9,858 research outputs found

    Anonymous network access using the digital marketplace

    Get PDF
    With increasing usage of mobile telephony, and the trend towards additional mobile Internet usage, privacy and anonymity become more and more important. Previously-published anonymous communication schemes aim to obscure their users' network addresses, because real-world identity can be easily be derived from this information. We propose modifications to a novel call-management architecture, the digital marketplace, which will break this link, therefore enabling truly anonymous network access

    The DSN programming system

    Get PDF
    The Deep Space Network programming system is described by a heuristic model. Interaction with two elements of that system, anomaly reporting and the MBASIC (trademark) language, is described in detail. Feedback from anomaly reporting indicates that the methodology resulted in a low anomaly rate and thereby also provided positive feedback. The need to reduce operating costs prompted the implementation of the MBASIC (trademark) language as a compiler

    Mobile distributed authentication protocol

    Get PDF
    Networks access control is a crucial topic and authentication is a pre-requisite of that process. Most existing authentication protocols (for example that used in the GSM mobile network) are centralised. Depending on a single entity is undesirable as it has security, trust and availability issues. This paper proposes a new protocol, GSM-secure network access protocol (G-SNAP). In G-SNAP, the authentication procedure and network access control is handled by a quorum of authentication centres. The advantages of the novel protocol include increased security, availability and distributed trust

    The Euclid-Mullin graph

    Get PDF
    We introduce the Euclid-Mullin graph, which encodes all instances of Euclid's proof of the infinitude of primes. We investigate structural properties of the graph both theoretically and numerically; in particular, we prove that it is not a tree.Comment: 24 pages, 2 figures, to appear in Journal of Number Theor

    Fracture surface characteristics of notched angleplied graphite/epoxy composites

    Get PDF
    Composite fracture surface characteristics and related fracture modes have been investigated through extensive microscopic inspections of the fracture surfaces of notched angleplied graphite/epoxy laminates. The investigation involved 4 ply laminates of the configuration + or - theta (s) where theta = 0 deg, 3 deg, 5 deg, 10 deg, 15 deg, 30 deg, 45 deg, 60 deg, 75 deg, and 90 deg. Two-inch wide tensile specimens with 0.25 in. by 0.05 in. through-slits centered across the width were tested to fracture. The fractured surfaces were then removed and examined using a scanning electron microscope. Evaluation of the photomicrographs combined with analytical results obtained using the CODSTRAN computer code culminated in a unified set of fracture criteria for determining the mode of fracture in notched angleplied graphite/epoxy laminates

    Management system requirements for wireless systems beyond 3G

    Get PDF
    This paper presents a comprehensive description of various management system requirements for systems beyond 3G, which have been identified as a result of the Software Based Systems activities within the Mobile VCE Core 2 program. Specific requirements for systems beyond 3G are discussed and potential technologies to address them proposed. The analysis has been carried out from network, service and security viewpoints

    Development of a Computationally Efficient Fabric Model for Optimization of Gripper Trajectories in Automated Composite Draping

    Full text link
    An automated prepreg fabric draping system is being developed which consists of an array of actuated grippers. It has the ability to pick up a fabric ply and place it onto a double-curved mold surface. A previous research effort based on a nonlinear Finite Element model showed that the movements of the grippers should be chosen carefully to avoid misplacement and induce of wrinkles in the draped configuration. Thus, the present study seeks to develop a computationally efficient model of the mechanical behavior of a fabric based on 2D catenaries which can be used for optimization of the gripper trajectories. The model includes bending stiffness, large deflections, large ply shear and a simple contact formulation. The model is found to be quick to evaluate and gives very reasonable predictions of the displacement field

    Molecular dynamics simulations of protein-membrane interactions focusing on PI3Kα and its oncogenic mutants : a thesis presented in fulfilment of the requirements for the degree of Doctor of Philosophy in Computational Biochemistry at Massey University, Albany, New Zealand

    Get PDF
    The interactions between proteins and membranes are key to many aspects of biological function. Molecular dynamics simulations can provide insight into both atomic-level structural details and energetics of protein-membrane interactions. This thesis describes the development of a physiologically accurate brain lipid bilayer, and its use in molecular dynamics simulations to characterise how proteins that are important drug targets interact with the cell membrane. A method for rapidly identifying the orientation of a protein that interacts most favourably with a membrane was also developed and tested. The first chapter provides an introduction to molecular dynamics and its role in the context of this research. The second chapter details the development of a cellular membrane with a physiologically representative brain lipid composition. This was done through the testing of simple systems prior to the construction of two more complex lipid bilayers comprising phosphatidylethanolamine (PE), phosphatidylcholine (PC), phosphatidylserine (PS), phosphatidylinositide 4,5 bisphosphate (PIP2), sphingomyelin, and cholesterol. The third chapter implements the brain lipid bilayer in the development of a rotational interaction energy screening method designed to predict the most favourable orientation of a protein with respect to the cellular membrane. The functionality of the method was validated through application to two membrane proteins commonly implicated in cancer: the phosphatase and tensin homolog (PTEN), and the p110α-p85α phosphatidyl-inositol kinase (PI3Kα) complex. The fourth chapter corresponds to the main focus of this research, the behaviour of wild type PI3Kα and two of its oncogenic mutants (E545K and H1047R) with regards to membrane and substrate interaction. It was primarily found that H1047R’s increased membrane affinity allowed it to sample a catalytically competent orientation independently of Ras, unlike the wild type. Furthermore, it was also found that the position of the C terminal tail with regards to the substrate binding pocket was crucial in the achievement of a catalytically competent position against the cellular membrane. The fifth and final chapter describes a cytochrome P450 system embedded in a cellular membrane. It was primarily found that the properties of its ingress and egress tunnels depended on the presence or absence of a substrate in the active site
    corecore