989 resultados para corrective feedback


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Integrated master-oscillator power amplifiers driven under steady-state injection conditions are known to show a complex dynamics resulting in a variety of emission regimes. We present experimental results on the emission characteristics of a 1.5 µm distributed feedback tapered master-oscillator power-amplifier in a wide range of steady-state injection conditions, showing different dynamic behaviors. The study combines the optical and radio-frequency spectra recorded under different levels of injected current into the master oscillator and the power amplifier sections. Under low injection current of the master oscillator the correlation between the optical and radio-frequency spectral maps allows to identify operation regimes in which the device emission arises from either the master oscillator mode or from the compound cavity modes allowed by the residual reflectance of the amplifier front facet. The quasi-periodic occurrence of these emission regimes as a function of the amplifier current is interpreted in terms of a thermally tuned competition between the modes of the master oscillator and the compound cavity modes. Under high injection current of the masteroscillator, two different regimes alternate quasi-periodically as a function of the injected current in the power amplifier: a stable regime with a single mode emission at the master oscillator frequency, and an unstable and complex self-pulsating regime showing strong peaks in the radio-frequency spectra as well as multiple frequencies in the optical spectra.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Los algoritmos basados en registros de desplazamiento con realimentación (en inglés FSR) se han utilizado como generadores de flujos pseudoaleatorios en aplicaciones con recursos limitados como los sistemas de apertura sin llave. Se considera canal primario a aquel que se utiliza para realizar una transmisión de información. La aparición de los ataques de canal auxiliar (en inglés SCA), que explotan información filtrada inintencionadamente a través de canales laterales como el consumo, las emisiones electromagnéticas o el tiempo empleado, supone una grave amenaza para estas aplicaciones, dado que los dispositivos son accesibles por un atacante. El objetivo de esta tesis es proporcionar un conjunto de protecciones que se puedan aplicar de forma automática y que utilicen recursos ya disponibles, evitando un incremento sustancial en los costes y alargando la vida útil de aplicaciones que puedan estar desplegadas. Explotamos el paralelismo existente en algoritmos FSR, ya que sólo hay 1 bit de diferencia entre estados de rondas consecutivas. Realizamos aportaciones en tres niveles: a nivel de sistema, utilizando un coprocesador reconfigurable, a través del compilador y a nivel de bit, aprovechando los recursos disponibles en el procesador. Proponemos un marco de trabajo que nos permite evaluar implementaciones de un algoritmo incluyendo los efectos introducidos por el compilador considerando que el atacante es experto. En el campo de los ataques, hemos propuesto un nuevo ataque diferencial que se adapta mejor a las condiciones de las implementaciones software de FSR, en las que el consumo entre rondas es muy similar. SORU2 es un co-procesador vectorial reconfigurable propuesto para reducir el consumo energético en aplicaciones con paralelismo y basadas en el uso de bucles. Proponemos el uso de SORU2, además, para ejecutar algoritmos basados en FSR de forma segura. Al ser reconfigurable, no supone un sobrecoste en recursos, ya que no está dedicado en exclusiva al algoritmo de cifrado. Proponemos una configuración que ejecuta múltiples algoritmos de cifrado similares de forma simultánea, con distintas implementaciones y claves. A partir de una implementación sin protecciones, que demostramos que es completamente vulnerable ante SCA, obtenemos una implementación segura a los ataques que hemos realizado. A nivel de compilador, proponemos un mecanismo para evaluar los efectos de las secuencias de optimización del compilador sobre una implementación. El número de posibles secuencias de optimizaciones de compilador es extremadamente alto. El marco de trabajo propuesto incluye un algoritmo para la selección de las secuencias de optimización a considerar. Debido a que las optimizaciones del compilador transforman las implementaciones, se pueden generar automáticamente implementaciones diferentes combinamos para incrementar la seguridad ante SCA. Proponemos 2 mecanismos de aplicación de estas contramedidas, que aumentan la seguridad de la implementación original sin poder considerarse seguras. Finalmente hemos propuesto la ejecución paralela a nivel de bit del algoritmo en un procesador. Utilizamos la forma algebraica normal del