WorldWideScience

Sample records for based enrichment protocols

  1. Evaluation of Enrichment Protocols for Bacterial Endosymbionts of Ciliates by Real-Time PCR.

    Science.gov (United States)

    Castelli, Michele; Lanzoni, Olivia; Rossi, Leonardo; Potekhin, Alexey; Schrallhammer, Martina; Petroni, Giulio

    2016-06-01

    Large-scale studies on obligate bacterial endosymbionts may frequently require preliminary purification and enrichment protocols, which are often elaborate to set up and to evaluate, especially if the host organism is a protist. The purpose of this study was to develop a real-time PCR-based strategy and employ it for assessing two of such enrichment protocols for Holospora caryophila, hosted by the ciliate Paramecium. Four SSU rRNA gene-targeted real-time PCR assays were designed, which allowed to compare the amount of H. caryophila to other organisms, namely the host, its food bacterium (Raoultella planticola), and free-living bacteria present in the culture medium. By the use of the real-time PCR assays in combination, it was possible to conclude that the "cell fractionation" protocol was quite successful in the enrichment of the symbiont, while the "Percoll gradient" protocol will need further refinements to be fully repeatable. The proposed approach has the potential to facilitate and encourage future studies on the yet underexplored field of bacterial endosymbionts of ciliates and other protists. It can also find valuable applications for experimental questions other than those tested, such as fast and precise assessment of symbiont abundance in natural populations and comparison among multiple coexisting symbionts. PMID:26894821

  2. Network-based functional enrichment

    Directory of Open Access Journals (Sweden)

    Poirel Christopher L

    2011-11-01

    Full Text Available Abstract Background Many methods have been developed to infer and reason about molecular interaction networks. These approaches often yield networks with hundreds or thousands of nodes and up to an order of magnitude more edges. It is often desirable to summarize the biological information in such networks. A very common approach is to use gene function enrichment analysis for this task. A major drawback of this method is that it ignores information about the edges in the network being analyzed, i.e., it treats the network simply as a set of genes. In this paper, we introduce a novel method for functional enrichment that explicitly takes network interactions into account. Results Our approach naturally generalizes Fisher’s exact test, a gene set-based technique. Given a function of interest, we compute the subgraph of the network induced by genes annotated to this function. We use the sequence of sizes of the connected components of this sub-network to estimate its connectivity. We estimate the statistical significance of the connectivity empirically by a permutation test. We present three applications of our method: i determine which functions are enriched in a given network, ii given a network and an interesting sub-network of genes within that network, determine which functions are enriched in the sub-network, and iii given two networks, determine the functions for which the connectivity improves when we merge the second network into the first. Through these applications, we show that our approach is a natural alternative to network clustering algorithms. Conclusions We presented a novel approach to functional enrichment that takes into account the pairwise relationships among genes annotated by a particular function. Each of the three applications discovers highly relevant functions. We used our methods to study biological data from three different organisms. Our results demonstrate the wide applicability of our methods. Our algorithms are

  3. Iran to sign additional protocol and suspend uranium enrichment and reprocessing

    International Nuclear Information System (INIS)

    Full text: Iran's representative to the IAEA, Ambassador Ali Akbar Salehi, today delivered a letter to IAEA Director General, Mohamed ElBaradei conveying his Government's acceptance of the Additional Protocol. Mr. Salehi also informed the Director General that Iran had decided, as of today, to suspend all uranium enrichment-related and reprocessing activities in Iran - specifically, to suspend all activities on the site of Natanz, not to produce feed material for enrichment processes and not to import enrichment-related items. 'This is a welcome and positive development,' IAEA Director General Mohamed ElBaradei said. The IAEA intends to verify, in the context of the Safeguards Agreement and the Additional Protocol, the implementation by Iran of these decisions. At its meeting on 12 September, the IAEA Board of Governors adopted a resolution calling on Iran to sign, ratify and fully implement the Additional Protocol promptly and unconditionally, and as a confidence building measure to act henceforth in accordance with the Additional Protocol. The Board also called on Iran to suspend all further uranium enrichment and reprocessing activities, pending provision by the Director General of the assurances required by Member States and pending satisfactory application of the provisions of the Additional Protocol. Also today, Mr. ElBaradei has released his report to IAEA Member States on the 'Implementation of the NPT Safeguards Agreement in the Islamic Republic of Iran' for consideration at the 20 November Board of Governors' meeting. Unless the IAEA Board decides otherwise, the document's circulation is restricted and it cannot be released to the press. (IAEA)

  4. An Identity- Based Key- Exchange Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ya-juan; ZHU Yue-fei; HUANG Qiu-sheng

    2005-01-01

    An identity-based key-exchange protocol using a bilinear map is proposed and it is proved SK-secure(session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diffie-Hellmen) assumption is correct. Then we apply the signature-based authenticator to our protocol and obtain an identity-Based key-exchange protocol that is SK-secure in the UM (unauthenticated links adversarial model) provided the BDDH assumption is correct.

  5. Recommendations based on semantically enriched museum collections

    NARCIS (Netherlands)

    Wang, Y.; Stash, N.; Aroyo, L.; Gorgels, P.; Rutledge, L.; Schreiber, G.

