965 resultados para Positively homogeneous functions of degree one
Resumo:
Length of resin tags yielded by utilization of an one-step conventional adhesive system and self-etching adhesive system on unground enamel was observed. In study Groups I and III, the enamel surface was etched for 60 seconds with 35% phosphoric acid gel and adhesive systems PQ1 (Ultradent Products, Inc) and Adper Prompt L Pop (3M/ESPE) were applied. Adper Prompt L Pop (3M/ESPE) was also applied in Group II in accordance with the manufacturer's recommendations. After application of these adhesive systems to dental enamel, specimens were prepared for light microscopy analysis to ascertain degree of penetration (x400). The results were submitted to an analysis of variance at the 5% level; whenever there was significance, the Tukey test was applied at the 5% level. It was found that acid etching prior to application of conventional and self-etching adhesive materials provided higher penetration of the adhesive into the unground enamel surface compared to that achieved solely by application of self-etching adhesive.
Resumo:
Inthispaperwestudygermsofpolynomialsformedbytheproductofsemi-weighted homogeneous polynomials of the same type, which we call semi-weighted homogeneous arrangements. It is shown how the L numbers of such polynomials are computed using only their weights and degree of homogeneity. A key point of the main theorem is to find the number called polar ratio of this polynomial class. An important consequence is the description of the Euler characteristic of the Milnor fibre of such arrangements only depending on their weights and degree of homogeneity. The constancy of the L numbers in families formed by such arrangements is shown, with the deformed terms having weighted degree greater than the weighted degree of the initial germ. Moreover, using the results of Massey applied to families of function germs, we obtain the constancy of the homology of the Milnor fibre in this family of semi-weighted homogeneous arrangements.
Resumo:
This paper proposes a general class of regression models for continuous proportions when the data contain zeros or ones. The proposed class of models assumes that the response variable has a mixed continuous-discrete distribution with probability mass at zero or one. The beta distribution is used to describe the continuous component of the model, since its density has a wide range of different shapes depending on the values of the two parameters that index the distribution. We use a suitable parameterization of the beta law in terms of its mean and a precision parameter. The parameters of the mixture distribution are modeled as functions of regression parameters. We provide inference, diagnostic, and model selection tools for this class of models. A practical application that employs real data is presented. (C) 2011 Elsevier B.V. All rights reserved.
Resumo:
Meprins are members of the astacin family of metalloproteases expressed in epithelial tissues, intestinal leukocytes and certain cancer cells. In mammals, there are two homologous subunits, which form complex glycosylated disulfide-bonded homo- and heterooligomers. Both human meprin alpha and meprin beta cleave several basement membrane components, suggesting a role in epithelial differentiation and cell migration. There is also evidence that meprin beta is involved in immune defence owing to its capability of activating interleukin-1beta and the diminished mobility of intestinal leukocytes in meprin beta-knockout mice. Here we show for the first time by reverse transcription PCR, immunoblotting and immunofluorescence analyses that meprins are expressed not only in mammals, but also in the zebrafish Danio rerio. In contrast to the human, mouse and rat enzymes, zebrafish meprins are encoded by three genes, corresponding to two homologous alpha subunits and one beta subunit. Observations at both the mRNA and protein level indicate a broad distribution of meprins in zebrafish. However, there are strikingly different expression patterns of the three subunits, which is consistent with meprin expression in mammals. Hence, D. rerio appears to be a suitable model to gain insight into the basic physiological functions of meprin metalloproteases.
