated on reduced-round variants of the block ciphers Noekeon, Present and Serpent. The second contribution is the discovery of a very small system of equations that describe the LEX-AES stream cipher. LEX-AES is based heavily on the 128-bit-key (16-byte) Advanced Encryption Standard (AES) block cipher. In one instance, the system contains 21 equations and 17 unknown bytes. This is very close to the upper limit for an exhaustive key search, which is 16 bytes. One only needs to acquire 36 bytes of keystream to generate the equations. Therefore, the security of this cipher depends on the difficulty of solving this small system of equations. The third contribution is the proposal of an alternative method to measure diffusion in the linear transformation of Substitution-Permutation-Network (SPN) block ciphers. Currently, the branch number is widely used for this purpose. It is useful for estimating the possible success of differential and linear attacks on a particular SPN cipher. However, the measure does not give information on the number of input bits that are left unchanged by the transformation when producing the output bits. The new measure introduced in this thesis is intended to complement the current branch number technique. The measure is based on fixed points and simple linear relationships between the input and output words of the linear transformation. The measure represents the average fraction of input words to a linear diffusion transformation that are not effectively changed by the transformation. This measure is applied to the block ciphers AES, ARIA, Serpent and Present. It is shown that except for Serpent, the linear transformations used in the block ciphers examined do not behave as expected for a random linear transformation. The fourth contribution is the identification of linear paths in the nonlinear round function of the SMS4 block cipher. The SMS4 block cipher is used as a standard in the Chinese Wireless LAN Wired Authentication and Privacy Infrastructure (WAPI) and hence, the round function should exhibit a high level of nonlinearity. However, the findings in this thesis on the existence of linear relationships show that this is not the case. It is shown that in some exceptional cases, the first four rounds of SMS4 are effectively linear. In these cases, the effective number of rounds for SMS4 is reduced by four, from 32 to 28. The findings raise questions about the security provided by SMS4, and might provide clues on the existence of a flaw in the design of the cipher.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present several new observations on the SMS4 block cipher, and discuss their cryptographic significance. The crucial observation is the existence of fixed points and also of simple linear relationships between the bits of the input and output words for each component of the round functions for some input words. This implies that the non-linear function T of SMS4 does not appear random and that the linear transformation provides poor diffusion. Furthermore, the branch number of the linear transformation in the key scheduling algorithm is shown to be less than optimal. The main security implication of these observations is that the round function is not always non-linear. Due to this linearity, it is possible to reduce the number of effective rounds of SMS4 by four. We also investigate the susceptibility of SMS4 to further cryptanalysis. Finally, we demonstrate a successful differential attack on a slightly modified variant of SMS4. These findings raise serious questions on the security provided by SMS4.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Innovation processes are rarely smooth and disruptions often occur at transition points were one knowledge domain passes the technology on to another domain. At these transition points communication is a key component in assisting the smooth hand over of technologies. However for smooth transitions to occur we argue that appropriate structures have to be in place and boundary spanning activities need to be facilitated. This paper presents three case studies of innovation processes and the findings support the view that structures and boundary spanning are essential for smooth transitions. We have explained the need to pass primary responsibility between agents to successfully bring an innovation to market. We have also shown the need to combine knowledge through effective communication so that absorptive capacity is built in process throughout the organisation rather than in one or two key individuals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As an international norm, the Responsibility to Protect (R2P) has gained substantial influence and institutional presence—and created no small controversy—in the ten years since its first conceptualisation. Conversely, the Protection of Civilians in Armed Conflict (PoC) has a longer pedigree and enjoys a less contested reputation. Yet UN Security Council action in Libya in 2011 has thrown into sharp relief the relationship between the two. UN Security Council Resolutions 1970 and 1973 follow exactly the process envisaged by R2P in response to imminent atrocity crimes, yet the operative paragraphs of the resolutions themselves invoke only PoC. This article argues that, while the agendas of PoC and R2P converge with respect to Security Council action in cases like Libya, outside this narrow context it is important to keep the two norms distinct. Peacekeepers, humanitarian actors, international lawyers, individual states and regional organisations are required to act differently with respect to the separate agendas and contexts covered by R2P and PoC. While overlap between the two does occur in highly visible cases like Libya, neither R2P nor PoC collapses normatively, institutionally or operationally into the other.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ubiquitylation is a necessary step in the endocytosis and lysosomal trafficking of many plasma membrane proteins and can also influence protein trafficking in the biosynthetic pathway. Although a molecular understanding of ubiquitylation in these processes is beginning to emerge, very little is known about the role deubiquitylation may play. Fat Facets in mouse (FAM) is substrate-specific deubiquitylating enzyme highly expressed in epithelia where it interacts with its substrate, β-catenin. Here we show, in the polarized intestinal epithelial cell line T84, FAM localized to multiple points of protein trafficking. FAM interacted with β-catenin and E-cadherin in T84 cells but only in subconfluent cultures. FAM extensively colocalized with β-catenin in cytoplasmic puncta but not at sites of cell-cell contact as well as immunoprecipitating with β-catenin and E-cadherin from a higher molecular weight complex (~500 kDa). At confluence FAM neither colocalized with, nor immunoprecipitated, β-catenin or E-cadherin, which were predominantly in a larger molecular weight complex (~2 MDa) at the cell surface. Overexpression of FAM in MCF-7 epithelial cells resulted in increased β-catenin levels, which localized to the plasma membrane. Expression of E-cadherin in L-cell fibroblasts resulted in the relocalization of FAM from the Golgi to cytoplasmic puncta. These data strongly suggest that FAM associates with E-cadherin and β-catenin during trafficking to the plasma membrane.