    2008-01-01

    This article presents the CHIP demonstrator1 for providing personalized access to digital museum collections. It consists of three main components: Art Recommender, Tour Wizard, and Mobile Tour Guide. Based on the semantically enriched Rijksmuseum Amsterdam2 collection, we show how Semantic Web tech

  6. Rewriting-Based Verification of Authentication Protocols

    OpenAIRE

    Ogata, Kazuhiro; Futatsugi, Kokichi

    2004-01-01

    We propose a method of formally analysing security protocols based on rewriting. The method is roughly as follows. A security protocol is modeled as an observational transition system, which is described in CafeOBJ. Proof scores showing that the protocol has safety (security) properties are then written in CafeOBJ and the proof scores are executed (rewritten) by the CafeOBJ system.

  7. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  8. Quantum communication protocols based on entanglement swapping

    OpenAIRE

    Morales-Luna, Guillermo

    2015-01-01

    We recall several cryptographic protocols based on entanglement alone and also on entanglement swapping. We make an exposition in terms of the geometrical aspects of the involved Hilbert spaces, and we concentrate on the formal nature of the used transformations.

  9. Identity-based authentication protocol for grid

    Institute of Scientific and Technical Information of China (English)

    Li Hon; Sun Shixin; Yang Homiao

    2008-01-01

    Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol(SAP).The authentication process is very complicated,and therefore,the grid user is in a heavily loaded point both in computation and in communication.Based on identity-based architecture for grid(IBAG)and corre-sponding encryption and signature schemes,an identity-based authentication protocol for grid is proposed.Being certificate-free,the authentication protocol aligns well with the demands of grid computing.Through simulation testing,it is seen that the authentication protocol is more lightweight and efficient than SAP,especially the more lightweight user side.This contributes to the larger grid scalability.

  10. Chain-Chain Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Samia A Ali

    2011-05-01

    Full Text Available Wireless sensor network (WSN is an emerging technology for monitoring physical world. WSNs consist of large numbers of sensor nodes operated by battery mostly in harsh environment. Thus energy conservation is a primary issue for organization of these sensor nodes. Another crucial issue is the data delivery time by sensor nodes to the sink node, especially in Military, medical fields, and security monitoring systems where minimum delay is desirable. Number of protocols has been proposed in the literature for routing. One of such protocols is the cluster based routing protocol LEACH (low energy adaptive clustering hierarchy. LEACH protocol organizes WSN into a set of clusters and a periodic voting for cluster head is performed in order to be evenly distributed among all the sensors of the WSN. This periodical cluster head voting in LEACH, however, consumes an amount of non-negligible energy and other resources. For energy conservation, PEGASIS (power efficient gathering in sensor information systems a near optimal chain-based protocol has been proposed, however, it is faced with the challenge of long delay for the transmitted data. Another routing protocol called CCM (Chain-Cluster based Mixed routing, which is mainly a hybrid of LEACH and PEGASIS is proposed, the consumed energy increases as network size increases. In this paper, we propose an efficient routing protocol called CCBRP (Chain-Chain based routing protocol, it achieves both minimum energy consumption and minimum delay. The CCBRP protocol mainly divides a WSN into a number of chains (Greedy algorithm is used to form each chain as in PEGSIS protocol and runs in two phases. In the first phase, sensor nodes in each chain transmit data to their chain leader nodes in parallel. In the second phase, all chain leader nodes form a chain (also, using Greedy algorithm and choose randomly a leader node then all chain leader nodes send their data to this chosen leader node. This chosen leader node

  11. Using PSEA-Quant for Protein Set Enrichment Analysis of Quantitative Mass Spectrometry-Based Proteomics.

    Science.gov (United States)

    Lavallée-Adam, Mathieu; Yates, John R

    2016-01-01

    PSEA-Quant analyzes quantitative mass spectrometry-based proteomics datasets to identify enrichments of annotations contained in repositories such as the Gene Ontology and Molecular Signature databases. It allows users to identify the annotations that are significantly enriched for reproducibly quantified high abundance proteins. PSEA-Quant is available on the Web and as a command-line tool. It is compatible with all label-free and isotopic labeling-based quantitative proteomics methods. This protocol describes how to use PSEA-Quant and interpret its output. The importance of each parameter as well as troubleshooting approaches are also discussed. © 2016 by John Wiley & Sons, Inc. PMID:27010334

  12. GOMA: functional enrichment analysis tool based on GO modules

    Institute of Scientific and Technical Information of China (English)

    Qiang Huang; Ling-Yun Wu; Yong Wang; Xiang-Sun Zhang

    2013-01-01

    Analyzing the function of gene sets is a critical step in interpreting the results of high-throughput experiments in systems biology.A variety of enrichment analysis tools have been developed in recent years,but most output a long list of significantly enriched terms that are often redundant,making it difficult to extract the most meaningful functions.In this paper,we present GOMA,a novel enrichment analysis method based on the new concept of enriched functional Gene Ontology (GO) modules.With this method,we systematically revealed functional GO modules,i.e.,groups of functionally similar GO terms,via an optimization model and then ranked them by enrichment scores.Our new method simplifies enrichment analysis results by reducing redundancy,thereby preventing inconsistent enrichment results among functionally similar terms and providing more biologically meaningful results.

