936 resultados para Kondo box
Resumo:
Carbon nanowalls (CNWs) are self-assembled, free-standing, few-layered graphenenano-structures with large surface area, and thin graphene edges. For their application to nanobiotechnology, the effects of chemisorbed species on surface wettability were investigated. The surfaces of as-grown CNWs obtained using CH4/H2 mixture were hydrophilic. After Ar atmospheric pressure plasma treatments for up to 30 s, the contact angles of water droplets on the CNWs decreased from 51° to 5°, owing to a result of oxidation only at edges and surface defects. They increased up to 147° by CF4 plasma treatment at low pressure. The wide-range control of surface wettability of CNWs was realized by post-growth plasma treatments. We also demonstrated detection of bovine serum albumin using surface-modified CNWs as electrodes.
Resumo:
NLS is a stream cipher which was submitted to the eSTREAM project. A linear distinguishing attack against NLS was presented by Cho and Pieprzyk, which was called Crossword Puzzle (CP) attack. NLSv2 is a tweak version of NLS which aims mainly at avoiding the CP attack. In this paper, a new distinguishing attack against NLSv2 is presented. The attack exploits high correlation amongst neighboring bits of the cipher. The paper first shows that the modular addition preserves pairwise correlations as demonstrated by existence of linear approximations with large biases. Next, it shows how to combine these results with the existence of high correlation between bits 29 and 30 of the S-box to obtain a distinguisher whose bias is around 2^−37. Consequently, we claim that NLSv2 is distinguishable from a random cipher after observing around 2^74 keystream words.
Resumo:
This paper aims to review the notion of the one-stop shop, particularly as it has developed in Australia. It has three main components. The first focuses on a significant initiative taken by the Coombs Royal Commission on Australian Government Administration as a form of action research in the mid-1970s. The second highlights the associated work on access theory by the late Bernard Schaffer and his associates and explains why this work was of fundamental importance for the development of the idea of the one-stop shop. The third deals with subsequent Australian understandings and a pp lications of the idea.
Resumo:
The follicular variant of papillary thyroid carcinoma (FVPTC) presents a type of papillary thyroid cancer that has created continuous diagnosis and treatment controversies among clinicians and pathologists. In this review, we describe the nomenclature, the clinical features, diagnostic problems and the molecular biology of FVPTC. It is important for clinicians to understand this entity as the diagnosis and management of this group of patient may be different from other patients with conventional PTC. The literature suggests that FVPTC behaves in a way similar, clinically, to conventional papillary thyroid carcinoma. However, there are some genotypic differences which may characterise this neoplasm. These parameters may account for the phenotypic variation described by some scientists in this type of cancer. Further understanding can only be achieved by defining strict pathological criteria, in-depth study of the molecular biology and long term follow-up of the optional patients with FVPTC.
Resumo:
Numerical simulation of a geothermal reservoir, modelled as a bottom-heated square box, filled with water-CO2 mixture is presented in this work. Furthermore, results for two limiting cases of a reservoir filled with either pure water or CO2 are presented. Effects of different parameters including CO2 concentration as well as reservoir pressure and temperature on the overall performance of the system are investigated. It has been noted that, with a fixed reservoir pressure and temperature, any increase in CO2concentration leads to better performance, i.e. stronger convection and higher heat transfer rates. With a fixed CO2 concentration, however, the reservoir pressure and temperature can significantly affect the overall heat transfer and flow rate from the reservoir. Details of such variations are documented and discussed in the present paper.
Resumo:
Ubiquitination involves the attachment of ubiquitin to lysine residues on substrate proteins or itself, which can result in protein monoubiquitination or polyubiquitination. Ubiquitin attachment to different lysine residues can generate diverse substrate-ubiquitin structures, targeting proteins to different fates. The mechanisms of lysine selection are not well understood. Ubiquitination by the largest group of E3 ligases, the RING-family E3 s, is catalyzed through co-operation between the non-catalytic ubiquitin-ligase (E3) and the ubiquitin-conjugating enzyme (E2), where the RING E3 binds the substrate and the E2 catalyzes ubiquitin transfer. Previous studies suggest that ubiquitination sites are selected by E3-mediated positioning of the lysine toward the E2 active site. Ultimately, at a catalytic level, ubiquitination of lysine residues within the substrate or ubiquitin occurs by nucleophilic attack of the lysine residue on the thioester bond linking the E2 catalytic cysteine to ubiquitin. One of the best studied RING E3/ E2 complexes is the Skp1/Cul1/F box protein complex, SCFCdc4, and its cognate E2, Cdc34, which target the CDK inhibitor Sic1 for K48-linked polyubiquitination, leading to its proteasomal degradation. Our recent studies of this model system demonstrated that residues surrounding Sic1 lysines or lysine 48 in ubiquitin are critical for ubiquitination. This sequence-dependence is linked to evolutionarily conserved key residues in the catalytic region of Cdc34 and can determine if Sic1 is mono- or poly-ubiquitinated. Our studies indicate that amino acid determinants in the Cdc34 catalytic region and their compatibility to those surrounding acceptor lysine residues play important roles in lysine selection. This may represent a general mechanism in directing the mode of ubiquitination in E2 s.
