996 resultados para differential fault attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Gastro-Intestinal (GI) tract is a unique region in the body. Our innate immune system retains a fine homeostatic balance between avoiding inappropriate inflammatory responses against the myriad commensal microbes residing in the gut while also remaining active enough to prevent invasive pathogenic attack. The intestinal epithelium represents the frontline of this interface. It has long been known to act as a physical barrier preventing the lumenal bacteria of the gastro-intestinal tract from activating an inflammatory immune response in the immune cells of the underlying mucosa. However, in recent years, an appreciation has grown surrounding the role played by the intestinal epithelium in regulating innate immune responses, both in the prevention of infection and in maintaining a homeostatic environment through modulation of innate immune signalling systems. The aim of this thesis was to identify novel innate immune mechanisms regulating inflammation in the GI tract. To achieve this aim, we chose several aspects of regulatory mechanisms utilised in this region by the innate immune system. We identified several commensal strains of bacteria expressing proteins containing signalling domains used by Pattern Recognition Receptors (PRRs) of the innate immune system. Three such bacterial proteins were studied for their potentially subversive roles in host innate immune signalling as a means of regulating homeostasis in the GI tract. We also examined differential responses to PRR activation depending on their sub-cellular localisation. This was investigated based on reports that apical Toll-Like Receptor (TLR) 9 activation resulted in abrogation of inflammatory responses mediated by other TLRs in Intestinal Epithelial Cells (IECs) such as basolateral TLR4 activation. Using the well-studied invasive intra-cellular pathogen Listeria monocytogenes as a model for infection, we also used a PRR siRNA library screening technique to identify novel PRRs used by IECs in both inhibition and activation of inflammatory responses. Many of the PRRs identified in this screen were previously believed not to be expressed in IECs. Furthermore, the same study has led to the identification of the previously uncharacterised TLR10 as a functional inflammatory receptor of IECs. Further analysis revealed a similar role in macrophages where it was shown to respond to intracellular and motile pathogens such as Gram-positive L.monocytogenes and Gram negative Salmonella typhimurium. TLR10 expression in IECs was predominantly intracellular. This is likely in order to avoid inappropriate inflammatory activation through the recognition of commensal microbial antigens on the apical cell surface of IECs. Moreover, these results have revealed a more complex network of innate immune signalling mechanisms involved in both activating and inhibiting inflammatory responses in IECs than was previously believed. This contribution to our understanding of innate immune regulation in this region has several direct and indirect benefits. The identification of several novel PRRs involved in activating and inhibiting inflammation in the GI tract may be used as novel therapeutic targets in the treatment of disease; both for inducing tolerance and reducing inflammation, or indeed, as targets for adjuvant activation in the development of oral vaccines against pathogenic attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Traditionally, attacks on cryptographic algorithms looked for mathematical weaknesses in the underlying structure of a cipher. Side-channel attacks, however, look to extract secret key information based on the leakage from the device on which the cipher is implemented, be it smart-card, microprocessor, dedicated hardware or personal computer. Attacks based on the power consumption, electromagnetic emanations and execution time have all been practically demonstrated on a range of devices to reveal partial secret-key information from which the full key can be reconstructed. The focus of this thesis is power analysis, more specifically a class of attacks known as profiling attacks. These attacks assume a potential attacker has access to, or can control, an identical device to that which is under attack, which allows him to profile the power consumption of operations or data flow during encryption. This assumes a stronger adversary than traditional non-profiling attacks such as differential or correlation power analysis, however the ability to model a device allows templates to be used post-profiling to extract key information from many different target devices using the power consumption of very few encryptions. This allows an adversary to overcome protocols intended to prevent secret key recovery by restricting the number of available traces. In this thesis a detailed investigation of template attacks is conducted, along with how the selection of various attack parameters practically affect the efficiency of the secret key recovery, as well as examining the underlying assumption of profiling attacks in that the power consumption of one device can be used to extract secret keys from another. Trace only attacks, where the corresponding plaintext or ciphertext data is unavailable, are then investigated against both symmetric and asymmetric algorithms with the goal of key recovery from a single trace. This allows an adversary to bypass many of the currently proposed countermeasures, particularly in the asymmetric domain. An investigation into machine-learning methods for side-channel analysis as an alternative to template or stochastic methods is also conducted, with support vector machines, logistic regression and neural networks investigated from a side-channel viewpoint. Both binary and multi-class classification attack scenarios are examined in order to explore the relative strengths of each algorithm. Finally these machine-learning based alternatives are empirically compared with template attacks, with their respective merits examined with regards to attack efficiency.