  13. Context transport based on 802.21 MIH protocol

    OpenAIRE

    Marcelo, Lebre; Corujo, Daniel; Gomes, Diogo,; Aguiar, Rui

    2011-01-01

    Sensor networks, along with the sensorial output from their nodes, provide an information source to enhance and enrich upper layers mechanisms. The 802.21 MIH protocol provides a cross layer framework that can be extended for sensor information transport. At the same time, it creates an abstraction layer that removes hardware and software specificity from sensor nodes. On a higher level of the network stack, the XMPP protocol also provides an upper layer solution for content syndication on a ...

  14. A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext

    OpenAIRE

    Bo Meng

    2009-01-01

    Internet voting protocol is the base of the Internet voting systems. Firstly, an improved proof protocol that two ciphertexts are encryption of the same plaintext is introduced. Secondly, a receipt-free and coercion-resistant Internet voting protocol based on the non-interactive deniable authentication protocol and an improved proof protocol that two ciphertexts are encryption of the same plaintext is developed. Thirdly, we analyze the proposed Internet voting protocol. The proposed Internet ...

  15. Comparison of CSMA based MAC protocols of wireless sensor networks

    CERN Document Server

    singh, Himanshu

    2012-01-01

    Energy conservation has been an important area of interest in Wireless Sensor networks (WSNs). Medium Access Control (MAC) protocols play an important role in energy conservation. In this paper, we describe CSMA based MAC protocols for WSN and analyze the simulation results of these protocols. We implemented S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, DMAC and Wise-MAC in TOSSIM, a simulator which unlike other simulators simulates the same code running on real hardware. Previous surveys mainly focused on the classification of MAC protocols according to the techniques being used or problem dealt with and presented a theoretical evaluation of protocols. This paper presents the comparative study of CSMA based protocols for WSNs, showing which MAC protocol is suitable in a particular environment and supports the arguments with the simulation results. The comparative study can be used to find the best suited MAC protocol for wireless sensor networks in different environments.

  16. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco;

    2015-01-01

    a protocol language based on a dependent type system for message-passing parallel programs, which includes various communication operators, such as point-to-point messages, broadcast, reduce, array scatter and gather. For the verification of a program against a given protocol, the protocol is first...

  17. 77 FR 14838 - General Electric-Hitachi Global Laser Enrichment LLC, Commercial Laser-Based Uranium Enrichment...

    Science.gov (United States)

    2012-03-13

    ... COMMISSION General Electric-Hitachi Global Laser Enrichment LLC, Commercial Laser-Based Uranium Enrichment... considering the issuance of a license to General Electric-Hitachi Global Laser Enrichment LLC (GLE or the... the NRC's Electronic Reading Room at http://www.nrc.gov/reading-rm/adams.html . From this site,...

  18. Fast and Efficient IMAC Protocol for Phosphopeptide enrichment for phosphoproteomic Studies via LC-MS/MS

    OpenAIRE

    McKennan, C.; Spruce, L.; Seeholzer, S; Ding, H.

    2014-01-01

    Recent developments in first dimension High-Performance Liquid Chromatography (HPLC) separation of complex peptide mixtures, followed by a subsequent immobilized metal ion affinity chromatography (IMAC) for phosphopeptide enrichment have shown great promise in both selectivity and quantification of phosphopeptides via LC-MS/MS analysis. The first dimension HPLC, such as hydrophilic interaction chromatography (HILIC) or high pH Reverse Phase chromatography, was employed for its being orthogona...

  19. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  20. Protocol Independent Multicast Based States Allocation

    Directory of Open Access Journals (Sweden)

    G Hemalatha

    2012-02-01

    Full Text Available In this paper the Protocol Independent Multicast (PIM protocol is being used. The PIM protocol avoids the packet drop and diverting problem. The PIM protocol is not dependent on any specific unicast routing protocol. It is IP routing independent protocol. The PIM uses the unicast and multicast information to create a distribution tree along the reverse path from the receivers towards the source. The PIM protocol consists of three modes such as sparse mode, dense mode and bidirectional mode. The sparse mode is used to sends the file from router to a receiver. The dense mode is used to sends the file from router to multiple receivers. The bidirectional mode is used to sends the message from router to sender and then continue the other process depending on the sender requirements. The client sends the file from sender to destination via the router. First the sender selects the file name and receiver name for transmission. Then the state is assigned automatically depend upon the user selection. The state can be defined by the number of destination selected to transmit the file from the source. If the sender selects single destination, it will assign “Without forwarding state router” for transmission. Otherwise it will assign “Forwarding state router” for transmission. If the receiver is not available, the router sends a message to sender such that “the requested receiver is not available”. Then the client will decide the file is transfer or not, it will reply with transfer the file, then the file will be transferred until the file will be discarded at client side. If the sender tries the same process after two times, the router will display the warning message as “the requested receiver is not available, this file will be discarded at client side”. Then it continues the other process.

  1. Q-ESP: a QoS-compliant Security Protocol to enrich IPSec Framework

    CERN Document Server

    Mostafa, Mahmoud; Fraboul, Christian

    2009-01-01

    IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one aspect of this improvement is to take Quality of Service (QoS) requirements into account. QoS is the ability of the network to provide a service at an assured service level while optimizing the global usage of network resources. The QoS level that a flow receives depends on a six-bit identifier in the IP header; the so-called Differentiated Services code point (DSCP). Basically, Multi-Field classifiers classify a packet by inspecting IP/TCP headers, to decide how the packet should be processed. The current IPSec standard does hardly offer any guidance to do this, because the existing IPSec ESP security protocol hides much of this information in its encrypted payloads, preventing network control devices such as routers and switches from utilizing this information in performing classification appropriately. To solve this problem, we prop...