algoritmo, que automáticamente se paraleliza. La implementación sobre el algoritmo evaluado mejora en rendimiento y evita que se filtre información por una ejecución dependiente de datos. Sin embargo, es más vulnerable ante ataques diferenciales que la implementación original. Proponemos una modificación del algoritmo para obtener una implementación segura, descartando parcialmente ejecuciones del algoritmo, de forma aleatoria. Esta implementación no introduce una sobrecarga en rendimiento comparada con las implementaciones originales. En definitiva, hemos propuesto varios mecanismos originales a distintos niveles para introducir aleatoridad en implementaciones de algoritmos FSR sin incrementar sustancialmente los recursos necesarios. ABSTRACT Feedback Shift Registers (FSR) have been traditionally used to implement pseudorandom sequence generators. These generators are used in Stream ciphers in systems with tight resource constraints, such as Remote Keyless Entry. When communicating electronic devices, the primary channel is the one used to transmit the information. Side-Channel Attack (SCA) use additional information leaking from the actual implementation, including power consumption, electromagnetic emissions or timing information. Side-Channel Attacks (SCA) are a serious threat to FSR-based applications, as an attacker usually has physical access to the devices. The main objective of this Ph.D. thesis is to provide a set of countermeasures that can be applied automatically using the available resources, avoiding a significant cost overhead and extending the useful life of deployed systems. If possible, we propose to take advantage of the inherent parallelism of FSR-based algorithms, as the state of a FSR differs from previous values only in 1-bit. We have contributed in three different levels: architecture (using a reconfigurable co-processor), using compiler optimizations, and at bit level, making the most of the resources available at the processor. We have developed a framework to evaluate implementations of an algorithm including the effects introduced by the compiler. We consider the presence of an expert attacker with great knowledge on the application and the device. Regarding SCA, we have presented a new differential SCA that performs better than traditional SCA on software FSR-based algorithms, where the leaked values are similar between rounds. SORU2 is a reconfigurable vector co-processor. It has been developed to reduce energy consumption in loop-based applications with parallelism. In addition, we propose its use for secure implementations of FSR-based algorithms. The cost overhead is discarded as the co-processor is not exclusively dedicated to the encryption algorithm. We present a co-processor configuration that executes multiple simultaneous encryptions, using different implementations and keys. From a basic implementation, which is proved to be vulnerable to SCA, we obtain an implementation where the SCA applied were unsuccessful. At compiler level, we use the framework to evaluate the effect of sequences of compiler optimization passes on a software implementation. There are many optimization passes available. The optimization sequences are combinations of the available passes. The amount of sequences is extremely high. The framework includes an algorithm for the selection of interesting sequences that require detailed evaluation. As existing compiler optimizations transform the software implementation, using different optimization sequences we can automatically generate different implementations. We propose to randomly switch between the generated implementations to increase the resistance against SCA.We propose two countermeasures. The results show that, although they increase the resistance against SCA, the resulting implementations are not secure. At bit level, we propose to exploit bit level parallelism of FSR-based implementations using pseudo bitslice implementation in a wireless node processor. The bitslice implementation is automatically obtained from the Algebraic Normal Form of the algorithm. The results show a performance improvement, avoiding timing information leakage, but increasing the vulnerability against differential SCA.We provide a secure version of the algorithm by randomly discarding part of the data obtained. The overhead in performance is negligible when compared to the original implementations. To summarize, we have proposed a set of original countermeasures at different levels that introduce randomness in FSR-based algorithms avoiding a heavy overhead on the resources required.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, a fuzzy feedback linearization is used to control nonlinear systems described by Takagi-Suengo (T-S) fuzzy systems. In this work, an optimal controller is designed using the linear quadratic regulator (LQR). The well known weighting parameters approach is applied to optimize local and global approximation and modelling capability of T-S fuzzy model to improve the choice of the performance index and minimize it. The approach used here can be considered as a generalized version of T-S method. Simulation results indicate the potential, simplicity and generality of the estimation method and the robustness of the proposed optimal LQR algorithm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Relatório final apresentado para a obtenção do grau de mestre em Ensino do 1.º ciclo e do 2.º ciclo do ensino básico