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The contribution of buildings towards total worldwide energy consumption in developed countries is between 20% and 40%. Heating Ventilation and Air Conditioning (HVAC), and more specifically Air Handling Units (AHUs) energy consumption accounts on average for 40% of a typical medical device manufacturing or pharmaceutical facility’s energy consumption. Studies have indicated that 20 – 30% energy savings are achievable by recommissioning HVAC systems, and more specifically AHU operations, to rectify faulty operation. Automated Fault Detection and Diagnosis (AFDD) is a process concerned with potentially partially or fully automating the commissioning process through the detection of faults. An expert system is a knowledge-based system, which employs Artificial Intelligence (AI) methods to replicate the knowledge of a human subject matter expert, in a particular field, such as engineering, medicine, finance and marketing, to name a few. This thesis details the research and development work undertaken in the development and testing of a new AFDD expert system for AHUs which can be installed in minimal set up time on a large cross section of AHU types in a building management system vendor neutral manner. Both simulated and extensive field testing was undertaken against a widely available and industry known expert set of rules known as the Air Handling Unit Performance Assessment Rules (APAR) (and a later more developed version known as APAR_extended) in order to prove its effectiveness. Specifically, in tests against a dataset of 52 simulated faults, this new AFDD expert system identified all 52 derived issues whereas the APAR ruleset identified just 10. In tests using actual field data from 5 operating AHUs in 4 manufacturing facilities, the newly developed AFDD expert system for AHUs was shown to identify four individual fault case categories that the APAR method did not, as well as showing improvements made in the area of fault diagnosis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this work we introduce a new mathematical tool for optimization of routes, topology design, and energy efficiency in wireless sensor networks. We introduce a vector field formulation that models communication in the network, and routing is performed in the direction of this vector field at every location of the network. The magnitude of the vector field at every location represents the density of amount of data that is being transited through that location. We define the total communication cost in the network as the integral of a quadratic form of the vector field over the network area. With the above formulation, we introduce a mathematical machinery based on partial differential equations very similar to the Maxwell's equations in electrostatic theory. We show that in order to minimize the cost, the routes should be found based on the solution of these partial differential equations. In our formulation, the sensors are sources of information, and they are similar to the positive charges in electrostatics, the destinations are sinks of information and they are similar to negative charges, and the network is similar to a non-homogeneous dielectric media with variable dielectric constant (or permittivity coefficient). In one of the applications of our mathematical model based on the vector fields, we offer a scheme for energy efficient routing. Our routing scheme is based on changing the permittivity coefficient to a higher value in the places of the network where nodes have high residual energy, and setting it to a low value in the places of the network where the nodes do not have much energy left. Our simulations show that our method gives a significant increase in the network life compared to the shortest path and weighted shortest path schemes. Our initial focus is on the case where there is only one destination in the network, and later we extend our approach to the case where there are multiple destinations in the network. In the case of having multiple destinations, we need to partition the network into several areas known as regions of attraction of the destinations. Each destination is responsible for collecting all messages being generated in its region of attraction. The complexity of the optimization problem in this case is how to define regions of attraction for the destinations and how much communication load to assign to each destination to optimize the performance of the network. We use our vector field model to solve the optimization problem for this case. We define a vector field, which is conservative, and hence it can be written as the gradient of a scalar field (also known as a potential field). Then we show that in the optimal assignment of the communication load of the network to the destinations, the value of that potential field should be equal at the locations of all the destinations. Another application of our vector field