  2. Atomic Electronic Contract Protocol Based on Convertible Signature

    Institute of Scientific and Technical Information of China (English)

    LIU Yi-chun; WANG Li-na; ZHANG Huan-guo

    2005-01-01

    A new class of atomicity, namely contract atomicity is presented. A new technical strategy based on convertible signature and two-phase commitment is proposed for implementing atomicity of electronic contract protocol. A new atomic contract signing protocol is given out by using ElGamal-like convertible undeniable signature and commitment of conversion key, and another new atomic contract signing protocol is brought forward by using RSA-based convertible undeniable signature scheme and commitment of conversion key.These two new protocols are proved to be of atomicity, fairness, privacy, non-repudiation.

  3. Quantum Private Comparison Protocol Based on Bell Entangled States

    International Nuclear Information System (INIS)

    In this paper, a quantum private comparison protocol is proposed based on bell entangled states. In our protocol, two parties can compare the equality of their information with the help of a semi-honest third party. The correctness and security of our protocol are discussed. One party cannot learn the other's private information and the third party also cannot learn any information about the private information. (general)

  4. Comments on five smart card based password authentication protocols

    Directory of Open Access Journals (Sweden)

    Yalin Chen

    2010-05-01

    Full Text Available In this paper, we use the ten security requirements proposed by Liao et al. for a smart card based authentication protocol to examine five recent work in this area. After analyses, we found that the protocols of Juang et al., Hsiang et al., Kim et al., and Li et al. all suffer from offline password guessing attack if the smart card is lost, and the protocol of Xu et al.¡s is subjected to an insider impersonation attack.

  5. Distance based (DBCP) Cluster Protocol for Heterogeneous Wireless Sensor Network

    OpenAIRE

    Kumar, Surender; Prateek, Manish; Bhushan, Bharat

    2014-01-01

    Clustering is an important concept to reduce the energy consumption and prolonging the life of a wireless sensor network. In heterogeneous wireless sensor network some of the nodes are equipped with more energy than the other nodes. Many routing algorithms are proposed for heterogeneous wireless sensor network. Stable Election Protocol (SEP) is one of the important protocol in this category. In this research paper a novel energy efficient distance based cluster protocol (DBCP) is proposed for...

  6. A Model Based Security Testing Method for Protocol Implementation

    OpenAIRE

    Yu Long Fu; Xiao Long Xin

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of ...

  7. DSR-Based Selective Repeat ARQ Protocol in MANET

    Institute of Scientific and Technical Information of China (English)

    张全新; 宋瀚涛

    2003-01-01

    The efficient route algorithms involved in mobile ad hoc network(MANET) are studied. An arrangement of a combination of the traditional dynamic source routing(DSR) protocol is put forward and the selective repeat ARQ protocol is put forward by analyzing and studying them in detail and providing the scheme. In networks, especially in wireless networks, the nodes are capable to process data much faster than transmission, the DSR-based selective repeat ARQ protocol has real meanings in MANET.

  8. Model Checking Electronic Commerce Security Protocols Based on CTL

    Institute of Scientific and Technical Information of China (English)

    XIAO De-qin; ZHANG Huan-guo

    2005-01-01

    We present a model based on Computational Temporal Logic (CTL) methods for verifying security requirements of electronic commerce protocols. The model describes formally the authentication, confidentiality integrity,non-repudiation, denial of service and access control of the electronic commerce protocols. We illustrate as case study a variant of the Lu-Smolka protocol proposed by Lu-Smolka.Moreover, we have discovered two attacks that allow a dishonest user to purchase a good debiting the amount to another user. And also, we compared our work with relative research works and found that the formal way of this paper is more general to specify security protocols for E-Commerce.

  9. An Internet Key Exchange Protocol Based on Public Key Infrastructure

    Institute of Scientific and Technical Information of China (English)

    朱建明; 马建峰

    2004-01-01

    Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.

  10. Cryptanalysis of Song's advanced smart card based password authentication protocol

    CERN Document Server

    Tapiador, Juan E; Peris-Lopez, P; Clark, John A

    2011-01-01

    Song \\cite{Song10} proposed very recently a password-based authentication and key establishment protocol using smart cards which attempts to solve some weaknesses found in a previous scheme suggested by Xu, Zhu, and Feng \\cite{XZF09}. In this paper, we present attacks on the improved protocol, showing that it fails to achieve the claimed security goals.

  11. Network Management Temporal Database System Based on XTACACS Protocol

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    This paper first analyzes the basic concepts of Cisco router user certification, XTACACS certification protocol and describes the data architecture of user data protocol, then defines a kind of doubly temporal databases and log-in transaction processing based on network management property, at last, introduces implementation technology and method.