Resumo:
Standard procedures for forecasting flood risk (Bulletin 17B) assume annual maximum flood (AMF) series are stationary, meaning the distribution of flood flows is not significantly affected by climatic trends/cycles, or anthropogenic activities within the watershed. Historical flood events are therefore considered representative of future flood occurrences, and the risk associated with a given flood magnitude is modeled as constant over time. However, in light of increasing evidence to the contrary, this assumption should be reconsidered, especially as the existence of nonstationarity in AMF series can have significant impacts on planning and management of water resources and relevant infrastructure. Research presented in this thesis quantifies the degree of nonstationarity evident in AMF series for unimpaired watersheds throughout the contiguous U.S., identifies meteorological, climatic, and anthropogenic causes of this nonstationarity, and proposes an extension of the Bulletin 17B methodology which yields forecasts of flood risk that reflect climatic influences on flood magnitude. To appropriately forecast flood risk, it is necessary to consider the driving causes of nonstationarity in AMF series. Herein, large-scale climate patterns—including El Niño-Southern Oscillation (ENSO), Pacific Decadal Oscillation (PDO), North Atlantic Oscillation (NAO), and Atlantic Multidecadal Oscillation (AMO)—are identified as influencing factors on flood magnitude at numerous stations across the U.S. Strong relationships between flood magnitude and associated precipitation series were also observed for the majority of sites analyzed in the Upper Midwest and Northeastern regions of the U.S. Although relationships between flood magnitude and associated temperature series are not apparent, results do indicate that temperature is highly correlated with the timing of flood peaks. Despite consideration of watersheds classified as unimpaired, analyses also suggest that identified change-points in AMF series are due to dam construction, and other types of regulation and diversion. Although not explored herein, trends in AMF series are also likely to be partially explained by changes in land use and land cover over time. Results obtained herein suggest that improved forecasts of flood risk may be obtained using a simple modification of the Bulletin 17B framework, wherein the mean and standard deviation of the log-transformed flows are modeled as functions of climate indices associated with oceanic-atmospheric patterns (e.g. AMO, ENSO, NAO, and PDO) with lead times between 3 and 9 months. Herein, one-year ahead forecasts of the mean and standard deviation, and subsequently flood risk, are obtained by applying site specific multivariate regression models, which reflect the phase and intensity of a given climate pattern, as well as possible impacts of coupling of the climate cycles. These forecasts of flood risk are compared with forecasts derived using the existing Bulletin 17B model; large differences in the one-year ahead forecasts are observed in some locations. The increased knowledge of the inherent structure of AMF series and an improved understanding of physical and/or climatic causes of nonstationarity gained from this research should serve as insight for the formulation of a physical-casual based statistical model, incorporating both climatic variations and human impacts, for flood risk over longer planning horizons (e.g., 10-, 50, 100-years) necessary for water resources design, planning, and management.
Resumo:
Previously, it has been shown that laminin will self-assemble by a two-step calcium-dependent process using end-domain interactions (Yurchenco, P. D., Tsi-library, E. C., Charonis, A. S., and Furthmayr, H. (1985) J. Biol. Chem. 260, 7636-7644). We now find that heparin, at low concentrations, modifies this polymerization by driving the equilibrium further toward aggregation, by producing a denser polymer, and by inducing aggregation in the absence of calcium. This effect on self-assembly is specific in that it is observed with heparin but not with several heparan sulfates or other glycosaminoglycans: it correlates with affinity and depends on the degree of polysaccharide sulfation. Heparin binds to laminin in a calcium-dependent manner with a single class of interaction (KD = 118 +/- 18 nM) and with a binding capacity of one heparin for two laminins. We find the long arm globule (E3) is the only laminin domain which exhibits substantial heparin binding: heparin binds E3 with an affinity (KD = 94 +/- 12 nM) and calcium dependence similar to that for intact laminin. These data strongly suggest that heparin modifies laminin assembly by binding to pairs of long arm globular domains. As a result the polymer may be stabilized at domain E3 and laminin interdomain interactions induced or modified. We further postulate that heparins may act in vivo as specific regulators of the structure and functions of basement membranes by both altering the laminin matrix and by displacing weakly binding heparan sulfates.
Resumo:
The sensitivity of the gas flow field to changes in different initial conditions has been studied for the case of a highly simplified cometary nucleus model. The nucleus model simulated a homogeneously outgassing sphere with a more active ring around an axis of symmetry. The varied initial conditions were the number density of the homogeneous region, the surface temperature, and the composition of the flow (varying amounts of H2O and CO2) from the active ring. The sensitivity analysis was performed using the Polynomial Chaos Expansion (PCE) method. Direct Simulation Monte Carlo (DSMC) was used for the flow, thereby allowing strong deviations from local thermal equilibrium. The PCE approach can be used to produce a sensitivity analysis with only four runs per modified input parameter and allows one to study and quantify non-linear responses of measurable parameters to linear changes in the input over a wide range. Hence the PCE allows one to obtain a functional relationship between the flow field properties at every point in the inner coma and the input conditions. It is for example shown that the velocity and the temperature of the background gas are not simply linear functions of the initial number density at the source. As probably expected, the main influence on the resulting flow field parameter is the corresponding initial parameter (i.e. the initial number density determines the background number density, the temperature of the surface determines the flow field temperature, etc.). However, the velocity of the flow field is also influenced by the surface temperature while the number density is not sensitive to the surface temperature at all in our model set-up. Another example is the change in the composition of the flow over the active area. Such changes can be seen in the velocity but again not in the number density. Although this study uses only a simple test case, we suggest that the approach, when applied to a real case in 3D, should assist in identifying the sensitivity of gas parameters measured in situ by, for example, the Rosetta spacecraft to the surface boundary conditions and vice versa.
