952 resultados para Signature
Resumo:
Kargl, Florian; Meyer, A.; Koza, M.M.; Schober, H., (2006) 'Formation of channels for fast-ion diffusion in alkali silicate melts: A quasielastic neutron scattering study', Physical Review B: Condensed Matter and Materials Physics 74 pp.14304 RAE2008
Resumo:
Musculoskeletal ageing is associated with profound morphological and functional changes that increase fall risk and disease incidence and is characterised by age-related reductions in motor unit number and atrophy of muscle fibres, particularly type II fibres. Decrements in functional strength and power are relatively modest until the 6th decade, after which the rate of loss exponentially accelerates, particularly beyond the 8th decade of life. Physical activity is a therapeutic modality that can significantly attenuate age-related decline. The underlying signature of ageing, as manifested by perturbed redox homeostasis, leads to a blunting of acute and chronic redox regulated exercise adaptations. Impaired redox regulated exercise adaptations are mechanistically related to altered exercise-induced reactive oxygen and nitrogen species generation and a resultant failure to properly activate redox regulated signaling cascades. Despite the aforementioned specific impairment in redox signaling, exercise induces a plethora of beneficial effects, irrespective of age. There is, therefore, strong evidence for promoting regular physical exercise, especially progressive resistance training as a lifelong habitual practice.
Resumo:
This paper analyzes different experiences of space by which memory of Holocaust could be passed on. The Memorial for the murdered Jews of Europe in Berlin gives visitors the feeling of insecurity and overwhelms them with monumentality. For that reason it is criticized as reflecting the other side of German memory: The Third Reich’s megalomania and dream about power. The Hamburger memorial against fascism designed in 1986 by conceptual artists Jochen and Esther Gerz offers quite an opposite experience of space. A twelve-meter-high pillar has been established for visitors to sign on it. Once the area was covered by signature it was lowered into the ground till it completely disappeared. The intention of the artists was to put memory not into the monument but into people. Pozdrowienia z Alej Jerozolimskich (Greetings from the Jerusalem Avenue, 2002) by Joanna Rajkowska – a fifteen-meter tall artificial palm tree installed in the centre of Warsaw – is an attempt to infuse with Israel's scenery a Warsaw's street whose name and history sends the observer to the history of the Jews in Poland. In another work called Dotleniacz (Oxygenator, 2007) Rajkowska created an artificial lake with oxygen concentrators, gold fish, flowers and banks. Again, the installation was placed in a very meaningful place – Grzybowski Square – which is strongly connected with Jewish life in Poland as well as Polish anti-Semitism. The synagogue in Poznan was transformed during the Nazi occupation into a swimming pool which it has remained until the present day. This fact ( just like the building) seems to be invisible for most citizens. In 2003 Rafał Jakubowicz changed the fact by projecting a Hebrew inscription הייחש-תכירב (swimming pool) on the façade of the former synagogue. In Berek (The Game of Tag, 1999) by Artur Żmijewski a group of naked men and women of various age play tag. The artist filmed them in two rooms: in a symbolically neutral space and in a gas chamber of a former Nazi death camp. The film is an attempt at breaking the spell of this horrifying and paralysing space.
Resumo:
Wydział Biologii: Instytut Biologii Molekularnej i Biotechnologii
Resumo:
BACKGROUND:Recent advances in genome sequencing suggest a remarkable conservation in gene content of mammalian organisms. The similarity in gene repertoire present in different organisms has increased interest in studying regulatory mechanisms of gene expression aimed at elucidating the differences in phenotypes. In particular, a proximal promoter region contains a large number of regulatory elements that control the expression of its downstream gene. Although many studies have focused on identification of these elements, a broader picture on the complexity of transcriptional regulation of different biological processes has not been addressed in mammals. The regulatory complexity may strongly correlate with gene function, as different evolutionary forces must act on the regulatory systems under different biological conditions. We investigate this hypothesis by comparing the conservation of promoters upstream of genes classified in different functional categories.RESULTS:By conducting a rank correlation analysis between functional annotation and upstream sequence alignment scores obtained by human-mouse and human-dog comparison, we found a significantly greater conservation of the upstream sequence of genes involved in development, cell communication, neural functions and signaling processes than those involved in more basic processes shared with unicellular organisms such as metabolism and ribosomal function. This observation persists after controlling for G+C content. Considering conservation as a functional signature, we hypothesize a higher density of cis-regulatory elements upstream of genes participating in complex and adaptive processes.CONCLUSION:We identified a class of functions that are associated with either high or low promoter conservation in mammals. We detected a significant tendency that points to complex and adaptive processes were associated with higher promoter conservation, despite the fact that they have emerged relatively recently during evolution. We described and contrasted several hypotheses that provide a deeper insight into how transcriptional complexity might have been emerged during evolution.