  12. Cooperative MIMO Transmissions in WSN Using Threshold Based MAC Protocol

    Directory of Open Access Journals (Sweden)

    J. Vidhya

    2010-08-01

    Full Text Available Sensor networks require robust and efficient communication protocols to maximise the network lifetime.Radio irregularity, channel fading and interference results in larger energy consumption and latency forpacket transmission over wireless channel. Cooperative multi-input multi-output (MIMO schemes whenincorporated in wireless senor network (WSN can significantly improve the communicationperformance. An inefficiently designed medium access control (MAC protocol however, may diminishthe performance gains of MIMO operation. Hence, this paper proposes a distributed threshold basedMAC protocol for cooperative MIMO transmissions using space time block codes (STBC. The protocoluses a thresholding scheme that is updated dynamically based on the queue length at the sending node toachieve lesser energy consumption and minimise latency ensuring the stability of transmission queues atthe nodes. STBC and code combining techniques are applied to utilise the inherent spatial diversity inwireless cooperative MIMO systems. Simulation results are provided to evaluate the performance of theproposed protocol and are compared with fixed group size cooperative MIMO MAC protocols with andwithout STBC coding. Results show that the proposed protocol outperforms point to point communicationas well as cooperative MIMO MAC protocols that use fixed group sizes. STBC technique for the proposedMAC protocol provides significant energy savings and minimises the packet delay by leveraging MIMOdiversity gains.

  13. E-Voting Protocol Based On Public-Key Cryptography

    Directory of Open Access Journals (Sweden)

    Hayam K. Al-Anie

    2011-08-01

    Full Text Available In this paper we propose a new secure E-Voting protocol based on public-key encryption cryptosystem. This protocol is summarized in three processes: firstly, access control process which involves the identification and authentication phases for the applied citizens. Secondly, the voting process which will be done byciphering the voter information using public-key encryption cryptosystem (RSA, to be submitted over an insecure network to the specified government election server. Finally, the election server administrator will sort the final result by deciphering the received encrypted information using RSA private key. Actually, this E-Voting protocol is more efficient than others E-Voting protocols since the voter can vote from his/her own personal computer (PC without any extra cost and effort. The RSA public-key encryption system ensures the security of the proposed protocol. However, to prevent a brute force attack, the choice of the key size becomes crucial.

  14. Ad Hoc Protocols Via Multi Agent Based Tools

    OpenAIRE

    Ali Bazghandi; Mehdi Bazghandi

    2011-01-01

    The purpose of this paper is investigating behaviors of Ad Hoc protocols in Agent-based simulation environments. First we bring brief introduction about agents and Ad Hoc networks. We introduce some agent-based simulation tools like NS-2. Then we focus on two protocols, which are Ad Hoc On-demand Multipath Distance Vector (AODV) and Destination Sequenced Distance Vector (DSDV). At the end, we bring simulation results and discuss about their reasons.

  15. Mercury release from deforested soils triggered by base cation enrichment.

    Science.gov (United States)

    Farella, N; Lucotte, M; Davidson, R; Daigle, S

    2006-09-01

    The Brazilian Amazon has experienced considerable colonization in the last few decades. Family agriculture based on slash-and-burn enables millions of people to live in that region. However, the poor nutrient content of most Amazonian soils requires cation-rich ashes from the burning of the vegetation biomass for cultivation to be successful, which leads to forest ecosystem degradation, soil erosion and mercury contamination. While recent studies have suggested that mercury present in soils was transferred towards rivers upon deforestation, little is known about the dynamics between agricultural land-use and mercury leaching. In this context, the present study proposes an explanation that illustrates how agricultural land-use triggers mercury loss from soils. This explanation lies in the competition between base cations and mercury in soils which are characterized by a low adsorption capacity. Since these soils are naturally very poor in base cations, the burning of the forest biomass suddenly brings high quantities of base cations to soils, destabilizing the previous equilibrium amongst cations. Base cation enrichment triggers mobility in soil cations, rapidly dislocating mercury atoms. This conclusion comes from principal component analyses illustrating that agricultural land-use was associated with base cation enrichment and mercury depletion. The overall conclusions highlight a pernicious cycle: while soil nutrient enrichment actually occurs through biomass burning, although on a temporary basis, there is a loss in Hg content, which is leached to rivers, entering the aquatic chain, and posing a potential health threat to local populations. Data presented here reflects three decades of deforestation activities, but little is known about the long-term impact of such a disequilibrium. These findings may have repercussions on our understanding of the complex dynamics of deforestation and agriculture worldwide. PMID:16781764

  16. Updatable Queue Protocol Based On TCP For Virtual Reality Environment

    CERN Document Server

    Al-Howaide, Ala'a Z; Salhieh, Ayad M

    2011-01-01

    The variance in number and types of tasks required to be implemented within Distributed Virtual Environments (DVE) highlights the needs for communication protocols can achieve consistency. In addition, these applications have to handle an increasing number of participants and deal with the difficult problem of scalability. Moreover, the real-time requirements of these applications make the scalability problem more difficult to solve. In this paper, we have implemented Updatable Queue Abstraction protocol (UQA) on TCP (TCP-UQA) and compared it with original TCP, UDP, and Updatable Queue Abstraction based on UDP (UDP-UQA) protocols. Results showed that TCP-UQA was the best in queue management.

  17. A Secure Elliptic Curve-Based RFID Protocol

    Institute of Scientific and Technical Information of China (English)

    Santi Martínez; Magda Valls; Concepcó Roig; Josep M. Miret; Francesc Giné

    2009-01-01

    Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased.Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence, high confidence and efficient privacy protocols are urgently needed. Previous studies in the literature proposed schemes that are proven to be secure, but they have scalability problems. A feasible and scalable protocol to guarantee privacy is presented in this paper.The proposed protocol uses elliptic curve cryptography combined with a zero knowledge-based authentication scheme. An analysis to prove the system secure, and even forward secure is also provided.