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The endogenous clock that drives circadian rhythms is thought to communicate temporal information within the cell via cycling downstream transcripts. A transcript encoding a glycine-rich RNA-binding protein, Atgrp7, in Arabidopsis thaliana undergoes circadian oscillations with peak levels in the evening. The AtGRP7 protein also cycles with a time delay so that Atgrp7 transcript levels decline when the AtGRP7 protein accumulates to high levels. After AtGRP7 protein concentration has fallen to trough levels, Atgrp7 transcript starts to reaccumulate. Overexpression of AtGRP7 in transgenic Arabidopsis plants severely depresses cycling of the endogenous Atgrp7 transcript. These data establish both transcript and protein as components of a negative feedback circuit capable of generating a stable oscillation. AtGRP7 overexpression also depresses the oscillation of the circadian-regulated transcript encoding the related RNA-binding protein AtGRP8 but does not affect the oscillation of transcripts such as cab or catalase mRNAs. We propose that the AtGRP7 autoregulatory loop represents a “slave” oscillator in Arabidopsis that receives temporal information from a central “master” oscillator, conserves the rhythmicity by negative feedback, and transduces it to the output pathway by regulating a subset of clock-controlled transcripts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A pseudoknot formed by a long-range interaction in the mRNA of the initiation factor 3 (IF3) operon is involved in the translational repression of the gene encoding ribosomal protein L35 by another ribosomal protein, L20. The nucleotides forming the 5′ strand of the key stem of the pseudoknot are located within the gene for IF3, whereas those forming the 3′ strand are located 280 nt downstream, immediately upstream of the Shine–Dalgarno sequence of the gene for L35. Here we show that premature termination of IF3 translation at a nonsense codon introduced upstream of the pseudoknot results in a substantial enhancement of L20-mediated repression of L35 expression. Conversely, an increase of IF3 translation decreases repression. These results, in addition to an analysis of the effect of mutations in sequences forming the pseudoknot, indicate that IF3 translation decreases L20-mediated repression of L35 expression. We propose that ribosomes translating IF3 disrupt the pseudoknot and thereby attenuate repression. The result is a novel type of translational coupling, where unfolding of the pseudoknot by ribosomes translating IF3 does not increase expression of L35 directly, but alleviates its repression by L20.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

© 2016 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited. Acknowledgments The authors thank H. H. Nguyen for his early development work on the BeeWatch interface; E. O'Mahony, I. Pearce, and R. Comont for identifying numerous photographed bumblebees; B. Darvill, D. Ewing, and G. Perkins for enabling our partnership with the Bumblebee Conservation Trust; and S. Blake for his investments in developing the NLG feedback. The study was part of the Digital Conservation project of dot.rural, the University of Aberdeen's Digital Economy Research Hub, funded by RCUK (grant reference EP/G066051/1).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Acknowledgments This paper was sponsored by the Spanish FPU12/00984 Program (Ministerio de Educacion, Cultura y Deporte). It was also sponsored by the Spanish Government Research Program with the Project DPI2012-37062-CO2-01 (Ministerio de Economia y Competitividad) and by the European Social Fund.