Resumo:
Material discrimination based on conventional or dual energy X-ray computed tomography (CT) imaging can be ambiguous. X-ray diffraction imaging (XDI) can be used to construct diffraction profiles of objects, providing new molecular signature information that can be used to characterize the presence of specific materials. Combining X-ray CT and diffraction imaging can lead to enhanced detection and identification of explosives in luggage screening. In this work we are investigating techniques for joint reconstruction of CT absorption and X-ray diffraction profile images of objects to achieve improved image quality and enhanced material classification. The initial results have been validated via simulation of X-ray absorption and coherent scattering in 2 dimensions.
Resumo:
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div can determine whether one of them was generated by the forger. Surprisingly, this is possible even after the adversary has inconspicuously learned (exposed) some-or even all-the secrets in the system. In this case, it might be impossible to tell which signature is generated by the legitimate signer and which by the forger. But at least the fact of the tampering will be made evident. We define several variants of tamper-evidence, differing in their power to detect tampering. In all of these, we assume an equally powerful adversary: she adaptively controls all the inputs to the legitimate signer (i.e., all messages to be signed and their timing), and observes all his outputs; she can also adaptively expose all the secrets at arbitrary times. We provide tamper-evident schemes for all the variants and prove their optimality. Achieving the strongest tamper evidence turns out to be provably expensive. However, we define a somewhat weaker, but still practical, variant: α-synchronous tamper-evidence (α-te) and provide α-te schemes with logarithmic cost. Our α-te schemes use a combinatorial construction of α-separating sets, which might be of independent interest. We stress that our mechanisms are purely cryptographic: the tamper-detection algorithm Div is stateless and takes no inputs except the two signatures (in particular, it keeps no logs), we use no infrastructure (or other ways to conceal additional secrets), and we use no hardware properties (except those implied by the standard cryptographic assumptions, such as random number generators). Our constructions are based on arbitrary ordinary signature schemes and do not require random oracles.
Resumo:
SyNAPSE program of the Defense Advanced Projects Research Agency (HRL Laboratories LLC, subcontract #801881-BS under DARPA prime contract HR0011-09-C-0001); CELEST, a National Science Foundation Science of Learning Center (SBE-0354378)
Resumo:
In this thesis we relate the formal description of various cold atomic systems in the energy eigenbasis, to the observable spatial mode dynamics. Herein the `spatial mode dynamics' refers to the direction of photon emission following the spontaneous emission of an excited fermion in the presence of a same species and spin ideal anisotropic Fermi sea in its internal ground state. Due to the Pauli principle, the presence of the ground state Fermi sea renders the phase space, anisotropic and only partially accessible, thereby a ecting the direction of photon emission following spontaneous emission. The spatial and energetic mode dynamics also refers to the quantum `tunneling' interaction between localised spatial modes, synonymous with double well type potentials. Here we relate the dynamics of the wavefunction in both the energetic and spatial representations. Using this approach we approximate the relationship between the spatial and energetic representations of a wavefunction spanning three spatial and energetic modes. This is extended to a process known as Spatial Adiabatic Passage, which is a technique to transport matter waves between localised spatial modes. This approach allows us to interpret the transport of matter waves as a signature of a geometric phase acquired by the one of the internal energy eigenstates of the system during the cyclical evolution. We further show that this geometric phase may be used to create spatial mode qubit and qutrit states.
Resumo:
Buried heat sources can be investigated by examining thermal infrared images and comparing these with the results of theoretical models which predict the thermal anomaly a given heat source may generate. Key factors influencing surface temperature include the geometry and temperature of the heat source, the surface meteorological environment, and the thermal conductivity and anisotropy of the rock. In general, a geothermal heat flux of greater than 2% of solar insolation is required to produce a detectable thermal anomaly in a thermal infrared image. A heat source of, for example, 2-300K greater than the average surface temperature must be a t depth shallower than 50m for the detection of the anomaly in a thermal infrared image, for typical terrestrial conditions. Atmospheric factors are of critical importance. While the mean atmospheric temperature has little significance, the convection is a dominant factor, and can act to swamp the thermal signature entirely. Given a steady state heat source that produces a detectable thermal anomaly, it is possible to loosely constrain the physical properties of the heat source and surrounding rock, using the surface thermal anomaly as a basis. The success of this technique is highly dependent on the degree to which the physical properties of the host rock are known. Important parameters include the surface thermal properties and thermal conductivity of the rock. Modelling of transient thermal situations was carried out, to assess the effect of time dependant thermal fluxes. One-dimensional finite element models can be readily and accurately applied to the investigation of diurnal heat flow, as with thermal inertia models. Diurnal thermal models of environments on Earth, the Moon and Mars were carried out using finite elements and found to be consistent with published measurements. The heat flow from an injection of hot lava into a near surface lava tube was considered. While this approach was useful for study, and long term monitoring in inhospitable areas, it was found to have little hazard warning utility, as the time taken for the thermal energy to propagate to the surface in dry rock (several months) in very long. The resolution of the thermal infrared imaging system is an important factor. Presently available satellite based systems such as Landsat (resolution of 120m) are inadequate for detailed study of geothermal anomalies. Airborne systems, such as TIMS (variable resolution of 3-6m) are much more useful for discriminating small buried heat sources. Planned improvements in the resolution of satellite based systems will broaden the potential for application of the techniques developed in this thesis. It is important to note, however, that adequate spatial resolution is a necessary but not sufficient condition for successful application of these techniques.