  18. An XML-based protocol for distributed event services

    Energy Technology Data Exchange (ETDEWEB)

    Gunter, Dan K.; Smith, Warren; Quesnel, Darcy

    2001-06-25

    A recent trend in distributed computing is the construction of high-performance distributed systems called computational grids. One difficulty we have encountered is that there is no standard format for the representation of performance information and no standard protocol for transmitting this information. This limits the types of performance analysis that can be undertaken in complex distributed systems. To address this problem, we present an XML-based protocol for transmitting performance events in distributed systems and evaluate the performance of this protocol.

  19. Electronic Voting Protocol Using Identity-Based Cryptography

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515

  20. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515

  1. Revocable Attribute-based Key Agreement Protocol without Random Oracles

    Directory of Open Access Journals (Sweden)

    Hao Wang

    2009-10-01

    Full Text Available In this paper, we present a two-party attribute-based key agreement protocol, which is secure in the standard model (without random oracles, under the truncated decision q-ABDHE assumption. Then we give a modified version of this scheme, in which the users can be revoked efficiently. The attribute-based key agreement protocol is based on the attribute-based encryption scheme, which is a generalization of identity-based cryptosystems, incorporates attributes as inputs to its cryptographic primitives. These kinds of schemes not only preserve the advantages of traditional identity-based key agreement protocol, but also provide some new properties, such as hiding the identity information of the individual, increasing the flexibility of key management, and providing efficient means to revoke users from the system.

  2. An Improved Directed Diffusion Protocol based on Opportunistic Routing

    OpenAIRE

    Yi Xu; Yixian Yang; Yang Xin; Hongliang Zhu

    2014-01-01

    Researchers are paying more and more attention to the application of wireless sensor networks (WSNs), where routing is one of the vital techniques. An advanced Directed Diffusion protocol, named DDOR, is presented in this paper based on Opportunistic Routing to improve the disadvantage of mono-forwarder of traditional routing protocol. Packet head has been modified in order to implement a forwarder list in DDOR. Instead of fixed next-hop forwarding in transmission, DDOR selects the optimal no...

  3. Research and Implementation of Collision Detection Based on Modbus Protocol

    OpenAIRE

    Yinglan Fang; Xianfeng Han; Bing Han

    2013-01-01

    In order to solve the communication errors resulted by traditional working condition multi-platform device communication using the custom protocol communication and link congestion malpractice brought by retransmission, it ensures network communication using time-sharing communication conflict detection based on mature Modbus protocol. Thereby it enhances the stability of the entire system during operation process, and provides simple, efficient, stable business specification inte...

  4. Finite Models in FOL-Based Crypto-Protocol Verification

    Science.gov (United States)

    Jürjens, Jan; Weber, Tjark

    Cryptographic protocols can only be secure under certain inequality assumptions. Axiomatizing these inequalities explicitly is problematic: stating too many inequalities may impair soundness of the verification approach. To address this issue, we investigate an alternative approach (based on first-order logic) that does not require inequalities to be axiomatized. A derivation of the negated security property exhibits a protocol attack, and absence of a derivation amounts to absence of the investigated kind of attack.

  5. A simplified and cost-effective enrichment protocol for the isolation of Campylobacter spp. from retail broiler meat without microaerobic incubation

    LENUS (Irish Health Repository)

    Zhou, Ping

    2011-08-03

    Abstract Background To simplify the methodology for the isolation of Campylobacter spp. from retail broiler meat, we evaluated 108 samples (breasts and thighs) using an unpaired sample design. The enrichment broths were incubated under aerobic conditions (subsamples A) and for comparison under microaerobic conditions (subsamples M) as recommended by current reference protocols. Sensors were used to measure the dissolved oxygen (DO) in the broth and the percentage of oxygen (O2) in the head space of the bags used for enrichment. Campylobacter isolates were identified with multiplex PCR assays and typed using pulsed-field gel electrophoresis (PFGE). Ribosomal intergenic spacer analyses (RISA) and denaturing gradient gel electrophoresis (DGGE) were used to study the bacterial communities of subsamples M and A after 48 h enrichment. Results The number of Campylobacter positive subsamples were similar for A and M when all samples were combined (P = 0.81) and when samples were analyzed by product (breast: P = 0.75; thigh: P = 1.00). Oxygen sensors showed that DO values in the broth were around 6 ppm and O2 values in the head space were 14-16% throughout incubation. PFGE demonstrated high genomic similarity of isolates in the majority of the samples in which isolates were obtained from subsamples A and M. RISA and DGGE results showed a large variability in the bacterial populations that could be attributed to sample-to-sample variations and not enrichment conditions (aerobic or microaerobic). These data also suggested that current sampling protocols are not optimized to determine the true number of Campylobacter positive samples in retail boiler meat. Conclusions Decreased DO in enrichment broths is naturally achieved. This simplified, cost-effective enrichment protocol with aerobic incubation could be incorporated into reference methods for the isolation of Campylobacter spp. from retail broiler meat.