model is to find the optimal locations of the destinations in the network. We show that the vector field gives the gradient of the cost function with respect to the locations of the destinations. Based on this fact, we suggest an algorithm to be applied during the design phase of a network to relocate the destinations for reducing the communication cost function. The performance of our proposed schemes is confirmed by several examples and simulation experiments. In another part of this work we focus on the notions of responsiveness and conformance of TCP traffic in communication networks. We introduce the notion of responsiveness for TCP aggregates and define it as the degree to which a TCP aggregate reduces its sending rate to the network as a response to packet drops. We define metrics that describe the responsiveness of TCP aggregates, and suggest two methods for determining the values of these quantities. The first method is based on a test in which we drop a few packets from the aggregate intentionally and measure the resulting rate decrease of that aggregate. This kind of test is not robust to multiple simultaneous tests performed at different routers. We make the test robust to multiple simultaneous tests by using ideas from the CDMA approach to multiple access channels in communication theory. Based on this approach, we introduce tests of responsiveness for aggregates, and call it CDMA based Aggregate Perturbation Method (CAPM). We use CAPM to perform congestion control. A distinguishing feature of our congestion control scheme is that it maintains a degree of fairness among different aggregates. In the next step we modify CAPM to offer methods for estimating the proportion of an aggregate of TCP traffic that does not conform to protocol specifications, and hence may belong to a DDoS attack. Our methods work by intentionally perturbing the aggregate by dropping a very small number of packets from it and observing the response of the aggregate. We offer two methods for conformance testing. In the first method, we apply the perturbation tests to SYN packets being sent at the start of the TCP 3-way handshake, and we use the fact that the rate of ACK packets being exchanged in the handshake should follow the rate of perturbations. In the second method, we apply the perturbation tests to the TCP data packets and use the fact that the rate of retransmitted data packets should follow the rate of perturbations. In both methods, we use signature based perturbations, which means packet drops are performed with a rate given by a function of time. We use analogy of our problem with multiple access communication to find signatures. Specifically, we assign orthogonal CDMA based signatures to different routers in a distributed implementation of our methods. As a result of orthogonality, the performance does not degrade because of cross interference made by simultaneously testing routers. We have shown efficacy of our methods through mathematical analysis and extensive simulation experiments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report a measurement of the differential cross section for the gamman-->pi- p process from the CLAS detector at Jefferson Laboratory in Hall B for photon energies between 1.0 and 3.5 GeV and pion center-of-mass (c.m.) angles (thetac.m.) between 50 degrees and 115 degrees. We confirm a previous indication of a broad enhancement around a c.m. energy ([sqrt]s) of 2.1 GeV at thetac.m.=90 degrees in the scaled differential cross section s7dsigma/dt and a rapid falloff in a center-of-mass energy region of about 400 MeV following the enhancement. Our data show an angular dependence of this enhancement as the suggested scaling region is approached for thetac.m. from 70 degrees to 105 degrees.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bacterial lipopolysaccharide (endotoxin) is a frequent contaminant of biological specimens and is also known to be a potent inducer of beta-chemokines and other soluble factors that inhibit HIV-1 infection in vitro. Though lipopolysaccharide (LPS) has been shown to stimulate the production of soluble HIV-1 inhibitors in cultures of monocyte-derived macrophages, the ability of LPS to induce similar inhibitors in other cell types is poorly characterized. Here we show that LPS exhibits potent anti-HIV activity in phytohemagglutinin-stimulated peripheral blood mononuclear cells (PBMCs) but has no detectable anti-HIV-1 activity in TZM-bl cells. The anti-HIV-1 activity of LPS in PBMCs was strongly associated with the production of beta-chemokines from CD14-positive monocytes. Culture supernatants from LPS-stimulated PBMCs exhibited potent anti-HIV-1 activity when added to TZM-bl cells but, in this case, the antiviral activity appeared to be related to IFN-gamma rather than to beta-chemokines. These observations indicate that LPS stimulates PBMCs to produce a complex array of soluble HIV-1 inhibitors, including beta-chemokines and IFN-gamma, that differentially inhibit HIV-1 depending on the target cell type. The results also highlight the need to use endotoxin-free specimens to avoid artifacts when assessing HIV-1-specific neutralizing antibodies in PBMC-based assays.