4 research outputs found
Analysis of Thermoelectric Coolers as Energy Harvesters for Low Power Embedded Applications
The growing popularity of solid state thermoelectric
devices in cooling applications has sparked an increasing diversity of
thermoelectric coolers (TECs) on the market, commonly known as
“Peltier modules”. They can also be used as generators, converting
a temperature difference into electric power, and opportunities are
plentiful to make use of these devices as thermoelectric generators
(TEGs) to supply energy to low power, autonomous embedded
electronic applications. Their adoption as energy harvesters in this
new domain of usage is obstructed by the complex thermoelectric
models commonly associated with TEGs. Low cost TECs for the
consumer market lack the required parameters to use the models
because they are not intended for this mode of operation, thereby
urging an alternative method to obtain electric power estimations
in specific operating conditions. The design of the test setup
implemented in this paper is specifically targeted at benchmarking
commercial, off-the-shelf TECs for use as energy harvesters in
domestic environments: applications with limited temperature
differences and space available. The usefulness is demonstrated by
testing and comparing single and multi stage TECs with different
sizes. The effect of a boost converter stage on the thermoelectric
end-to-end efficiency is also discussed
Stress response regulators identified through genome-wide transcriptome analysis of the (p)ppGpp-dependent response in Rhizobium etli
Background: The alarmone (p) ppGpp mediates a global reprogramming of gene expression upon nutrient limitation and other stresses to cope with these unfavorable conditions. Synthesis of (p) ppGpp is, in most bacteria, controlled by RelA/SpoT (Rsh) proteins. The role of (p) ppGpp has been characterized primarily in Escherichia coli and several Gram-positive bacteria. Here, we report the first in-depth analysis of the (p) ppGpp-regulon in an alpha-proteobacterium using a high-resolution tiling array to better understand the pleiotropic stress phenotype of a relA/rsh mutant.
Results: We compared gene expression of the Rhizobium etli wild type and rsh (previously rel) mutant during exponential and stationary phase, identifying numerous (p) ppGpp targets, including small non-coding RNAs. The majority of the 834 (p) ppGpp-dependent genes were detected during stationary phase. Unexpectedly, 223 genes were expressed (p) ppGpp-dependently during early exponential phase, indicating the hitherto unrecognized importance of (p) ppGpp during active growth. Furthermore, we identified two (p) ppGpp-dependent key regulators for survival during heat and oxidative stress and one regulator putatively involved in metabolic adaptation, namely extracytoplasmic function sigma factor EcfG2/PF00052, transcription factor CH00371, and serine protein kinase PrkA.
Conclusions: The regulatory role of (p) ppGpp in R. etli stress adaptation is far-reaching in redirecting gene expression during all growth phases. Genome-wide transcriptome analysis of a strain deficient in a global regulator, and exhibiting a pleiotropic phenotype, enables the identification of more specific regulators that control genes associated with a subset of stress phenotypes. This work is an important step toward a full understanding of the regulatory network underlying stress responses in alpha-proteobacteria
Ongoing Research Areas in Symmetric Cryptography
This report is a deliverable for the ECRYPT European network of excellence in cryptology. It gives a brief summary of some of the research trends in symmetric cryptography at the time of writing. The following aspects of symmetric cryptography are investigated in this report: • the status of work with regards to different types of symmetric algorithms, including block ciphers, stream ciphers, hash functions and MAC algorithms (Section 1); • the recently proposed algebraic attacks on symmetric primitives (Section 2); • the design criteria for symmetric ciphers (Section 3); • the provable properties of symmetric primitives (Section 4); • the major industrial needs in the area of symmetric cryptography (Section 5)