• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 1
  • Tagged with
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

In Vivo and In Vitro Application of Elastin-Like Polypetides

Ge, Xin 05 1900 (has links)
Elastin-like polypeptides (ELP) are artificially designed protein biopolymers that can be produced by living organisms. These proteins have the unique ability to undergo reversible inverse phase transition, in response to changes in temperature and/or addition of chaotropic salts. Below the transition temperature (T1) , ELP is soluble in water. Increasing the temperature above Ti, ELP coacervates into an aqeous ELP-rich phase. In this thesis, this unique feature of ELP was used in for recombinant protein purification and for the formation of aqueous multiple-phase systems. For protein purification, ELP was fused with an intein and a model protein (thioredoxin), to demonstrate a simple and inexpensive approach for recombinant protein purification. The ELP tags replace the chromatographic media and the intein replaces the use of the protease in conventional methods. Using ELP tags was found to be consistent with large -scale recombinant protein production/purification by purifying an ELP tagged protein using a stirred cell equipped with a microfiltration membrane. When the temperature and/or salt concer.tration is increased for mixtures containing free ELP and ELP tagged proteins, simultaneous phase transition takes place. This served as the basis for the development of a method suitable for selectively recovering molecules from complex mixtures with high specificity, full reversibility, and virtually unlimited affinity. The second parts of this thesis focus on the ability of ELP to form aqueous twophase systems (A TPS) in vitro and most importantly, in vivo- with the formation of aqueous microcompartments in living cells. These compartments exclude the protein making machinery of the cell, acting as depots for newly expressed protein. It is also shown (in vitro) that ELP bastd droplets exclude proteases, protecting proteins from degradation. These observations are important for high-level production of recombinant proteins. Also described, is the formation of protein based aqueous multiphasic systems, with tunable morphologies. / Thesis / Doctor of Philosophy (PhD)
2

A Multi-Agent Defense Methodology with Machine Learning against Cyberattacks on Distribution Systems

