967 resultados para LIGAND DOMAIN
Resumo:
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches. The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.
Resumo:
First-order temporal logic is a concise and powerful notation, with many potential applications in both Computer Science and Artificial Intelligence. While the full logic is highly complex, recent work on monodic first-order temporal logics has identified important enumerable and even decidable fragments. In this paper, we develop a clausal resolution method for the monodic fragment of first-order temporal logic over expanding domains. We first define a normal form for monodic formulae and then introduce novel resolution calculi that can be applied to formulae in this normal form. We state correctness and completeness results for the method. We illustrate the method on a comprehensive example. The method is based on classical first-order resolution and can, thus, be efficiently implemented.
Resumo:
In the domain of aerospace aftermarkets, which often has long supply chains that feed into the maintenance of aircraft, contracts are used to establish agreements between aircraft operators and maintenance suppliers. However, violations at the bottom of the supply chain (part suppliers) can easily cascade to the top (aircraft operators), making it difficult to determine the source of the violation, and seek to address it. In this context, we have developed a global monitoring architecture that ensures the detection of norm violations and generates explanations for the origin of violations. In this paper, we describe the implementation and deployment of a global monitor in the aerospace domain of [8] and show how it generates explanations for violations within the maintenance supply chain. We show how these explanations can be used not only to detect violations at runtime, but also to uncover potential problems in contracts before their deployment, thus improving them.
Resumo:
To date there are no analytical techniques designed to exclusively measure bioavailable iron in marine environments. The goal of this research is to develop such a technique by isolating the bioavailable iron using the terrestrial siderophore desferrioxamine B (DFB). This project contained many challenging aspects, but the specific goal of this study was to develop a robust analytical technique for quantification of Fe(III)-DFB complexes at nanomolar concentrations. Past work showed that oxalate (Ox) promotes photodissociation of Fe(III)-DFB to Fe(Il), and we are specifically interested in the mechanism of this process. A model was developed using known thermodynamic constants for Fe(III)-DFB and Fe(III) oxalato complexes and adjusting for ionic strength. The model was confirmed by monitoring the UV-VIS absorbance of the system at a variety of oxalate concentrations and pH. The model did not include ternary complexes. Next., the rate of Fe(1I) production during UV irradiation was examined. The results showed that the rate of Fe(II) production was based entirely on the [Fe(Ox)?]3- speciation, and that reoxidation of Fe(II) occurred via reactive oxygen intermediates. This reoxidation could be avoided by either decreasing the oxygen concentration or by adding a Fe(II) stabilizing reagent, such as ferrozine. Further studies need to be done to confirm that these results apply at sub nanomolar concentrations, and the issue of Fe(II) reoxidation at lower Fe concentrations needs to be addressed.
Resumo:
Diepoxybutane (DEB), a known industrial carcinogen, reacts with DNA primarily at the N7 position of deoxyguanosine residues and creates interstrand cross-links at the sequence 5'-GNC. Since N7-N7 cross-links cause DNA to fragment upon heating, quantative polymerase chain reaction (QPCR) is being used in this experiment to measure the amount of DEB damage (lesion frequency) with three different targets-mitochondrial (unpackaged), open chromatin region, and closed chromatin region. Initial measurements of DEB damage within these three targets were not consistent because the template DNA was not the limiting reagent in the PCR. Follow-up PCR trials using a limiting amount of DNA are still in progress although initial experimentation looks promising. Sequencing of these three targets to confirm the primer targets has only been successfully performed for the closed chromatin target and does not match the sequence from NIH used to design that primer pair. Further sequencing trials need to be conducted on all three targets to assure that a mitochondrial, open chromatin, and closed chromatin region are actually being amplified in this experimental series.