Resumo:
Ubiquitin (Ub)-conjugating enzymes (E2s) and ubiquitin ligases (E3s) catalyze the attachment of Ub to lysine residues in substrates and Ub during monoubiquitination and polyubiquitination. Lysine selection is important for the generation of diverse substrate-Ub structures, which provides versatility to this pathway in the targeting of proteins to different fates. The mechanisms of lysine selection remain poorly understood, with previous studies suggesting that the ubiquitination site(s) is selected by the E2/E3-mediated positioning of a lysine(s) toward the E2/E3 active site. By studying the polyubiquitination of Sic1 by the E2 protein Cdc34 and the RING E3 Skp1/Cul1/F-box (SCF) protein, we now demonstrate that in addition to E2/E3-mediated positioning, proximal amino acids surrounding the lysine residues in Sic1 and Ub are critical for ubiquitination. This mechanism is linked to key residues composing the catalytic core of Cdc34 and independent of SCF. Changes to these core residues altered the lysine preference of Cdc34 and specified whether this enzyme monoubiquitinated or polyubiquitinated Sic1. These new findings indicate that compatibility between amino acids surrounding acceptor lysine residues and key amino acids in the catalytic core of ubiquitin-conjugating enzymes is an important mechanism for lysine selection during ubiquitination.
Resumo:
Community arts can take many forms, including murals, installations, festivals and performances. The work can be produced by artists solely, by artists working with community groups, or by community groups. Community arts can be on a grand-scale covering whole streets, parks or even towns, or small- scale, such as a mosaic in the corner of a play area. It can be extremely impacting and a permanent fixture, or fragile and small and designed to blow away in the wind. But, common to all these different forms of community arts are the criteria that community arts are made in, for and/or by, the local community.
Resumo:
In recent years, the beauty leaf plant (Calophyllum Inophyllum) is being considered as a potential 2nd generation biodiesel source due to high seed oil content, high fruit production rate, simple cultivation and ability to grow in a wide range of climate conditions. However, however, due to the high free fatty acid (FFA) content in this oil, the potential of this biodiesel feedstock is still unrealized, and little research has been undertaken on it. In this study, transesterification of beauty leaf oil to produce biodiesel has been investigated. A two-step biodiesel conversion method consisting of acid catalysed pre-esterification and alkali catalysed transesterification has been utilized. The three main factors that drive the biodiesel (fatty acid methyl ester (FAME)) conversion from vegetable oil (triglycerides) were studied using response surface methodology (RSM) based on a Box-Behnken experimental design. The factors considered in this study were catalyst concentration, methanol to oil molar ratio and reaction temperature. Linear and full quadratic regression models were developed to predict FFA and FAME concentration and to optimize the reaction conditions. The significance of these factors and their interaction in both stages was determined using analysis of variance (ANOVA). The reaction conditions for the largest reduction in FFA concentration for acid catalysed pre-esterification was 30:1 methanol to oil molar ratio, 10% (w/w) sulfuric acid catalyst loading and 75 °C reaction temperature. In the alkali catalysed transesterification process 7.5:1 methanol to oil molar ratio, 1% (w/w) sodium methoxide catalyst loading and 55 °C reaction temperature were found to result in the highest FAME conversion. The good agreement between model outputs and experimental results demonstrated that this methodology may be useful for industrial process optimization for biodiesel production from beauty leaf oil and possibly other industrial processes as well.
Resumo:
Abstract Legacy information systems evolved incrementally in response to changes in business strategy and information technology. Organizations are now being forced to change much more radically and quickly than previously and this change places new demands on information systems. Legacy information systems are usually considered from a technical perspective, addressing issues such as age, complexity, maintainability, design and technology. We wish to demonstrate that the business dimension to legacy information systems, represented by the organisation structure, business processes and procedures that are bound up in the design and operation of the existing IT systems, is also significant. This paper identifies the important role of legacy information systems in the formation of new strategies. We show that the move away from a stable to an unstable business environment accelerates the rate of change. Furthermore, the gap between what the legacy information systems can deliver and the strategic vision of the organization widens when the legacy information systems are unable to adapt to meet the new requirements. An analysis of fifteen case studies provides evidence that legacy information systems include business and technical dimensions and that the systems can present problems when there is a misalignment between the strategic vision of the business, the IT legacy and the old business model embodied in the legacy.