Resumo:
With the rapid growth of the Internet and digital communications, the volume of sensitive electronic transactions being transferred and stored over and on insecure media has increased dramatically in recent years. The growing demand for cryptographic systems to secure this data, across a multitude of platforms, ranging from large servers to small mobile devices and smart cards, has necessitated research into low cost, flexible and secure solutions. As constraints on architectures such as area, speed and power become key factors in choosing a cryptosystem, methods for speeding up the development and evaluation process are necessary. This thesis investigates flexible hardware architectures for the main components of a cryptographic system. Dedicated hardware accelerators can provide significant performance improvements when compared to implementations on general purpose processors. Each of the designs proposed are analysed in terms of speed, area, power, energy and efficiency. Field Programmable Gate Arrays (FPGAs) are chosen as the development platform due to their fast development time and reconfigurable nature. Firstly, a reconfigurable architecture for performing elliptic curve point scalar multiplication on an FPGA is presented. Elliptic curve cryptography is one such method to secure data, offering similar security levels to traditional systems, such as RSA, but with smaller key sizes, translating into lower memory and bandwidth requirements. The architecture is implemented using different underlying algorithms and coordinates for dedicated Double-and-Add algorithms, twisted Edwards algorithms and SPA secure algorithms, and its power consumption and energy on an FPGA measured. Hardware implementation results for these new algorithms are compared against their software counterparts and the best choices for minimum area-time and area-energy circuits are then identified and examined for larger key and field sizes. Secondly, implementation methods for another component of a cryptographic system, namely hash functions, developed in the recently concluded SHA-3 hash competition are presented. Various designs from the three rounds of the NIST run competition are implemented on FPGA along with an interface to allow fair comparison of the different hash functions when operating in a standardised and constrained environment. Different methods of implementation for the designs and their subsequent performance is examined in terms of throughput, area and energy costs using various constraint metrics. Comparing many different implementation methods and algorithms is nontrivial. Another aim of this thesis is the development of generic interfaces used both to reduce implementation and test time and also to enable fair baseline comparisons of different algorithms when operating in a standardised and constrained environment. Finally, a hardware-software co-design cryptographic architecture is presented. This architecture is capable of supporting multiple types of cryptographic algorithms and is described through an application for performing public key cryptography, namely the Elliptic Curve Digital Signature Algorithm (ECDSA). This architecture makes use of the elliptic curve architecture and the hash functions described previously. These components, along with a random number generator, provide hardware acceleration for a Microblaze based cryptographic system. The trade-off in terms of performance for flexibility is discussed using dedicated software, and hardware-software co-design implementations of the elliptic curve point scalar multiplication block. Results are then presented in terms of the overall cryptographic system.
Resumo:
Along with the growing demand for cryptosystems in systems ranging from large servers to mobile devices, suitable cryptogrophic protocols for use under certain constraints are becoming more and more important. Constraints such as calculation time, area, efficiency and security, must be considered by the designer. Elliptic curves, since their introduction to public key cryptography in 1985 have challenged established public key and signature generation schemes such as RSA, offering more security per bit. Amongst Elliptic curve based systems, pairing based cryptographies are thoroughly researched and can be used in many public key protocols such as identity based schemes. For hardware implementions of pairing based protocols, all components which calculate operations over Elliptic curves can be considered. Designers of the pairing algorithms must choose calculation blocks and arrange the basic operations carefully so that the implementation can meet the constraints of time and hardware resource area. This thesis deals with different hardware architectures to accelerate the pairing based cryptosystems in the field of characteristic two. Using different top-level architectures the hardware efficiency of operations that run at different times is first considered in this thesis. Security is another important aspect of pairing based cryptography to be considered in practically Side Channel Analysis (SCA) attacks. The naively implemented hardware accelerators for pairing based cryptographies can be vulnerable when taking the physical analysis attacks into consideration. This thesis considered the weaknesses in pairing based public key cryptography and addresses the particular calculations in the systems that are insecure. In this case, countermeasures should be applied to protect the weak link of the implementation to improve and perfect the pairing based algorithms. Some important rules that the designers must obey to improve the security of the cryptosystems are proposed. According to these rules, three countermeasures that protect the pairing based cryptosystems against SCA attacks are applied. The implementations of the countermeasures are presented and their performances are investigated.