  6. Sonication-based isolation and enrichment of Chlorella protothecoides chloroplasts for illumina genome sequencing

    Energy Technology Data Exchange (ETDEWEB)

    Angelova, Angelina [University of Arizona; Park, Sang-Hycuk [University of Arizona; Kyndt, John [Bellevue University; Fitzsimmons, Kevin [University of Arizona; Brown, Judith K [University of Arizona

    2013-09-01

    With the increasing world demand for biofuel, a number of oleaginous algal species are being considered as renewable sources of oil. Chlorella protothecoides Krüger synthesizes triacylglycerols (TAGs) as storage compounds that can be converted into renewable fuel utilizing an anabolic pathway that is poorly understood. The paucity of algal chloroplast genome sequences has been an important constraint to chloroplast transformation and for studying gene expression in TAGs pathways. In this study, the intact chloroplasts were released from algal cells using sonication followed by sucrose gradient centrifugation, resulting in a 2.36-fold enrichment of chloroplasts from C. protothecoides, based on qPCR analysis. The C. protothecoides chloroplast genome (cpDNA) was determined using the Illumina HiSeq 2000 sequencing platform and found to be 84,576 Kb in size (8.57 Kb) in size, with a GC content of 30.8 %. This is the first report of an optimized protocol that uses a sonication step, followed by sucrose gradient centrifugation, to release and enrich intact chloroplasts from a microalga (C. prototheocoides) of sufficient quality to permit chloroplast genome sequencing with high coverage, while minimizing nuclear genome contamination. The approach is expected to guide chloroplast isolation from other oleaginous algal species for a variety of uses that benefit from enrichment of chloroplasts, ranging from biochemical analysis to genomics studies.

  7. Efficient multiparty quantum key agreement protocol based on commutative encryption

    Science.gov (United States)

    Sun, Zhiwei; Huang, Jiwu; Wang, Ping

    2016-05-01

    A secure multiparty quantum key agreement protocol using single-qubit states is proposed. The agreement key is computed by performing exclusive-OR operation on all the participants' secret keys. Based on the commutative property of the commutative encryption, the exclusive-OR operation can be performed on the plaintext in the encrypted state without decrypting it. Thus, it not only protects the final shared key, but also reduces the complexity of the computation. The efficiency of the proposed protocol, compared with previous multiparty QKA protocols, is also improved. In the presented protocol, entanglement states, joint measurement and even the unitary operations are not needed, and only rotation operations and single-state measurement are required, which are easier to be realized with current technology.

  8. A Voting Protocol Based on the Controlled Quantum Operation Teleportation

    Science.gov (United States)

    Tian, Juan-Hong; Zhang, Jian-Zhong; Li, Yan-Ping

    2016-05-01

    Based on the controlled quantum operation teleportation, a secure voting protocol is proposed in this paper. Genuine four-qubit entangled state functions as the quantum channel. The eligible voter's quantum operation which represents his vote information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Voter's quantum identity authentication provides the anonymity of voters'ID, which is ensured by a zero-knowledge proof of the notary organization CA. Charlie's supervision in the whole voting process can make the protocol satisfy verifiability and non-reusability so as to avoid Bob's dishonest behaviour. The security analysis shows that the voting protocol satisfies unforgeability, and has great advantages over some relevant researches. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

  9. Analysis and design of a smart card based authentication protocol

    Institute of Scientific and Technical Information of China (English)

    Kuo-Hui YEH; Kuo-Yu TSAI; Jia-Li HOU

    2013-01-01

    Numerous smart card based authentication protocols have been proposed to provide strong system security and robust individual privacy for communication between parties these days. Nevertheless, most of them do not provide formal analysis proof, and the security robustness is doubtful. Chang and Cheng (2011) proposed an efficient remote authentication protocol with smart cards and claimed that their proposed protocol could support secure communication in a multi-server environment. Unfortunately, there are opportunities for security enhancement in current schemes. In this paper, we identify the major weakness, i.e., session key disclosure, of a recently published protocol. We consequently propose a novel authentication scheme for a multi-server envi-ronment and give formal analysis proofs for security guarantees.

  10. Traffic Flow Analysis Model based Routing Protocol For Multi-Protocol Label Switching Network

    Directory of Open Access Journals (Sweden)

    E. R. Naganathan

    2011-01-01

    Full Text Available Problem statement: Multi-Protocol Label Switching (MPLS is a mechanism which is used in high-performance telecommunications networks that directs and carries data from one network node to the next with the help of labels. Traffic management is still an issue in MPLS network as it involves high speed internet. Approach: This study proposed a traffic flow analysis of the real time MPLS traffic and segregates the MPLS traffic as three major class based on the outcome of traffic flow analysis. Using the traffic class. This study proposed a reliable transmission methodology which provides traffic free routing in the MPLS networks. Results: The proposed traffic flow analysis based reliable routing model overcomes the network traffic and provides effective routing by offering traffic free path. Conclusion: The proposed traffic flow analysis model outperforms existing routing protocol and offers comparatively negligible packet loss.

  11. Survey of Performance based Transmission Control Protocol in MANET

    Directory of Open Access Journals (Sweden)

    Sapna Bagde

    2013-01-01

    Full Text Available Transmission Control Protocol (TCP is a connection-oriented transport service that ensures the reliability of message delivery. It verifies that messages and data were received. TCP provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer. TCP provides a communication service at an intermediate level between an application programs. TCP is the protocol used by major Internet applications such as the World Wide Web, email, remote administration and file transfer. TCP is a reliable transport protocol that is well tuned to perform well in traditional networks. However, several experiments and analysis have shown that this protocol is not suitable for bulk data transfer in high bandwidth, large round trip time networks because of its slow start and conservative congestion control mechanism. In this paper we discussed a survey of Performance Based Transmission Control Protocol in Mobile Ad-hoc Network environment. The performance based techniques are categorized based upon different approaches like throughput, end-to-end delay, congestion control etc. We also analysis the major improvement in recent methods for performance based TCP in MANET.