Resumo:
An extensive radiograph study of 24 undisturbed, up to 206-cm long box and gravity cores from the western part of the Strait of Otranto revealed a great variety of primary bedding structures and secondary burrowing features. The regional distribution of the sediments according to their structural, textural, and compositional properties reflects the major morphologic subdivisions of the strait into shelf, slope, and trough bottom (e.g., the bottom of the northern end of the Corfu-Kephallinia Trough, which extends from the northeastern Ionian Sea into the Strait of Otranto): (1) The Apulian shelf (0 to -170m) is only partly covered by very poorly sorted, muddy sands without layering. These relict(?) sands are rich in organic carbonate debris and contain glauconite and reworked (?Pleistocene) ooids. (2) The slope sediments (-170 to -1,000 m) are poorly sorted, sandy muds with a high degree of burrowing. One core (OT 5) is laminated and shows slump structures. An origin of these slumped sediment masses from older deposits higher on the slope was inferred from their abnormal compaction, color, texture, organic content, and mineral composition. (3) Cores from the northern end of the Corfu-Kephallinia Trough (-980 to -1,060 m) display a few graded sand layers, 2-5 cm (maximum 30 cm) thick with parallel and ripple-cross-laminations, deposited by oceanic bottom or small-scale turbidity currents. They are intercalated with homogeneous lutite. (4) Hemipelagic sediments prevail in the more southerly part of the Corfu-Kephallinia Trough and on the "Apulian-Ionian Ridge", the southern submarine extension of the Apulian Peninsula. Below a core depth of 160 cm, these cores have a laminated ("varved") zone, representing an Early Holocene (Boreal-Atlanticum) "stagnation layer" (14C age approximately 9,000 years). The terrigenous components of the surface sediments as well as those of the deeper sand layers can be derived from the Apulian shelf and the Italian mainland (Cretaceous Apulian Plateau and Gargano Mountains, southern Apennines, volcanic province of the Monte Vulture). Indicated by the heavy mineral glaucophane, a minor proportion of the sedimentary material is probably of Alpine origin. If this portion is considered to be first-cycle clastic material it reaches the Strait of Otranto after a longitudinal transport of 700 km via the Adriatic Sea. The lack of phyllosilicates in the coarse- to medium-grained shelf samples might be explained by the activity of the "Apulian Current" (surface velocities up to 4 knots) which in the past possibly has affected the bottom almost down to depths of the shelf edge. The percentage of planktonic organisms, and also the plankton: benthos ratio in the sediments is a useful indicator for bathymetry (depth zonation).
Resumo:
Antifreeze proteins (AFPs) provide protection for organisms subjected to the presence of ice crystals. The psychrophilic diatom Fragilariopsis cylindrus which is frequently found in polar sea ice carries a multitude of AFP isoforms. In this study we report the heterologous expression of two antifreeze protein isoforms from F. cylindrus in Escherichia coli. Refolding from inclusion bodies produced proteins functionally active with respect to crystal deformation, recrystallization inhibition and thermal hysteresis. We observed a reduction of activity in the presence of the pelB leader peptide in comparison with the GS-linked SUMO-tag. Activity was positively correlated to protein concentration and buffer salinity. Thermal hysteresis and crystal deformation habit suggest the affiliation of the proteins to the hyperactive group of AFPs. One isoform, carrying a signal peptide for secretion, produced a thermal hysteresis up to 1.53 °C ± 0.53 °C and ice crystals of hexagonal bipyramidal shape. The second isoform, which has a long preceding N-terminal sequence of unknown function, produced thermal hysteresis of up to 2.34 °C ± 0.25 °C. Ice crystals grew in form of a hexagonal column in presence of this protein. The different sequences preceding the ice binding domain point to distinct localizations of the proteins inside or outside the cell. We thus propose that AFPs have different functions in vivo, also reflected in their specific TH capability.