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Morphine induces antinociception by activating mu opioid receptors (muORs) in spinal and supraspinal regions of the CNS. (Beta)arrestin-2 (beta)arr2), a G-protein-coupled receptor-regulating protein, regulates the muOR in vivo. We have shown previously that mice lacking (beta)arr2 experience enhanced morphine-induced analgesia and do not become tolerant to morphine as determined in the hot-plate test, a paradigm that primarily assesses supraspinal pain responsiveness. To determine the general applicability of the (beta)arr2-muOR interaction in other neuronal systems, we have, in the present study, tested (beta)arr2 knock-out ((beta)arr2-KO) mice using the warm water tail-immersion paradigm, which primarily assesses spinal reflexes to painful thermal stimuli. In this test, the (beta)arr2-KO mice have greater basal nociceptive thresholds and markedly enhanced sensitivity to morphine. Interestingly, however, after a delayed onset, they do ultimately develop morphine tolerance, although to a lesser degree than the wild-type (WT) controls. In the (beta)arr2-KO but not WT mice, morphine tolerance can be completely reversed with a low dose of the classical protein kinase C (PKC) inhibitor chelerythrine. These findings provide in vivo evidence that the muOR is differentially regulated in diverse regions of the CNS. Furthermore, although (beta)arr2 appears to be the most prominent and proximal determinant of muOR desensitization and morphine tolerance, in the absence of this mechanism, the contributions of a PKC-dependent regulatory system become readily apparent.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cardiac beta(2)-adrenergic receptor (beta(2)AR) overexpression is a potential contractile therapy for heart failure. Cardiac contractility was elevated in mice overexpressing beta(2)ARs (TG4s) with no adverse effects under normal conditions. To assess the consequences of beta(2)AR overexpression during ischemia, perfused hearts from TG4 and wild-type mice were subjected to 20-minute ischemia and 40-minute reperfusion. During ischemia, ATP and pH fell lower in TG4 hearts than wild type. Ischemic injury was greater in TG4 hearts, as indicated by lower postischemic recoveries of contractile function, ATP, and phosphocreatine. Because beta(2)ARs, unlike beta(1)ARs, couple to G(i) as well as G(s), we pretreated mice with the G(i) inhibitor pertussis toxin (PTX). PTX treatment increased basal contractility in TG4 hearts and abolished the contractile resistance to isoproterenol. During ischemia, ATP fell lower in TG4+PTX than in TG4 hearts. Recoveries of contractile function and ATP were lower in TG4+PTX than in TG4 hearts. We also studied mice that overexpressed either betaARK1 (TGbetaARK1) or a betaARK1 inhibitor (TGbetaARKct). Recoveries of function, ATP, and phosphocreatine were higher in TGbetaARK1 hearts than in wild-type hearts. Despite basal contractility being elevated in TGbetaARKct hearts to the same level as that of TG4s, ischemic injury was not increased. In summary, beta(2)AR overexpression increased ischemic injury, whereas betaARK1 overexpression was protective. Ischemic injury in the beta(2)AR overexpressors was exacerbated by PTX treatment, implying that it was G(s) not G(i) activity that enhanced injury. Unlike beta(2)AR overexpression, basal contractility was increased by betaARK1 inhibitor expression without increasing ischemic injury, thus implicating a safer potential therapy for heart failure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Phosphorylation of GTP-binding-regulatory (G)-protein-coupled receptors by specific G-protein-coupled receptor kinases (GRKs) is a major mechanism responsible for agonist-mediated desensitization of signal transduction processes. However, to date, studies of the specificity of these enzymes have been hampered by the difficulty of preparing the purified and reconstituted receptor preparations required as substrates. Here we describe an approach that obviates this problem by utilizing highly purified membrane preparations from Sf9 and 293 cells overexpressing G-protein-coupled receptors. We use this technique to demonstrate specificity of several GRKs with respect to both receptor substrates and the enhancing effects of G-protein beta gamma subunits on phosphorylation. Enriched membrane preparations of the beta 2- and alpha 2-C2-adrenergic receptors (ARs, where alpha 2-C2-AR refers to the AR whose gene is located on human chromosome 2) prepared by sucrose density gradient centrifugation from Sf9 or 293 cells contain the receptor at 100-300 pmol/mg of protein and serve as efficient substrates for agonist-dependent phosphorylation by beta-AR kinase 1 (GRK2), beta-AR kinase 2 (GRK3), or GRK5. Stoichiometries of agonist-mediated phosphorylation of the receptors by GRK2 (beta-AR kinase 1), in the absence and presence of G beta gamma, are 1 and 3 mol/mol, respectively. The rate of phosphorylation of the membrane receptors is 3 times faster than that of purified and reconstituted receptors. While phosphorylation of the beta 2-AR by GRK2, -3, and -5 is similar, the activity of GRK2 and -3 is enhanced by G beta gamma whereas that of GRK5 is not. In contrast, whereas GRK2 and -3 efficiently phosphorylate alpha 2-C2-AR, GRK5 is quite weak. The availability of a simple direct phosphorylation assay applicable to any cloned G-protein-coupled receptor should greatly facilitate elucidation of the mechanisms of regulation of these receptors by the expanding family of GRKs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Brain tumors are typically resistant to conventional chemotherapeutics, most of which initiate apoptosis upstream of mitochondrial cytochrome c release. In this study, we demonstrate that directly activating apoptosis downstream of the mitochondria, with cytosolic cytochrome c, kills