830 resultados para Stream Cipher, MUGI, MUGI-M, Key Initialization, Key Agility
Resumo:
Ca-amendments are routinely applied to improve acid soils, whilst no-tillage (NT) has been widely recommended in soils where traditional tillage (TT) has led to losses of organic matter. However, the potential interactions between the two treatments are only partially known. Our study was conducted on an annual forage crop agrosystem with a degraded Palexerult soil located in SW Spain, in order to assess if the combination of NT plus a Ca-amendment provides additional benefits to those of their separate use. To this end we analysed the effects of four different combinations of tillage and Ca-amendment on selected key soil properties, focusing on their relationships. The experimental design was a split-plot with four replicates. The main factor was tillage (NT versus TT) and the second factor was the application or not of a Ca-amendment, consisting of a mixture of sugar foam (SF) and red gypsum (RG). Soil samples were collected from 3 soil layers down to 50 cm after four years of treatment (2009). The use of the Ca-amendment improved pH and Al-toxicity down to 25 cm and increased exchangeable Ca2+ down to 50 cm, even under NT due to the combined effect of SF and RG. Both NT and the Ca-amendment had a beneficial effect on total organic carbon (TOC), especially on particulate organic carbon (POC), in the 0–5 cm layer, with the highest contents observed when both practices were combined. Unlike NT, the Ca-amendment failed to improve soil aggregation in spite of the carbon supplied. This carbon was not protected within the stable aggregates in the medium term, making it more susceptible to mineralization. We suggest that the fraction of Al extracted by oxalate from solid phase (AlOxa-Cu-K) and the glomalin-related soil proteins (GRSPs) are involved in the accumulation of carbon within water stable aggregates, probably through the formation of non-toxic stable Al-OM compounds, including those formed with GRSPs. NT alone decreased AlK in the 0–5 cm soil layer, possibly by increasing POC, TOC and GRSPs, which were observed to play a role in reducing Al toxicity. From our findings, the combination of NT and Ca-amendment appears to be the best management practice to improve chemical and physical characteristics of acid soils degraded by tillage.
Resumo:
El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de la Internet de las Cosas, el comercio electrónico, las redes sociales, la telefonía móvil y la computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección y privacidad de la información y su contenido, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos o las comunicaciones electrónicas. Este hecho puede verse agravado por la falta de una frontera clara que delimite el mundo personal del mundo laboral en cuanto al acceso de la información. En todos estos campos de la actividad personal y laboral, la Criptografía ha jugado un papel fundamental aportando las herramientas necesarias para garantizar la confidencialidad, integridad y disponibilidad tanto de la privacidad de los datos personales como de la información. Por otro lado, la Biometría ha propuesto y ofrecido diferentes técnicas con el fin de garantizar la autentificación de individuos a través del uso de determinadas características personales como las huellas dáctilares, el iris, la geometría de la mano, la voz, la forma de caminar, etc. Cada una de estas dos ciencias, Criptografía y Biometría, aportan soluciones a campos específicos de la protección de datos y autentificación de usuarios, que se verían enormemente potenciados si determinadas características de ambas ciencias se unieran con vistas a objetivos comunes. Por ello es imperativo intensificar la investigación en estos ámbitos combinando los algoritmos y primitivas matemáticas de la Criptografía con la Biometría para dar respuesta a la demanda creciente de nuevas soluciones más técnicas, seguras y fáciles de usar que potencien de modo simultáneo la protección de datos y la identificacíón de usuarios. En esta combinación el concepto de biometría cancelable ha supuesto una piedra angular en el proceso de autentificación e identificación de usuarios al proporcionar propiedades de revocación y cancelación a los ragos biométricos. La contribución de esta tesis se basa en el principal aspecto de la Biometría, es decir, la autentificación segura y eficiente de usuarios a través de sus rasgos biométricos, utilizando tres aproximaciones distintas: 1. Diseño de un esquema criptobiométrico borroso que implemente los principios de la biometría cancelable para identificar usuarios lidiando con los problemas acaecidos de la variabilidad intra e inter-usuarios. 2. Diseño de una nueva función hash que preserva la similitud (SPHF por sus siglas en inglés). Actualmente estas funciones se usan en el campo del análisis forense digital con el objetivo de buscar similitudes en el contenido de archivos distintos pero similares de modo que se pueda precisar hasta qué punto estos archivos pudieran ser considerados iguales. La función definida en este trabajo de investigación, además de mejorar los resultados de las principales funciones desarrolladas hasta el momento, intenta extender su uso a la comparación entre patrones de iris. 3. Desarrollando un nuevo mecanismo de comparación de patrones de iris que considera tales patrones como si fueran señales para compararlos posteriormente utilizando la transformada de Walsh-Hadarmard. Los resultados obtenidos son excelentes teniendo en cuenta los requerimientos de seguridad y privacidad mencionados anteriormente. Cada uno de los tres esquemas diseñados han sido implementados para poder realizar experimentos y probar su eficacia operativa en escenarios que simulan situaciones reales: El esquema criptobiométrico borroso y la función SPHF han sido implementados en lenguaje Java mientras que el proceso basado