Resumo:
In this work, the algebraic properties of the local transition functions of elementary cellular automata (ECA) were analysed. Specifically, a classification of such cellular automata was done according to their algebraic degree, the balancedness, the resiliency, nonlinearity, the propagation criterion and the existence of non-zero linear structures. It is shown that there is not any ECA satisfying all properties at the same time.
Resumo:
Esta tesis establece los fundamentos teóricos y diseña una colección abierta de clases C++ denominada VBF (Vector Boolean Functions) para analizar funciones booleanas vectoriales (funciones que asocian un vector booleano a otro vector booleano) desde una perspectiva criptográfica. Esta nueva implementación emplea la librería NTL de Victor Shoup, incorporando nuevos módulos que complementan a las funciones de NTL, adecuándolas para el análisis criptográfico. La clase fundamental que representa una función booleana vectorial se puede inicializar de manera muy flexible mediante diferentes estructuras de datas tales como la Tabla de verdad, la Representación de traza y la Forma algebraica normal entre otras. De esta manera VBF permite evaluar los criterios criptográficos más relevantes de los algoritmos de cifra en bloque y de stream, así como funciones hash: por ejemplo, proporciona la no-linealidad, la distancia lineal, el grado algebraico, las estructuras lineales, la distribución de frecuencias de los valores absolutos del espectro Walsh o del espectro de autocorrelación, entre otros criterios. Adicionalmente, VBF puede llevar a cabo operaciones entre funciones booleanas vectoriales tales como la comprobación de igualdad, la composición, la inversión, la suma, la suma directa, el bricklayering (aplicación paralela de funciones booleanas vectoriales como la empleada en el algoritmo de cifra Rijndael), y la adición de funciones coordenada. La tesis también muestra el empleo de la librería VBF en dos aplicaciones prácticas. Por un lado, se han analizado las características más relevantes de los sistemas de cifra en bloque. Por otro lado, combinando VBF con algoritmos de optimización, se han diseñado funciones booleanas cuyas propiedades criptográficas son las mejores conocidas hasta la fecha. ABSTRACT This thesis develops the theoretical foundations and designs an open collection of C++ classes, called VBF, designed for analyzing vector Boolean functions (functions that map a Boolean vector to another Boolean vector) from a cryptographic perspective. This new implementation uses the NTL library from Victor Shoup, adding new modules which complement the existing ones making VBF better suited for cryptography. The fundamental class representing a vector Boolean function can be initialized in a flexible way via several alternative types of data structures such as Truth Table, Trace Representation, Algebraic Normal Form (ANF) among others. This way, VBF allows the evaluation of the most relevant cryptographic criteria for block and stream ciphers as well as for hash functions: for instance, it provides the nonlinearity, the linearity distance, the algebraic degree, the linear structures, the frequency distribution of the absolute values of the Walsh Spectrum or the Autocorrelation Spectrum, among others. In addition, VBF can perform operations such as equality testing, composition, inversion, sum, direct sum, bricklayering (parallel application of vector Boolean functions as employed in Rijndael cipher), and adding coordinate functions of two vector Boolean functions. This thesis also illustrates the use of VBF in two practical applications. On the one hand, the most relevant properties of the existing block ciphers have been analysed. On the other hand, by combining VBF with optimization algorithms, new Boolean functions have been designed which have the best known cryptographic properties up-to-date.