Resumo:
Communication is important for social and other behavioural interactions in most marine mammal species. The bottlenose dolphin (Tursiops truncatus, Montagu, 1821) is a highly social species that use whistles as communication calls to express identity and to initiate and maintain contact between socially interactive individuals. In this thesis, the degree of variability in whistle behaviour and whistle characteristics was examined between different habitats on a range of spatial scales. The whistle characteristics that best discriminated between different communities were investigated, along with exploration of whistle variation in relation to habitat type, levels of social interaction and relatedness. Finally, the use and variability of individually distinctive calls (signature whistles) within and between Irish and US waters were also examined. Relatively high levels of whistle variation were found within a genetically and socially isolated population of dolphins in the Shannon Estuary, reflecting the need for individual identification and distinctive whistles in a population with long term site fidelity and high levels of social cohesion. Variation between reproductively separate communities in Irish waters was relatively small except between animals in inshore compared with continental shelf waters. The greatest differences in whistle structure overall were evident between dolphins using inshore and offshore US waters, likely reflecting social isolation of the two distinct ecotypes that occur in these waters but also variation in behaviour or habitat conditions. Variation found among inshore communities in US waters reflected similarities in habitat use and levels of social interaction. These findings suggest that vocal variation is socially mediated, behaviourally maintained and dependent on levels of social contact between individuals. The findings contribute to our understanding of the interaction of factors influencing vocalisation behaviour in this behaviourally complex and ecologically plastic species.
Resumo:
In the field of embedded systems design, coprocessors play an important role as a component to increase performance. Many embedded systems are built around a small General Purpose Processor (GPP). If the GPP cannot meet the performance requirements for a certain operation, a coprocessor can be included in the design. The GPP can then offload the computationally intensive operation to the coprocessor; thus increasing the performance of the overall system. A common application of coprocessors is the acceleration of cryptographic algorithms. The work presented in this thesis discusses coprocessor architectures for various cryptographic algorithms that are found in many cryptographic protocols. Their performance is then analysed on a Field Programmable Gate Array (FPGA) platform. Firstly, the acceleration of Elliptic Curve Cryptography (ECC) algorithms is investigated through the use of instruction set extension of a GPP. The performance of these algorithms in a full hardware implementation is then investigated, and an architecture for the acceleration the ECC based digital signature algorithm is developed. Hash functions are also an important component of a cryptographic system. The FPGA implementation of recent hash function designs from the SHA-3 competition are discussed and a fair comparison methodology for hash functions presented. Many cryptographic protocols involve the generation of random data, for keys or nonces. This requires a True Random Number Generator (TRNG) to be present in the system. Various TRNG designs are discussed and a secure implementation, including post-processing and failure detection, is introduced. Finally, a coprocessor for the acceleration of operations at the protocol level will be discussed, where, a novel aspect of the design is the secure method in which private-key data is handled
Resumo:
Despite increased application of commensal bacteria for attempting to improve the symptoms of a variety of inflammatory conditions, including inflammatory bowel diseases, diarrhoea and irritable bowel syndrome, therapeutic approaches that involve live bacteria are hampered by a limited understanding of bacterium-host interactions. Lactobacilli are natural inhabitants of the mammalian gastrointestinal tract and many lactobacilli are regarded as probiotics meaning that they exert a beneficial influence on the health status of their consumers. Modulation of immune responses is a plausible mechanism underlying these beneficial effects. The aim of this thesis was to investigate the effect of 33 Lactobacillus salivarius strains on the production of inflammatory cytokines from a variety of human and mouse immune cells. Induction of immune responses in vitro was shown to be bacterial- and mouse strain-dependent, cell type-dependent, blood donor-dependent and bacterial cell number-dependent. Collectively, these data suggest the importance of a case-by-case selection of candidate strains for their potential therapeutic application. Toll-like receptors (TLRs) recognize microbe-associated molecular patterns (MAMPs) and play a critical role in shaping microbial-specific innate and adaptive immune responses. Following ligand engagement, TLRs trigger a complex network of signalling that culminate in the production of inflammatory mediators. The investigation of the molecular mechanisms underlying the Lb. salivarius-host interaction resulted in the identification of a novel role for TLR2 in negatively regulating TLR4 signalling originated from subcellular compartments within macrophages. Notably, sustained activation of JAK/STAT cascade and M1-signature genes in TLR2-/- macrophages was ablated by selective TLR4 and JAK inhibitors and by absence of TLR4 in TLR2/4-/- cells. In addition, other negative regulators of TLR signalling triggered by Lb. salivarius strains were found to be the adapter molecules TIRAP and TRIF. Understanding negative regulation of TLR signalling may pave the way for the development of novel therapeutics to limit inflammation in multiple diseases.