Appiah-Kubi, Jennifer 17 August 2022 (has links)
The introduction of communication technology into the electric power grid has made the grid more reliable. Power system operators gain visibility over the power system and are able to resolve operational issues remotely via Supervisory Control And Data Acquisition (SCADA) technology. This reduces outage periods. Nonetheless, the remote-control capability has rendered the power grid vulnerable to cyberattacks. In December 2015, over 200,000 people in Ukraine became victims of the first publicly reported cyberattack on the power grid. Consequently, cyber-physical security research for the power system as a critical infrastructure is in critical need. Research on cybersecurity for power grids has produced a diverse literature; the multi-faceted nature of the grid makes it vulnerable to different types of cyberattacks, such as direct power grid, supply chain and ransom attacks. The attacks may also target different levels of grid operation, such as the transmission system, distribution system, microgrids, and generation. As these levels are characterized by varying operational constraints, the literature may be categorized not only according to the type of attack it targets, but also according to the level of power system operation under consideration. It is noteworthy that cybersecurity research for the transmission system dominates the literature, although the distribution system is noted to have a larger attack surface. For the distribution system, a notable attack type is the so-called direct switching attack, in which an attacker aims to disrupt power supply by compromising switching devices that connect equipment such as generators, and power grid lines. To maximize the damage, this attack tends to be coordinated as the attacker optimally selects the nodes and switches to attack. This decision-making process is often a bi- or tri-level optimization problem which models the interaction between the attacker and the power system defender. It is necessary to detect attacks and establish coordination/correlation among them. Determining coordination is a necessary step to predict the targets of an attack before attack completion, and aids in the mitigation strategy that ensues. While the literature has addressed the direct switching attack on the distribution system in different ways, there are also shortcomings. These include: (i) techniques to establish coordination among attacks are centralized, making them prone to single-point failures; (ii) techniques to establish coordination among attacks leverage only power system models, ignoring the influence of communication network vulnerabilities and load criticality in the decisions of the attacker; (iii) attacker-defender optimization models assume specific knowledge of the attacker resources and constraints by the defender, a strong unrealistic assumption that reduces their usability; (iv) and, mitigation strategies tend to be static and one-sided, being implemented only at the physical level, or at the communication network level. In light of this, this dissertation culminates in major contributions concerning real-time decentralized correlation of detected direct switching attacks and hybrid mitigation for electric power distribution systems. Concerning this, four novel contributions are presented: (i) a framework for decentralized correlation of attacks and mitigation; (ii) an attacker-defender optimization model that accounts for power system laws, load criticality, and cyber vulnerabilities in the decision-making process of the attacker; (iii) a real-time learning-based mechanism for determining correlation among detected attacks and predicting attack targets, and which does not assume knowledge of the attacker's resources and constraints by the power system defender; (iv) a hybrid mitigation strategy optimized in real-time based on information learned from detected attacks, and which combines both physical level and communication network level mitigation. Since the execution of intrusion detection systems and mechanisms such as the ones proposed in this dissertation may deter attackers from directly attacking the power grid, attackers may perform a supply chain cyberattack to yield the same results. Although, supply chain cyberattacks have been acknowledged as potentially far-reaching, and compliance directives put forward for this, the detection of supply chain cyberattacks is in a nascent stage. Consequently, this dissertation also proposes a novel method for detecting supply chain cyberattacks. To the best of the knowledge of the author, this work is the first preliminary work on supply chain cyberattack detection. / Doctor of Philosophy / The electric power grid is the network that transports electricity from generation to consumers, such as homes and factories. The power grid today is highly remote-monitored and controlled. Should there be a fault on the grid, the human operator, often remotely located, may only need to resolve it by sending a control signal to telemetry points, called nodes, via a communication network. This significantly reduces outage periods and improves the reliability of the grid. Nonetheless, the high level connectivity also exposes the grid to cyberattacks. The cyber connectivity between the power grid and the human operator, like all communication networks, is vulnerable to cyberattacks that may allow attackers to gain control of the power grid. If and when successful, wide-spread and extended outages, equipment damage, etc. may ensue. Indeed, in December 2015, over 200,000 people in Ukraine became victims to the first publicly reported cyberattack on a power grid. As a critical infrastructure, cybersecurity for the power grid is, therefore, in critical need. Research on cybersecurity for power grids has produced a diverse literature; the multi-faceted nature of the grid makes it vulnerable to different types of cyberattacks, such as direct power grid, supply chain and ransom attacks. Notable is the so-called direct switching attack, in which an attacker aims to compromise the power grid communication network in order to toggle switches that connect equipment such as generators, and power grid lines. The aim is to disrupt electricity service. To maximize the damage, this attack tends to be coordinated; the attacker optimally selects several grid elements to attack. Thus, it is necessary to both detect attacks and establish coordination among them. Determining coordination is a necessary step to predict the targets of an attack before attack completion. This aids the power grid owner to intercept and mitigate attacks. While the literature has addressed the direct switching attack in different ways, there are also shortcomings. Three outstanding ones are: (i) techniques to determine coordination among attacks and predict attack targets are centralized, making them prone to single-point failures; (ii) techniques to establish coordination among attacks leverage only power system physical laws, ignoring the influence of communication network vulnerabilities in the decisions of the attacker; (iii) and, studies on the interaction between the attacker and the defender (i.e., power grid owner) assume specific knowledge of the attacker resources and constraints by the defender, a strong unrealistic assumption that reduces their usability. This research project addresses several of the shortcomings in the literature, particularly the aforementioned. The work focuses on the electric distribution system, which is the power grid that connects directly to consumers. Indeed, this choice is ideal, as the distribution system has a larger attack surface than other parts of the grid and is characterized by computing devices with more constrained computational capability. Thus, adaptability to simple computing devices is a priority. The contributions of this dissertation provide leverage to the power grid owner to intercept and mitigate attacks in a resilient manner. The original contributions of the work are: (i) a novel realistic model that shows the decision making process of the attacker and their interactions with the defender; (ii) a novel decentralized mechanism for predicting the targets of coordinated cyberattacks on the electric distribution grid in real-time and which is guided by the attack model, (iii) and a novel hybrid optimized mitigation strategy that provides security to the power grid at both the communication network level and the physical power grid level. Since the power grid is constructed with smart equipment from various vendors, attackers may launch effective attacks by compromising the devices deployed in the power grid through a compromised supply chain. By nature, such an attack is evasive to traditional intrusion detection systems and algorithms such as the aforementioned. Therefore, this work also provides a new method to defend the grid against supply chain attacks, resulting in a mechanism for its detection in a critical power system communication device.
3