Resumo:
Esta tesis doctoral, que es la culminación de mis estudios de doctorado impartidos por el Departamento de Lingüística Aplicada a la Ciencia y a la Tecnología de la Universidad Politécnica de Madrid, aborda el análisis del uso de la matización (hedging) en el lenguaje legal inglés siguiendo los postulados y principios de la análisis crítica de género (Bhatia, 2004) y empleando las herramientas de análisis de córpora WordSmith Tools versión 6 (Scott, 2014). Como refleja el título, el estudio se centra en la descripción y en el análisis contrastivo de las variedades léxico-sintácticas de los matizadores del discurso (hedges) y las estrategias discursivas que con ellos se llevan a cabo, además de las funciones que éstas desempeñan en un corpus de sentencias del Tribunal Supremo de EE. UU., y de artículos jurídicos de investigación americanos, relacionando, en la medida posible, éstas con los rasgos determinantes de los dos géneros, desde una perspectiva socio-cognitiva. El elemento innovador que ofrece es que, a pesar de los numerosos estudios que se han podido realizar sobre los matizadores del discurso en el inglés general (Lakoff, 1973; Hübler, 1983; Clemen, 1997; Markkanen and Schröder, 1997; Mauranen, 1997; Fetzer 2010; y Finnegan, 2010 entre otros) académico (Crompton, 1997; Meyer, 1997; Skelton, 1997; Martín Butragueňo, 2003) científico (Hyland, 1996a, 1996c, 1998c, 2007; Grabe and Kaplan, 1997; Salager-Meyer, 1997 Varttala, 2001) médico (Prince, 1982; Salager-Meyer, 1994; Skelton, 1997), y, en menor medida el inglés legal (Toska, 2012), no existe ningún tipo de investigación que vincule los distintos usos de la matización a las características genéricas de las comunicaciones profesionales. Dentro del lenguaje legal, la matización confirma su dependencia tanto de las expectativas a macro-nivel de la comunidad de discurso, como de las intenciones a micro-nivel del escritor de la comunicación, variando en función de los propósitos comunicativos del género ya sean éstos educativos, pedagógicos, interpersonales u operativos. El estudio pone de relieve el uso predominante de los verbos modales epistémicos y de los verbos léxicos como matizadores del discurso, estos últimos divididos en cuatro tipos (Hyland 1998c; Palmer 1986, 1990, 2001) especulativos, citativos, deductivos y sensoriales. La realización léxico-sintáctica del matizador puede señalar una de cuatro estrategias discursivas particulares (Namsaraev, 1997; Salager-Meyer, 1994), la indeterminación, la despersonalización, la subjectivisación, o la matización camuflada (camouflage hedging), cuya incidencia y función varia según género. La identificación y cuantificación de los distintos matizadores y estrategias empleados en los diferentes géneros del discurso legal puede tener implicaciones pedagógicos para los estudiantes de derecho no nativos que tienen que demostrar una competencia adecuada en su uso y procesamiento. ABSTRACT This doctoral thesis, which represents the culmination of my doctoral studies undertaken in the Department of Linguistics Applied to Science and Technology of the Universidad Politécnica de Madrid, focusses on the analysis of hedging in legal English following the principles of Critical Genre Analysis (Bhatia, 2004), and using WordSmith Tools version 6 (Scott, 2014) corpus analysis tools. As the title suggests, this study centers on the description and contrastive analysis of lexico-grammatical realizations of hedges and the discourse strategies which they can indicate, as well as the functions they can carry out, in a corpus of U.S. Supreme Court opinions and American law review articles. The study relates realization, incidence and function of hedging to the predominant generic characteristics of the two genres from a socio-cognitive perspective. While there have been numerous studies on hedging in general English (Lakoff, 1973; Hübler, 1983; Clemen, 1997; Markkanen and Schröder, 1997; Mauranen, 1997; Fetzer 2010; and Finnegan, 2010 among others) academic English (Crompton, 1997; Meyer, 1997; Skelton, 1997; Martín Butragueňo, 2003) scientific English (Hyland, 1996a, 1996c, 1998c, 2007; Grabe and Kaplan, 1997; Salager-Meyer, 1997 Varttala, 2001) medical English (Prince, 1982; Salager-Meyer, 1994; Skelton, 1997), and, to a lesser degree, legal English (Toska, 2012), this study is innovative in that it links the different realizations and functions of hedging to the generic characteristics of a particular professional communication. Within legal English, hedging has been found to depend on not only the macro-level expectations of the discourse community for a specific genre, but also on the micro-level intentions of the author of a communication, varying according to the educational, pedagogical, interpersonal or operative purposes the genre may have. The study highlights the predominance of epistemic modal verbs and lexical verbs as hedges, dividing the latter into four types (Hyland, 1998c; Palmer, 1986, 1990, 2001): speculative, quotative, deductive and sensorial. Lexical-grammatical realizations of hedges can signal one of four discourse strategies (Namsaraev, 1997; Salager-Meyer, 1994), indetermination, depersonalization, subjectivization and camouflage hedging, as well as fulfill a variety of functions. The identification and quantification of the different hedges and hedging strategies and functions in the two genres may have pedagogical implications for non-native law students who must demonstrate adequate competence in the production and interpretation of hedged discourse.