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Understanding nuclear receptor signaling in vivo would be facilitated by an efficient methodology to determine where a nuclear receptor is active. Herein, we present a feedback-inducible expression system in transgenic mice to detect activated nuclear receptor effector proteins by using an inducible reporter gene. With this approach, reporter gene induction is not limited to a particular tissue, and, thus, this approach provides the opportunity for whole-animal screens. Furthermore, the effector and reporter genes are combined to generate a single strain of transgenic mice, which enables direct and rapid analysis of the offspring. The system was applied to localize sites where the retinoic acid receptor ligand-binding domain is activated in vivo. The results identify previously discovered sources of retinoids in the embryo and indicate the existence of previously undiscovered regions of retinoic acid receptor signaling in vivo. Notably, the feedback-inducible nuclear-receptor-driven assay, combined with an independent in vitro assay, provides evidence for a site of retinoid synthesis in the isthmic mesenchyme. These data illustrate the potential of feedback-inducible nuclear-receptor-driven analyses for assessing in vivo activation patterns of nuclear receptors and for analyzing pharmacological properties of natural and synthetic ligands of potential therapeutic value.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Progesterone (P) powerfully inhibits gonadotropin-releasing hormone (GnRH) secretion in ewes, as in other species, but the neural mechanisms underlying this effect remain poorly understood. Using an estrogen (E)-free ovine model, we investigated the immediate GnRH and luteinizing hormone (LH) response to acute manipulations of circulating P concentrations and whether this response was mediated by the nuclear P receptor. Simultaneous hypophyseal portal and jugular blood samples were collected over 36 hr: 0–12 hr, in the presence of exogenous P (P treatment begun 8 days earlier); 12–24 hr, P implant removed; 24–36 hr, P implant reinserted. P removal caused a significant rapid increase in the GnRH pulse frequency, which was detectable within two pulses (175 min). P insertion suppressed the GnRH pulse frequency even faster: the effect detectable within one pulse (49 min). LH pulsatility was modulated identically. The next two experiments demonstrated that these effects of P are mediated by the nuclear P receptor since intracerebroventricularly infused P suppressed LH release but 3α-hydroxy-5α-pregnan-20-one, which operates through the type A γ-aminobutyric acid receptor, was without effect and pretreatment with the P-receptor antagonist RU486 blocked the ability of P to inhibit LH. Our final study showed that P exerts its acute suppression of GnRH through an E-dependent system because the effects of P on LH secretion, lost after long-term E deprivation, are restored after 2 weeks of E treatment. Thus we demonstrate that P acutely inhibits GnRH through an E-dependent nuclear P-receptor system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The p53 tumor suppressor protein and the MDM2 oncoprotein form a feedback-control loop that up-regulates cellular MDM2 production, blocks p53 activity, and promotes p53 decay. tsg101 was discovered as a gene whose deficiency results in neoplastic transformation of NIH 3T3 cells and the ability to generate metastatic tumors in nude mice. Its protein product contains a domain, Ubc, characteristic of the catalytic domain of ubiquitin conjugase (E2) enzymes but lacking an active-site cysteine crucial for ubiquitin conjugase activity. Here we report that TSG101 participates with MDM2 in an autoregulatory loop that modulates the cellular levels of both proteins, and also of p53, by affecting protein decay. We show that the Ubc domain of TSG101 interferes with ubiquitination of MDM2, that TSG101 inhibits MDM2 decay and elevates its steady-state level, and that these events are associated with down-regulation of p53 protein. Conversely, pulse–chase and Western blot experiments in wild-type and mutant fibroblasts indicate that elevation of MDM2 by overexpression of wild-type p53, by amplification of the endogenous MDM2 gene, or by transfection of MDM2-expressing constructs promotes TSG101 loss, which we show occurs by 26S proteasome-dependent decay. Our results identify TSG101 as both a regulator of, and target of, MDM2/p53 circuitry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The RPN4 (SON1, UFD5) protein of the yeast Saccharomyces cerevisiae is required for normal levels of intracellular proteolysis. RPN4 is a transcriptional activator of genes encoding proteasomal subunits. Here we show that RPN4 is required for normal levels of these subunits. Further, we demonstrate that RPN4 is extremely short-lived (t1/2 ≈2 min), that it directly interacts with RPN2, a subunit of the 26S proteasome, and that rpn4Δ cells are perturbed in their cell cycle. The degradation signal of RPN4 was mapped to its N-terminal region, outside the transcription–activation domains of RPN4. The ability of RPN4 to augment the synthesis of proteasomal subunits while being metabolically unstable yields a negative feedback circuit in which the same protein up-regulates the proteasome production and is destroyed by the assembled active proteasome.