en la transformada de Walsh-Hadamard en Matlab. En los experimentos se ha utilizado una base de datos de imágenes de iris (CASIA) para simular una población de usuarios del sistema. En el caso particular de la función de SPHF, además se han realizado experimentos para comprobar su utilidad en el campo de análisis forense comparando archivos e imágenes con contenido similar y distinto. En este sentido, para cada uno de los esquemas se han calculado los ratios de falso negativo y falso positivo. ABSTRACT The extraordinary increase of new information technologies, the development of Internet of Things, the electronic commerce, the social networks, mobile or smart telephony and cloud computing and storage, have provided great benefits in all areas of society. Besides this fact, there are new challenges for the protection and privacy of information and its content, such as the loss of confidentiality and integrity of electronic documents and communications. This is exarcebated by the lack of a clear boundary between the personal world and the business world as their differences are becoming narrower. In both worlds, i.e the personal and the business one, Cryptography has played a key role by providing the necessary tools to ensure the confidentiality, integrity and availability both of the privacy of the personal data and information. On the other hand, Biometrics has offered and proposed different techniques with the aim to assure the authentication of individuals through their biometric traits, such as fingerprints, iris, hand geometry, voice, gait, etc. Each of these sciences, Cryptography and Biometrics, provides tools to specific problems of the data protection and user authentication, which would be widely strengthen if determined characteristics of both sciences would be combined in order to achieve common objectives. Therefore, it is imperative to intensify the research in this area by combining the basics mathematical algorithms and primitives of Cryptography with Biometrics to meet the growing demand for more secure and usability techniques which would improve the data protection and the user authentication. In this combination, the use of cancelable biometrics makes a cornerstone in the user authentication and identification process since it provides revocable or cancelation properties to the biometric traits. The contributions in this thesis involve the main aspect of Biometrics, i.e. the secure and efficient authentication of users through their biometric templates, considered from three different approaches. The first one is designing a fuzzy crypto-biometric scheme using the cancelable biometric principles to take advantage of the fuzziness of the biometric templates at the same time that it deals with the intra- and inter-user variability among users without compromising the biometric templates extracted from the legitimate users. The second one is designing a new Similarity Preserving Hash Function (SPHF), currently widely used in the Digital Forensics field to find similarities among different files to calculate their similarity level. The function designed in this research work, besides the fact of improving the results of the two main functions of this field currently in place, it tries to expand its use to the iris template comparison. Finally, the last approach of this thesis is developing a new mechanism of handling the iris templates, considering them as signals, to use the Walsh-Hadamard transform (complemented with three other algorithms) to compare them. The results obtained are excellent taking into account the security and privacy requirements mentioned previously. Every one of the three schemes designed have been implemented to test their operational efficacy in situations that simulate real scenarios: The fuzzy crypto-biometric scheme and the SPHF have been implemented in Java language, while the process based on the Walsh-Hadamard transform in Matlab. The experiments have been performed using a database of iris templates (CASIA-IrisV2) to simulate a user population. The case of the new SPHF designed is special since previous to be applied i to the Biometrics field, it has been also tested to determine its applicability in the Digital Forensic field comparing similar and dissimilar files and images. The ratios of efficiency and effectiveness regarding user authentication, i.e. False Non Match and False Match Rate, for the schemes designed have been calculated with different parameters and cases to analyse their behaviour.
Resumo:
Se estudian la influencia en el microclima de racimos (temperatura e iluminación) de tres sistemas de conducción en la variedad Syrah en una zona calida.
Resumo:
3-Isopropylmalate dehydrogenase (IPMDH, E.C. 1.1.1.85) from the thermophilic bacterium Thermus thermophilus HB8 is homologous to IPMDH from the mesophilic Escherichia coli, but has an approximately 17°C higher melting temperature. Its temperature optimum is 22–25°C higher than that of the E. coli enzyme; however, it is hardly active at room temperature. The increased conformational rigidity required to stabilize the thermophilic enzyme against heat denaturation might explain its different temperature-activity profile. Hydrogen/deuterium exchange studies were performed on this thermophilic-mesophilic enzyme pair to compare their conformational flexibilities. It was found that Th. thermophilus IPMDH is significantly more rigid at room temperature than E. coli IPMDH, whereas the enzymes have nearly identical flexibilities under their respective optimal working conditions, suggesting that evolutionary adaptation tends to maintain a “corresponding state” regarding conformational flexibility. These observations confirm that conformational fluctuations necessary for catalytic function are restricted at room temperature in the thermophilic enzyme, suggesting a close relationship between conformational flexibility and enzyme function.