Resumo:
El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de la Internet de las Cosas, el comercio electrónico, las redes sociales, la telefonía móvil y la computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección y privacidad de la información y su contenido, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos o las comunicaciones electrónicas. Este hecho puede verse agravado por la falta de una frontera clara que delimite el mundo personal del mundo laboral en cuanto al acceso de la información. En todos estos campos de la actividad personal y laboral, la Criptografía ha jugado un papel fundamental aportando las herramientas necesarias para garantizar la confidencialidad, integridad y disponibilidad tanto de la privacidad de los datos personales como de la información. Por otro lado, la Biometría ha propuesto y ofrecido diferentes técnicas con el fin de garantizar la autentificación de individuos a través del uso de determinadas características personales como las huellas dáctilares, el iris, la geometría de la mano, la voz, la forma de caminar, etc. Cada una de estas dos ciencias, Criptografía y Biometría, aportan soluciones a campos específicos de la protección de datos y autentificación de usuarios, que se verían enormemente potenciados si determinadas características de ambas ciencias se unieran con vistas a objetivos comunes. Por ello es imperativo intensificar la investigación en estos ámbitos combinando los algoritmos y primitivas matemáticas de la Criptografía con la Biometría para dar respuesta a la demanda creciente de nuevas soluciones más técnicas, seguras y fáciles de usar que potencien de modo simultáneo la protección de datos y la identificacíón de usuarios. En esta combinación el concepto de biometría cancelable ha supuesto una piedra angular en el proceso de autentificación e identificación de usuarios al proporcionar propiedades de revocación y cancelación a los ragos biométricos. La contribución de esta tesis se basa en el principal aspecto de la Biometría, es decir, la autentificación segura y eficiente de usuarios a través de sus rasgos biométricos, utilizando tres aproximaciones distintas: 1. Diseño de un esquema criptobiométrico borroso que implemente los principios de la biometría cancelable para identificar usuarios lidiando con los problemas acaecidos de la variabilidad intra e inter-usuarios. 2. Diseño de una nueva función hash que preserva la similitud (SPHF por sus siglas en inglés). Actualmente estas funciones se usan en el campo del análisis forense digital con el objetivo de buscar similitudes en el contenido de archivos distintos pero similares de modo que se pueda precisar hasta qué punto estos archivos pudieran ser considerados iguales. La función definida en este trabajo de investigación, además de mejorar los resultados de las principales funciones desarrolladas hasta el momento, intenta extender su uso a la comparación entre patrones de iris. 3. Desarrollando un nuevo mecanismo de comparación de patrones de iris que considera tales patrones como si fueran señales para compararlos posteriormente utilizando la transformada de Walsh-Hadarmard. Los resultados obtenidos son excelentes teniendo en cuenta los requerimientos de seguridad y privacidad mencionados anteriormente. Cada uno de los tres esquemas diseñados han sido implementados para poder realizar experimentos y probar su eficacia operativa en escenarios que simulan situaciones reales: El esquema criptobiométrico borroso y la función SPHF han sido implementados en lenguaje Java mientras que el proceso basado en la transformada de Walsh-Hadamard en Matlab. En los experimentos se ha utilizado una base de datos de imágenes de iris (CASIA) para simular una población de usuarios del sistema. En el caso particular de la función de SPHF, además se han realizado experimentos para comprobar su utilidad en el campo de análisis forense comparando archivos e imágenes con contenido similar y distinto. En este sentido, para cada uno de los esquemas se han calculado los ratios de falso negativo y falso positivo. ABSTRACT The extraordinary increase of new information technologies, the development of Internet of Things, the electronic commerce, the social networks, mobile or smart telephony and cloud computing and storage, have provided great benefits in all areas of society. Besides this fact, there are new challenges for the protection and privacy of information and its content, such as the loss of confidentiality and integrity of electronic documents and communications. This is exarcebated by the lack of a clear boundary between the personal world and the business world as their differences are becoming narrower. In both worlds, i.e the personal and the business one, Cryptography has played a key role by providing the necessary tools to ensure the confidentiality, integrity and availability both of the privacy of the personal data and information. On the other hand, Biometrics has offered and proposed different techniques with the aim to assure the authentication of individuals through their biometric traits, such as fingerprints, iris, hand geometry, voice, gait, etc. Each of these sciences, Cryptography and Biometrics, provides tools to specific problems of the data protection and user authentication, which would be widely strengthen if determined characteristics of both sciences would be combined in order to achieve common