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sequence data often have competing signals that are detected by network programs or Lento plots. Such data can be formed by generating sequences on more than one tree, and combining the results, a mixture model. We report that with such mixture models, the estimates of edge (branch) lengths from maximum likelihood (ML) methods that assume a single tree are biased. Based on the observed number of competing signals in real data, such a bias of ML is expected to occur frequently. Because network methods can recover competing signals more accurately, there is a need for ML methods allowing a network. A fundamental problem is that mixture models can have more parameters than can be recovered from the data, so that some mixtures are not, in principle, identifiable. We recommend that network programs be incorporated into best practice analysis, along with ML and Bayesian trees.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite recent methodological advances in inferring the time-scale of biological evolution from molecular data, the fundamental question of whether our substitution models are sufficiently well specified to accurately estimate branch-lengths has received little attention. I examine this implicit assumption of all molecular dating methods, on a vertebrate mitochondrial protein-coding dataset. Comparison with analyses in which the data are RY-coded (AG → R; CT → Y) suggests that even rates-across-sites maximum likelihood greatly under-compensates for multiple substitutions among the standard (ACGT) NT-coded data, which has been subject to greater phylogenetic signal erosion. Accordingly, the fossil record indicates that branch-lengths inferred from the NT-coded data translate into divergence time overestimates when calibrated from deeper in the tree. Intriguingly, RY-coding led to the opposite result. The underlying NT and RY substitution model misspecifications likely relate respectively to “hidden” rate heterogeneity and changes in substitution processes across the tree, for which I provide simulated examples. Given the magnitude of the inferred molecular dating errors, branch-length estimation biases may partly explain current conflicts with some palaeontological dating estimates.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Compass Points: The Locations, Landscapes and Coordinates of Identities' the Australasian Association for Theatre, Drama and Performance Studies (ADSA) Conference 2012 was held at Queensland University of Technology, July 3-6 2012. The Conference was sponsored by the Australasian Association for Theatre, Drama and Performance Studies (ADSA), Queensland University of Technology (QUT), Ian Potter Foundation, Arts Queensland, La Boite Theatre Company and Queensland Theatre Company. The papers selected for this collection represent a small sample of the scope, depth and diversity of scholarship presented at the conference - they cover a range of genres, cultures and contexts in contemporary performance making from autobiography, to playwrighting, to public space performance and beyond. The papers collected have been peer-reviewed to Australia’s Department of Education, Science and Training (DEST) standards - each has been subject to two blind reviews, followed by acceptance, rejection or revision, and editing of accepted papers - by colleagues from Australasia and overseas. The review process for the conference publication was separate from the review process for acceptance of abstracts for the actual conference presentations. The conference convenors, Bree Hadley and Caroline Heim, edited the collection, and would like to thank all those who gave their time to advise on the peer review process and act as reviewers - Tom Burvill, Christine Comans, Sean Edgecomb, Angela Campbell, Natalie Lazaroo, Jo Loth, Meg Mumford, Ulrike Garde, Laura Ginters, Andre Bastian, Sam Trubridge, Delyse Ryan, Georgia Seffrin, Gillian Arrighi, Rand Hazou, Rob Pensalfini, Sue Fenty-Studham, Mark Radvan, Rob Conkie, Kris Plummer, Lisa Warrington, Kate Flaherty, Bryoni Tresize, Janys Hayes, Lisa Warrington, Teresa Izzard, Kim Durban, Veronica Kelly, Adrian Keirnander, James Davenport, Julie Robson and others. We, and the authors, appreciate the rigour and care with which peers have approached the scholarship presented here. This collection was published in final form on July 3rd 2012, the first day of the ADSA Conference 2012.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The green building trend has increased rapidly worldwide in recent decades as a means of addressing growing concerns over climate change and global warming and to reduce the impact of the building industry on the environment. A significant contribution in Australia is the use of a series of rating tools by the Green Building Council Australia (GBCA) for the certification of various types of buildings. This paper reviews the use of the Green Star system in Australian building construction, and investigates the potential challenges involved in acquiring the certification of Australian buildings by critically analysing a database of most recently certified GBCA projects. The results show that management-related credits and innovation-related credits are the easiest and most difficult respectively to obtain. Additionally, 6-Star green buildings achieve significantly higher points than other certified buildings in the Energy category. In contrast, 4 Star green buildings achieve more points in the Material category than 5 and 6 Star buildings. The study offers a useful reference for both property developers and project teams to obtain a better understanding of the rating scheme and consequently the effective preparation of certification documentation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents an analytical method to analyze the effect of X to R ratio as well as impedance value of branches on observability of a network based on un-decoupled formulation of state estimation (SE) and null space of matrices. The results showed that the X to R ratio of branches had no effect on the observability of networks. In addition, it was shown that observability of some networks was affected by impedance values while some others were not affected. In addition, for branch observability analysis of radial network, a simple and quick method is developed. Illustrative examples of the network under transmission and distribution voltages demonstrate the effectiveness of the proposed methods.