Resumo:
Background
With dwindling malaria cases in Bhutan in recent years, the government of Bhutan has made plans for malaria elimination by 2016. This study aimed to determine coverage, use and ownership of LLINs, as well as the prevalence of asymptomatic malaria at a single time-point, in four sub-districts of Bhutan.
Methods
A cross-sectional study was carried out in August 2013. Structured questionnaires were administered to a single respondent in each household (HH) in four sub-districts. Four members from 25 HH, randomly selected from each sub-district, were tested using rapid diagnostic tests (RDT) for asymptomatic Plasmodium falciparum and Plasmodium vivax infection. Multivariable logistic regression models were used to identify factors associated with LLIN use and maintenance.
Results
All blood samples from 380 participants tested negative for Plasmodium infections. A total of 1,223 HH (92.5% of total HH) were surveyed for LLIN coverage and use. Coverage of LLINs was 99.0% (1,203/1,223 HH). Factors associated with decreased odds of sleeping under a LLIN included: washing LLINs
Resumo:
The KRAB-zinc finger proteins (KRAB-ZFPs) represent a very large, but poorly understood, family of transcriptional regulators in mammals. They are thought to repress transcription via their interaction with KRAB-associated protein 1 (KAP1), which then assembles a complex of chromatin modifiers to lay down histone marks that are associated with inactive chromatin. Studies of KRAB-ZFP/KAP1-mediated gene silencing, using reporter constructs and ectopically expressed proteins, have shown colocalisation of both KAP1 and repressed reporter target genes to domains of constitutive heterochromatin in the nucleus. However, we show here that although KAP1 does indeed become recruited to pericentric heterochromatin during differentiation of mouse embryonic stem (ES) cells, endogenous KRAB-ZFPs do not. Rather, KRAB-ZFPs and KAP1 relocalise to novel nucleoplasmic foci that we have termed KRAB- and KAP1-associated (KAKA) foci. HP1s can also concentrate in these foci and there is a close spatial relationship between KAKA nuclear foci and PML nuclear bodies. Finally, we reveal differential requirements for the recruitment of KAP1 to pericentric heterochromatin and KAKA foci, and suggest that KAKA foci may contain sumoylated KAP1 - the form of the protein that is active in transcriptional repression.
Resumo:
This paper introduces a new method to automate the detection of marine species in aerial imagery using a Machine Learning approach. Our proposed system has at its core, a convolutional neural network. We compare this trainable classifier to a handcrafted classifier based on color features, entropy and shape analysis. Experiments demonstrate that the convolutional neural network outperforms the handcrafted solution. We also introduce a negative training example-selection method for situations where the original training set consists of a collection of labeled images in which the objects of interest (positive examples) have been marked by a bounding box. We show that picking random rectangles from the background is not necessarily the best way to generate useful negative examples with respect to learning.
Resumo:
In traditional communication and information theory, noise is the demon Other, an unwelcome disruption in the passage of information. Noise is "anything that is added to the signal between its transmission and reception that is not intended by the source...anything that makes the intended signal harder to decode accurately". It is in Michel Serres' formulation, the "third man" in dialogue who is always assumed, and whom interlocutors continually struggle to exclude. Noise is simultaneously a condition and a by-product of the act of communication, it represents the ever present possibility of disruption, interruption, misunderstanding. In sonic or musical terms noise is cacophony, dissonance. For economists, noise is an arbitrary element, both a barrier to the pursuit of wealth and a basis for speculation. For Mick (Jeremy Sims) and his mate Kev (Ben Mendelsohn) in David Caesar's Idiot Box (1996), as for Hando (Russell Crowe) and his gang of skinheads in Geoffrey Wright's Romper Stomper (1992), or Dazey (Ben Mendelsohn) and Joe (Aden Young) in Wright's Metal Skin (1994) and all those like them starved of (useful) information and excluded from the circuit - the information poor - their only option, their only point of intervention in the loop, is to make noise, to disrupt, to discomfort, to become Serres' "third man", "the prosopopoeia of noise" (5).
Resumo:
The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers, making it among the most important security protocols on the Internet. We show that the signed-Diffie--Hellman SSH ciphersuites of the SSH protocol are secure: each is a secure authenticated and confidential channel establishment (ACCE) protocol, the same security definition now used to describe the security of Transport Layer Security (TLS) ciphersuites. While the ACCE definition suffices to describe the security of individual ciphersuites, it does not cover the case where parties use the same long-term key with many different ciphersuites: it is common in practice for the server to use the same signing key with both finite field and elliptic curve Diffie--Hellman, for example. While TLS is vulnerable to attack in this case, we show that SSH is secure even when the same signing key is used across multiple ciphersuites. We introduce a new generic multi-ciphersuite composition framework to achieve this result in a black-box way.