objectives. Therefore, it is imperative to intensify the research in this area by combining the basics mathematical algorithms and primitives of Cryptography with Biometrics to meet the growing demand for more secure and usability techniques which would improve the data protection and the user authentication. In this combination, the use of cancelable biometrics makes a cornerstone in the user authentication and identification process since it provides revocable or cancelation properties to the biometric traits. The contributions in this thesis involve the main aspect of Biometrics, i.e. the secure and efficient authentication of users through their biometric templates, considered from three different approaches. The first one is designing a fuzzy crypto-biometric scheme using the cancelable biometric principles to take advantage of the fuzziness of the biometric templates at the same time that it deals with the intra- and inter-user variability among users without compromising the biometric templates extracted from the legitimate users. The second one is designing a new Similarity Preserving Hash Function (SPHF), currently widely used in the Digital Forensics field to find similarities among different files to calculate their similarity level. The function designed in this research work, besides the fact of improving the results of the two main functions of this field currently in place, it tries to expand its use to the iris template comparison. Finally, the last approach of this thesis is developing a new mechanism of handling the iris templates, considering them as signals, to use the Walsh-Hadamard transform (complemented with three other algorithms) to compare them. The results obtained are excellent taking into account the security and privacy requirements mentioned previously. Every one of the three schemes designed have been implemented to test their operational efficacy in situations that simulate real scenarios: The fuzzy crypto-biometric scheme and the SPHF have been implemented in Java language, while the process based on the Walsh-Hadamard transform in Matlab. The experiments have been performed using a database of iris templates (CASIA-IrisV2) to simulate a user population. The case of the new SPHF designed is special since previous to be applied i to the Biometrics field, it has been also tested to determine its applicability in the Digital Forensic field comparing similar and dissimilar files and images. The ratios of efficiency and effectiveness regarding user authentication, i.e. False Non Match and False Match Rate, for the schemes designed have been calculated with different parameters and cases to analyse their behaviour.
Resumo:
Saccharomyces cerevisiae is dimorphic and switches from a yeast form to a pseudohyphal (PH) form when starved for nitrogen. PH cells are elongated, bud in a unipolar manner, and invade the agar substrate. We assessed the requirements for actin in mediating the dramatic morphogenetic events that accompany the transition to PH growth. Twelve “alanine scan” alleles of the single yeast actin gene (ACT1) were tested for effects on filamentation, unipolar budding, agar invasion, and cell elongation. Some act1 mutations affect all phenotypes, whereas others affect only one or two aspects of PH growth. Tests of intragenic complementation among specific act1 mutations support the phenotypic evidence for multiple actin functions in filamentous growth. We present evidence that interaction between actin and the actin-binding protein fimbrin is important for PH growth and suggest that association of different actin-binding proteins with actin mediates the multiple functions of actin in filamentous growth. Furthermore, characterization of cytoskeletal structure in wild type and act1/act1 mutants indicates that PH cell morphogenesis requires the maintenance of a highly polarized actin cytoskeleton. Collectively, this work demonstrates that actin plays a central role in fungal dimorphism.
Resumo:
Although extensively studied biochemically, members of the Protein 4.1 superfamily have not been as well characterized genetically. Studies of coracle, a Drosophila Protein 4.1 homologue, provide an opportunity to examine the genetic functions of this gene family. coracle was originally identified as a dominant suppressor of EgfrElp, a hypermorphic form of the Drosophila Epidermal growth factor receptor gene. In this article, we present a phenotypic analysis of coracle, one of the first for a member of the Protein 4.1 superfamily. Screens for new coracle alleles confirm the null coracle phenotype of embryonic lethality and failure in dorsal closure, and they identify additional defects in the embryonic epidermis and salivary glands. Hypomorphic coracle alleles reveal functions in many imaginal tissues. Analysis of coracle mutant cells indicates that Coracle is a necessary structural component of the septate junction required for the maintenance of the transepithelial barrier but is not necessary for apical–basal polarity, epithelial integrity, or cytoskeletal integrity. In addition, coracle phenotypes suggest a specific role in cell signaling events. Finally, complementation analysis provides information regarding the functional organization of Coracle and possibly other Protein 4.1 superfamily members. These studies provide insights into a range of in vivo functions for coracle in developing embryos and adults.