Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Advances In The Redcat Software Package, Chris Schmidt, Stephanie J. Irausquin, Homayoun Valafar Oct 2013

Advances In The Redcat Software Package, Chris Schmidt, Stephanie J. Irausquin, Homayoun Valafar

Faculty Publications

Background

Residual Dipolar Couplings (RDCs) have emerged in the past two decades as an informative source of experimental restraints for the study of structure and dynamics of biological macromolecules and complexes. The REDCAT software package was previously introduced for the analysis of molecular structures using RDC data. Here we report additional features that have been included in this software package in order to expand the scope of its analyses. We first discuss the features that enhance REDCATs user-friendly nature, such as the integration of a number of analyses into one single operation and enabling convenient examination of a structural ensemble …


Protein Structure Validation And Identification From Unassigned Residual Dipolar Coupling Data Using 2d-Pdpa, Arjang Fahim, Rishi Mukhopadhyay, Ryan Yandle, James H. Prestegard, Homayoun Valafar Aug 2013

Protein Structure Validation And Identification From Unassigned Residual Dipolar Coupling Data Using 2d-Pdpa, Arjang Fahim, Rishi Mukhopadhyay, Ryan Yandle, James H. Prestegard, Homayoun Valafar

Faculty Publications

More than 90% of protein structures submitted to the PDB each year are homologous to some previously characterized protein structure. The extensive resources that are required for structural characterization of proteins can be justified for the 10% of the novel structures, but not for the remaining 90%. This report presents the 2D-PDPA method, which utilizes unassigned residual dipolar coupling in order to address the economics of structure determination of routine proteins by reducing the data acquisition and processing time. 2D-PDPA has been demonstrated to successfully identify the correct structure of an array of proteins that range from 46 to 445 …


A Forward-Secure Certificate-Based Signature Scheme, Jiguo Li, Huiyun Teng, Xinyu Huang, Yichen Zhang, Jianying Zhou Aug 2013

A Forward-Secure Certificate-Based Signature Scheme, Jiguo Li, Huiyun Teng, Xinyu Huang, Yichen Zhang, Jianying Zhou

Faculty Publications

Cryptographic computations are often carried out on insecure devices for which the threat of key exposure raises a serious concern. In an effort to address the key exposure problem, the notion of forward security was first presented by Günther in 1990. In a forward-secure scheme, secret keys are updated at regular periods of time; exposure of the secret key corresponding to a given time period does not enable an adversary to ‘break’ the scheme for any prior time period. In this paper, we first introduce forward security into certificate-based cryptography and define the security model of forward-secure certificate-based signatures (CBSs). …


Path Loss In An Urban Peer-To-Peer Channel For Six Public-Safety Frequency Bands, David W. Matolak, Qian Zhang, Qiong Wu Jun 2013

Path Loss In An Urban Peer-To-Peer Channel For Six Public-Safety Frequency Bands, David W. Matolak, Qian Zhang, Qiong Wu

Faculty Publications

We provide path loss data and models for a peer-to-peer wireless channel for an urban environment in six public safety bands, for simultaneous transmission to five spatially separated receiving sites. Results are from measurements in Denver, Colorado. The six frequencies at which we measured are (in MHz) 430, 750, 905, 1834, 2400, and 4860. Both line-of-sight and non-line-of-sight conditions were covered, and we quantify path loss exponents and linear-fit standard deviations as functions of frequency and location. Line-of-sight results agree with prior work, but non-line-of-sight exponents, from 3.6-7.3, are generally larger than in most other references.