Resumo:
The discovery of hyperthermophilic microorganisms and the analysis of hyperthermostable enzymes has established the fact that multisubunit enzymes can survive for prolonged periods at temperatures above 100°C. We have carried out homology-based modeling and direct structure comparison on the hexameric glutamate dehydrogenases from the hyperthermophiles Pyrococcus furiosus and Thermococcus litoralis whose optimal growth temperatures are 100°C and 88°C, respectively, to determine key stabilizing features. These enzymes, which are 87% homologous, differ 16-fold in thermal stability at 104°C. We observed that an intersubunit ion-pair network was substantially reduced in the less stable enzyme from T. litoralis, and two residues were then altered to restore these interactions. The single mutations both had adverse effects on the thermostability of the protein. However, with both mutations in place, we observed a fourfold improvement of stability at 104°C over the wild-type enzyme. The catalytic properties of the enzymes were unaffected by the mutations. These results suggest that extensive ion-pair networks may provide a general strategy for manipulating enzyme thermostability of multisubunit enzymes. However, this study emphasizes the importance of the exact local environment of a residue in determining its effects on stability.
Resumo:
Ribonucleotide reductases (RNRs) catalyze the conversion of nucleotides to deoxynucleotides. Class I RNRs are composed of two types of subunits: RNR1 contains the active site for reduction and the binding sites for the nucleotide allosteric effectors. RNR2 contains the diiron-tyrosyl radical (Y⋅) cofactor essential for the reduction process. Studies in yeast have recently identified four RNR subunits: Y1 and Y3, Y2 and Y4. These proteins have been expressed in Saccharomyces cerevisiae and in Escherichia coli and purified to ≈90% homogeneity. The specific activity of Y1 isolated from yeast and E. coli is 0.03 μmol⋅min−1⋅mg−1 and of (His)6-Y2 [(His)6-Y2-K387N] from yeast is 0.037 μmol⋅min−1⋅mg−1 (0.125 μmol⋅min−1⋅mg−1). Y2, Y3, and Y4 isolated from E. coli have no measurable activity. Efforts to generate Y⋅ in Y2 or Y4 using Fe2+, O2, and reductant have been unsuccessful. However, preliminary studies show that incubation of Y4 and Fe2+ with inactive E. coli Y2 followed by addition of O2 generates Y2 with a specific activity of 0.069 μmol⋅min−1⋅mg−1 and a Y⋅. A similar experiment with (His)6-Y2-K387N, Y4, O2, and Fe2+ results in an increase in its specific activity to 0.30 μmol⋅min−1⋅mg−1. Studies with antibodies to Y4 and Y2 reveal that they can form a complex in vivo. Y4 appears to play an important role in diiron-Y⋅ assembly of Y2.
Resumo:
Peer reviewed
Resumo:
Date of Acceptance: 06/05/2015 We thank the FORCE Consortium for funding this research, Rob Butler and Walter Wheeler for quality control on the global basin classification, and David MacDonald for reviewing an earlier draft of this manuscript. We also thank Gary Weissmann, Andrew Miall, Raymond Ingersoll, John Holbrook, Stephen Flint, and editor Ellen Thomas for their constructive reviews.
Resumo:
Triacylglycerols are quantitatively the most important storage form of energy for eukaryotic cells. Acyl CoA:diacylglycerol acyltransferase (DGAT, EC 2.3.1.20) catalyzes the terminal and only committed step in triacylglycerol synthesis, by using diacylglycerol and fatty acyl CoA as substrates. DGAT plays a fundamental role in the metabolism of cellular diacylglycerol and is important in higher eukaryotes for physiologic processes involving triacylglycerol metabolism such as intestinal fat absorption, lipoprotein assembly, adipose tissue formation, and lactation. DGAT is an integral membrane protein that has never been purified to homogeneity, nor has its gene been cloned. We identified an expressed sequence tag clone that shared regions of similarity with acyl CoA:cholesterol acyltransferase, an enzyme that also uses fatty acyl CoA as a substrate. Expression of a mouse cDNA for this expressed sequence tag in insect cells resulted in high levels of DGAT activity in cell membranes. No other acyltransferase activity was detected when a variety of substrates, including cholesterol, were used as acyl acceptors. The gene was expressed in all tissues examined; during differentiation of NIH 3T3-L1 cells into adipocytes, its expression increased markedly in parallel with increases in DGAT activity. The identification of this cDNA encoding a DGAT will greatly facilitate studies of cellular glycerolipid metabolism and its regulation.
Resumo:
Diverse roles in cellular functions have been ascribed to nitric oxide (NO), and its involvement in induction of long-term depression in cerebellar Purkinje cells has been demonstrated. Manipulations of NO concentration or its synthesis in cerebellar tissues therefore provide a means for investigating roles of NO in cerebellar functions at both cellular and behavioral levels. We tested adaptive control of locomotion to perturbation in cats, and found that this form of motor learning was abolished by application of either an inhibitor of NO synthase or a scavenger of NO to the cerebellar cortical locomotion area. This finding supports the view that NO in the cerebellum plays a key role in motor learning.