127 research outputs found
HP-sequence design for lattice proteins - an exact enumeration study on diamond as well as square lattice
We present an exact enumeration algorithm for identifying the {\it native}
configuration - a maximally compact self avoiding walk configuration that is
also the minimum energy configuration for a given set of contact-energy
schemes; the process is implicitly sequence-dependent. In particular, we show
that the 25-step native configuration on a diamond lattice consists of two
sheet-like structures and is the same for all the contact-energy schemes,
; on a square lattice also, the
24-step native configuration is independent of the energy schemes considered.
However, the designing sequence for the diamond lattice walk depends on the
energy schemes used whereas that for the square lattice walk does not. We have
calculated the temperature-dependent specific heat for these designed sequences
and the four energy schemes using the exact density of states. These data show
that the energy scheme is preferable to the other three for both
diamond and square lattice because the associated sequences give rise to a
sharp low-temperature peak. We have also presented data for shorter (23-, 21-
and 17-step) walks on a diamond lattice to show that this algorithm helps
identify a unique minimum energy configuration by suitably taking care of the
ground-state degeneracy. Interestingly, all these shorter target configurations
also show sheet-like secondary structures.Comment: 19 pages, 7 figures (eps), 11 tables (latex files
Recommended from our members
Secure communication using dynamic VPN provisioning in an Inter-Cloud environment
Most of the current cloud computing platforms offer Infrastructure as a Service (IaaS) model, which aims to provision basic virtualised computing resources as on-demand and dynamic services. Nevertheless, a single cloud does not have limitless resources to offer to its users, hence the notion of an Inter-Cloud enviroment where a cloud can use the infrastructure resources of other clouds. However, there is no common framework in existence that allows the srevice owners to seamlessly provision even some basic services across multiple cloud service providers, albeit not due to any inherent incompatibility or proprietary nature of the foundation technologies on which these cloud platforms are built. In this paper we present a novel solution which aims to cover a gap in a subsection of this problem domain. Our solution offer a security architecture that enables service owners to provision a dynamic and service-oriented secure virtual private network on top of multiple cloud IaaS providers. It does this by leveraging the scalability, robustness and flexibility of peer- to-peer overlay techniques to eliminate the manual configuration, key management and peer churn problems encountered in setting up the secure communication channels dynamically, between different components of a typical service that is deployed on multiple clouds. We present the implementation details of our solution as well as experimental results carried out on two commercial clouds
Recommended from our members
Dynamic virtual private network provisioning from multiple cloud infrastructure service providers
The Cloud infrastructure service providers currently provision basic virtualized computing resources as on demand and dynamic services but there is no common framework in existence that allows the seamless provisioning of even these basic services across multiple cloud service providers, although this is not due to any inherent incompatibility or proprietary nature of the foundation technologies on which these cloud platforms are built. We present a solution idea which aims to provide a dynamic and service oriented provisioning of secure virtual private networks on top of multiple cloud infrastructure service providers. This solution leverages the benefits of peer to peer overlay networks, i.e., the flexibility and scalability to handle the churn of nodes joining and leaving the VPNs and can adapt the topology of the VPN as per the requirements of the applications utilizing its intercloud secure communication framework
Recommended from our members
Trust Model for Optimized Cloud Services
Cloud computing with its inherent advantages draws attention for business critical applications, but concurrently expects high level of trust in cloud service providers. Reputation-based trust is emerging as a good choice to model trust of cloud service providers based on available evidence. Many existing reputation based systems either ignore or give less importance to uncertainty linked with the evidence. In this paper, we propose an uncertainty model and define our approach to compute opinion for cloud service providers. Using subjective logic operators along with the computed opinion values, we propose mechanisms to calculate the reputation of cloud service providers. We evaluate and compare our proposed model with existing reputation models
Recommended from our members
R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search. Such attribute enabled searchable encryption is most suitable for applications where the changing of privileges is done once in a while. However, to date, no efficient and secure scheme is available in the literature that is suitable for these applications where changing privileges are done frequently. In this paper our contributions are twofold. Firstly, we propose a new PEKS scheme for string search, which, unlike the previous constructions, is free from bi-linear mapping and is efficient by 97% compared to PEKS for string search proposed by Ray et.al in TrustCom 2017. Secondly, we introduce role based access control (RBAC) to multi-user PEKS, where an arbitrary group of users can search and access the encrypted files depending upon roles. We termed this integrated scheme as R-PEKS. The efficiency of R-PEKS over the PEKS scheme is up to 90%. We provide formal security proofs for the different components of R-PEKS and validate these schemes using a commercial dataset
Recommended from our members
Opinion Model Based Security Reputation Enabling Cloud Broker Architecture
catena-Poly[ammonium (cadmium-tri-μ-thioÂcyanato-κ4 S:N;κ2 N:S)–1,4,10,13,16-hexaÂoxaÂcycloÂoctaÂdecane (1/1)]
In the title compound, {(NH4)[Cd(NCS)3]·C12H24O6}n, the Cd2+ ion, the ammonium cation, one of the SCN− ligands and the macrocycle are located on mirror planes. The thiocyanate anions act as bridging ligands between the CdII ions, leading to a polymeric chain arrangement extending along [001] around a twofold screw axis. The ammonium ions are contained within the bowl of the macrocycle via extensive N—H⋯O hydrogen bonding
Recommended from our members
Host Based Intrusion Detection for VANETs: A statistical approach to Rogue Node Detection
In this paper, an intrusion detection system (IDS) for vehicular ad hoc networks (VANETs) is proposed and evaluated. The IDS is evaluated by simulation in the presence of rogue nodes (RNs) that can launch different attacks. The proposed IDS is capable of detecting a false information attack using statistical techniques effectively and can also detect other types of attacks. First, the theory and implementation of the VANET model that is used to train the IDS is discussed. Then, an extensive simulation and analysis of our model under different traffic conditions is conducted to identify the effects of these parameters in VANETs. In addition, the extensive data gathered in the simulations are presented using graphical and statistical techniques. Moreover, RNs are introduced in the network, and an algorithm is presented to detect these RNs. Finally, we evaluate our system and observe that the proposed application-layer IDS based on a cooperative information exchange mechanism is better for dynamic and fast-moving networks such as VANETs, as compared with other techniques available
- …