9,858 research outputs found
Anonymous network access using the digital marketplace
With increasing usage of mobile telephony, and the trend towards additional mobile Internet usage, privacy and anonymity become more and more important. Previously-published anonymous communication schemes aim to obscure their users' network addresses, because real-world identity can be easily be derived from this information. We propose modifications to a novel call-management architecture, the digital marketplace, which will break this link, therefore enabling truly anonymous network access
The DSN programming system
The Deep Space Network programming system is described by a heuristic model. Interaction with two elements of that system, anomaly reporting and the MBASIC (trademark) language, is described in detail. Feedback from anomaly reporting indicates that the methodology resulted in a low anomaly rate and thereby also provided positive feedback. The need to reduce operating costs prompted the implementation of the MBASIC (trademark) language as a compiler
Mobile distributed authentication protocol
Networks access control is a crucial topic and authentication is a pre-requisite of that process. Most existing authentication protocols (for example that used in the GSM mobile network) are centralised. Depending on a single entity is undesirable as it has security, trust and availability issues. This paper proposes a new protocol, GSM-secure network access protocol (G-SNAP). In G-SNAP, the authentication procedure and network access control is handled by a quorum of authentication centres. The advantages of the novel protocol include increased security, availability and distributed trust
The Euclid-Mullin graph
We introduce the Euclid-Mullin graph, which encodes all instances of Euclid's
proof of the infinitude of primes. We investigate structural properties of the
graph both theoretically and numerically; in particular, we prove that it is
not a tree.Comment: 24 pages, 2 figures, to appear in Journal of Number Theor
Fracture surface characteristics of notched angleplied graphite/epoxy composites
Composite fracture surface characteristics and related fracture modes have been investigated through extensive microscopic inspections of the fracture surfaces of notched angleplied graphite/epoxy laminates. The investigation involved 4 ply laminates of the configuration + or - theta (s) where theta = 0 deg, 3 deg, 5 deg, 10 deg, 15 deg, 30 deg, 45 deg, 60 deg, 75 deg, and 90 deg. Two-inch wide tensile specimens with 0.25 in. by 0.05 in. through-slits centered across the width were tested to fracture. The fractured surfaces were then removed and examined using a scanning electron microscope. Evaluation of the photomicrographs combined with analytical results obtained using the CODSTRAN computer code culminated in a unified set of fracture criteria for determining the mode of fracture in notched angleplied graphite/epoxy laminates
Management system requirements for wireless systems beyond 3G
This paper presents a comprehensive description of various management system requirements for systems beyond 3G, which have been identified as a result of the Software Based Systems activities within the Mobile VCE Core 2 program. Specific requirements for systems beyond 3G are discussed and potential technologies to address them proposed. The analysis has been carried out from network, service and security viewpoints
Development of a Computationally Efficient Fabric Model for Optimization of Gripper Trajectories in Automated Composite Draping
An automated prepreg fabric draping system is being developed which consists
of an array of actuated grippers. It has the ability to pick up a fabric ply
and place it onto a double-curved mold surface. A previous research effort
based on a nonlinear Finite Element model showed that the movements of the
grippers should be chosen carefully to avoid misplacement and induce of
wrinkles in the draped configuration. Thus, the present study seeks to develop
a computationally efficient model of the mechanical behavior of a fabric based
on 2D catenaries which can be used for optimization of the gripper
trajectories. The model includes bending stiffness, large deflections, large
ply shear and a simple contact formulation. The model is found to be quick to
evaluate and gives very reasonable predictions of the displacement field
Molecular dynamics simulations of protein-membrane interactions focusing on PI3Kα and its oncogenic mutants : a thesis presented in fulfilment of the requirements for the degree of Doctor of Philosophy in Computational Biochemistry at Massey University, Albany, New Zealand
The interactions between proteins and membranes are key to many aspects of biological function.
Molecular dynamics simulations can provide insight into both atomic-level structural details and
energetics of protein-membrane interactions. This thesis describes the development of a
physiologically accurate brain lipid bilayer, and its use in molecular dynamics simulations to
characterise how proteins that are important drug targets interact with the cell membrane. A
method for rapidly identifying the orientation of a protein that interacts most favourably with a
membrane was also developed and tested.
The first chapter provides an introduction to molecular dynamics and its role in the context of this
research.
The second chapter details the development of a cellular membrane with a physiologically
representative brain lipid composition. This was done through the testing of simple systems prior to
the construction of two more complex lipid bilayers comprising phosphatidylethanolamine (PE),
phosphatidylcholine (PC), phosphatidylserine (PS), phosphatidylinositide 4,5 bisphosphate (PIP2),
sphingomyelin, and cholesterol.
The third chapter implements the brain lipid bilayer in the development of a rotational interaction
energy screening method designed to predict the most favourable orientation of a protein with
respect to the cellular membrane. The functionality of the method was validated through application
to two membrane proteins commonly implicated in cancer: the phosphatase and tensin homolog
(PTEN), and the p110α-p85α phosphatidyl-inositol kinase (PI3Kα) complex.
The fourth chapter corresponds to the main focus of this research, the behaviour of wild type PI3Kα
and two of its oncogenic mutants (E545K and H1047R) with regards to membrane and substrate
interaction. It was primarily found that H1047R’s increased membrane affinity allowed it to sample a
catalytically competent orientation independently of Ras, unlike the wild type. Furthermore, it was
also found that the position of the C terminal tail with regards to the substrate binding pocket was
crucial in the achievement of a catalytically competent position against the cellular membrane.
The fifth and final chapter describes a cytochrome P450 system embedded in a cellular membrane. It
was primarily found that the properties of its ingress and egress tunnels depended on the presence
or absence of a substrate in the active site
- …