Oil Mobility Estimation and Recovery Optimization / Mobilité de l’huile dans le sol et optimisation de son extraction

Palmier, Cédric 09 November 2016 (has links)
L’objectif général de cette thèse était d’améliorer l’utilisation des éléments de diagnostic des sites pollués par des hydrocarbures légers. En particulier, il s’agissait : • De valider la méthode d’estimation de la mobilité de l’huile dans le sol, en milieu hétérogène, appelée bail-down test. Et de définir quelle méthode d’interprétation est la plus adaptée. • Comprendre l’impact des variations de hauteur de nappe sur l’épaisseur d’huile mesurée dans les puits de surveillance et sur la mobilité de l’huile. Dans un premier temps, des simulations de bail-down tests ont été réalisées en laboratoire, sur un pilote radial, remplie d’une matrice homogène. Puis, un grand nombre de tests réalisés sur un terrain d’étude, a été interprété. Ces travaux ont permis de confirmer la validité des bail-down tests pour estimer la mobilité de l’huile dans le milieu. L’hypothèse principale pour expliquer la validité de ces tests, alors que les hypothèses théoriques ne sont à priori pas respectées lors des essais, réside dans la faible mobilité de l’huile liée à une viscosité élevée. Dans un deuxième temps, l’impact des variations de nappes a été suivi par des mesures manuelles et automatiques sur le terrain d’étude, pendant plusieurs mois. Ce suivi a permis de décrire de manière précise cet impact, qui est différent pour un hydrocarbure en nappe libre, ou en milieu confiné. Par ailleurs, un modèle a été développé et testé pour simuler les variations d’épaisseur d’huile en fonction des hauteurs de nappe. Ce modèle permet d’estimer l’épaisseur et la position de l’huile dans la formation, ainsi que sa conductivité hydraulique. Les conclusions de cette étude apportent des éléments importants pour améliorer les phases d’investigation de site pollués par des hydrocarbures légers, et pour optimiser l’utilisation des données collectées. Enfin, confirmant l’impact significatif des variations de nappe sur les épaisseurs d’huile dans les puits et en montrant la validité des bail-down tests pour estimer la mobilité de l’huile, cette étude montre la nécessité de baser le dimensionnement des réseaux d’extraction des hydrocarbures, non pas sur l’épaisseur, mais sur la mobilité du produit. / The overall objective of this thesis was to improve the use of investigation data from contaminated site with light hydrocarbons. In particular, this work focused on: • To confirm the validity of the method to estimate the oil mobility in the formation, for heterogeneous conditions, called bail-down test. And, to define which interpretation method is the most relevant. • To understand the impact of the groundwater table variations on the oil thickness in the monitoring wells, and on its mobility. First, bail-down test simulations were performed at laboratory scale, on a radial pilot, filled with homogeneous sand. Then, a significant number of tests were performed on a studied site and interpreted. This work allowed to confirm the bail-down test validity for estimating the oil mobility in the formation. The key assumption to explain why these tests are valid whereas some of the assumptions and boundary conditions are not met during the tests, is based on the low mobility of the oil due to its viscosity. Secondly, the impact of the groundwater table variations has been manually and automatically measured on the studied site, during months. These measurements allowed to describe in detail the impact, which is different between confined and non-confined oil conditions. In addition, a model has been proposed and tested to simulate oil thickness depending on groundwater table level. This model allowed to estimate the thickness and the position of the oil in the formation, and its hydraulic conductivity. Overall, this study gives key elements to improve the investigation phase of site contaminated with light hydrocarbons, and to optimize the use of the collected data. Last, confirming the significant impact of the groundwater table fluctuation on the oil thickness and the validation of the bail-down test to estimate the oil mobility, this study shows the need to consider the oil mobility rather than the oil thickness for designing an oil recovery project.

Page generated in 0.0689 seconds