brain tumor cells but not normal brain tissue. Specifically, cytosolic cytochrome c is sufficient to induce apoptosis in glioblastoma and medulloblastoma cell lines. In contrast, primary neurons from the cerebellum and cortex are remarkably resistant to cytosolic cytochrome c. Importantly, tumor tissue from mouse models of both high-grade astrocytoma and medulloblastoma display hypersensitivity to cytochrome c when compared with surrounding brain tissue. This differential sensitivity to cytochrome c is attributed to high Apaf-1 levels in the tumor tissue compared with low Apaf-1 levels in the adjacent brain tissue. These differences in Apaf-1 abundance correlate with differences in the levels of E2F1, a previously identified activator of Apaf-1 transcription. ChIP assays reveal that E2F1 binds the Apaf-1 promoter specifically in tumor tissue, suggesting that E2F1 contributes to the expression of Apaf-1 in brain tumors. Together, these results demonstrate an unexpected sensitivity of brain tumors to postmitochondrial induction of apoptosis. Moreover, they raise the possibility that this phenomenon could be exploited therapeutically to selectively kill brain cancer cells while sparing the surrounding brain parenchyma.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Spoken language and learned song are complex communication behaviors found in only a few species, including humans and three groups of distantly related birds--songbirds, parrots, and hummingbirds. Despite their large phylogenetic distances, these vocal learners show convergent behaviors and associated brain pathways for vocal communication. However, it is not clear whether this behavioral and anatomical convergence is associated with molecular convergence. Here we used oligo microarrays to screen for genes differentially regulated in brain nuclei necessary for producing learned vocalizations relative to adjacent brain areas that control other behaviors in avian vocal learners versus vocal non-learners. A top candidate gene in our screen was a calcium-binding protein, parvalbumin (PV). In situ hybridization verification revealed that PV was expressed significantly higher throughout the song motor pathway, including brainstem vocal motor neurons relative to the surrounding brain regions of all distantly related avian vocal learners. This differential expression was specific to PV and vocal learners, as it was not found in avian vocal non-learners nor for control genes in learners and non-learners. Similar to the vocal learning birds, higher PV up-regulation was found in the brainstem tongue motor neurons used for speech production in humans relative to a non-human primate, macaques. These results suggest repeated convergent evolution of differential PV up-regulation in the brains of vocal learners separated by more than 65-300 million years from a common ancestor and that the specialized behaviors of learned song and speech may require extra calcium buffering and signaling.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Individual differences in affect intensity are typically assessed with the Affect Intensity Measure (AIM). Previous factor analyses suggest that the AIM is comprised of four weakly correlated factors: Positive Affectivity, Negative Reactivity, Negative Intensity and Positive Intensity or Serenity. However, little data exist to show whether its four factors relate to other measures differently enough to preclude use of the total scale score. The present study replicated the four-factor solution and found that subscales derived from the four factors correlated differently with criterion variables that assess personality domains, affective dispositions, and cognitive patterns that are associated with emotional reactions. The results show that use of the total AIM score can obscure relationships between specific features of affect intensity and other variables and suggest that researchers should examine the individual AIM subscales.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our research was conducted to improve the timeliness, coordination, and communication during the detection, investigation and decision-making phases of the response to an aerosolized anthrax attack in the metropolitan Washington, DC, area with the goal of reducing casualties. Our research gathered information of the current response protocols through an extensive literature review and interviews with relevant officials and experts in order to identify potential problems that may exist in various steps of the detection, investigation, and response. Interviewing officials from private and government sector agencies allowed the development of a set of models of interactions and a communication network to identify discrepancies and redundancies that would elongate the delay time in initiating a public health response. In addition, we created a computer simulation designed to model an aerosol spread using weather patterns and population density to identify an estimated population of infected individuals within a target region depending on the virulence and dimensions of the weaponized spores. We developed conceptual models in order to design recommendations that would be presented to our collaborating contacts and agencies that would use such policy and analysis interventions to improve upon the overall response to an aerosolized anthrax attack, primarily through changes to emergency protocol functions and suggestions of technological detection and monitoring response to an aerosolized anthrax attack.