  12. Internet protocol-based emergency services

    CERN Document Server

    Schulzrinne, Henning

    2013-01-01

    Written by international experts in the field, this book covers the standards, architecture and deployment issues related to IP-based emergency services This book brings together contributions from experts on technical and operational aspects within the international standardisation and regulatory processes relating to routing and handling of IP-based emergency calls.  Readers will learn how these standards work, how various standardization organizations contributed to them and about pilot projects, early deployment and current regulatory situation. Key Featur

  13. Enhanced Location Based Routing Protocol for 6LoWPAN

    Directory of Open Access Journals (Sweden)

    M.Rehenasulthana

    2012-06-01

    Full Text Available 6LoWPAN (IPv6 over IEEE 802.15.4 standardized by IEEE 802.15.4 provides IP communication capability for nodes in WSN. An adaptation layer is introduced above the MAC layer to achieve header compression, fragmentation and reassembly of IP packets. The location-based information is used to simplify the routing policy. This paper proposes an efficient location-based routing protocol, considering link quality and distance between nodes as the routing metric. The proposed Enhanced Location-based routing protocol (ELBRP was simulated in NS2 version 2.32 and performance were analysed in terms of packet delivery ratio, throughput and average end-to-end delay. From the results obtained, it is foundthat the proposed ELBRP outperforms existing LOAD protocol.

  14. A Survey on Location Based Authentication Protocols For Mobile Devices

    Directory of Open Access Journals (Sweden)

    Smruti. P. Patil

    2013-02-01

    Full Text Available As per the recent studies, the volatile growth has been seen inthe use of mobile devices as the supporting technology foraccessing Internet based services, as well as for personalcommunication needs in networking. Various studies indicatethat it is impossible to utilize strong cryptographic functions forimplementing security protocols on mobile devices. Ourresearch negates this. Explicitly, a performance analysis focusedon the most commonly used cryptographic protocols based onthe location address (latitude & longitude of the user for mobileapplications and anticipated provably secure authenticationprotocol that is more efficient than any of the existingauthentication protocol is being discussed in this paper.Understanding the use of public key cryptography which makespotential use of discrete logarithms problem. The security ofECC depends on the difficulty of Elliptic Curve DiscreteLogarithm. To provide secure communication for mobiledevices, authenticated protocol is an important primitive forestablishing trusted connection. In this paper, it has beenstudied that the location based system provides a better securityand acquires much less energy consumption than the existingauthentication protocols.

  15. An Enhanced Security Protocol for VANET-Based Entertainment Services

    Science.gov (United States)

    Kim, Jung-Yoon; Choi, Hyoung-Kee

    Multimedia transactions between vehicles are expected to become a promising application in VANETs but security is a fundamental issue that must be resolved before such transactions can become practical and trusted. Existing certificate-based digital signature schemes are ineffective for ensuring the security of multimedia transactions in VANETs. This ineffectiveness exists because there is no guarantee that (1) vehicles can download the latest certificate revocation lists or that (2) vehicles can complete a multimedia transaction before leaving their communication range. These two problems result, respectively, from a lack of infrastructure and from the inconsistent connectivity inherent in VANETs. In this paper, we propose a digital signature approach that combines a certificateless signature scheme and short-lived public keys to alleviate these problems. We then propose a security protocol that uses the proposed signature approach for multimedia transactions between vehicles. The proposed protocol enables vehicles to trade in multimedia resources without an online trust authority. We provide an analytical approach to optimizing the security of the proposed protocol. The security and performance of our protocol are evaluated via simulation and theoretical analysis. Based on these evaluations, we contend that the proposed protocol is practical for multimedia transactions in VANETs in terms of security and performance.

  16. A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols

    Science.gov (United States)

    Sharma, Vishal; Thapliyal, Kishore; Pathak, Anirban; Banerjee, Subhashish

    2016-07-01

    The effect of noise on various protocols of secure quantum communication has been studied. Specifically, we have investigated the effect of amplitude damping, phase damping, squeezed generalized amplitude damping, Pauli type as well as various collective noise models on the protocols of quantum key distribution, quantum key agreement, quantum secure direct quantum communication and quantum dialogue. From each type of protocol of secure quantum communication, we have chosen two protocols for our comparative study: one based on single-qubit states and the other one on entangled states. The comparative study reported here has revealed that single-qubit-based schemes are generally found to perform better in the presence of amplitude damping, phase damping, squeezed generalized amplitude damping noises, while entanglement-based protocols turn out to be preferable in the presence of collective noises. It is also observed that the effect of noise depends upon the number of rounds of quantum communication involved in a scheme of quantum communication. Further, it is observed that squeezing, a completely quantum mechanical resource present in the squeezed generalized amplitude channel, can be used in a beneficial way as it may yield higher fidelity compared to the corresponding zero squeezing case.

  17. Code Combining Based Cooperative LEACH Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Asaduzzaman; Kong, Hyung-Yun

    This letter proposes a simple modification of LEACH protocol to exploit its multi-hop scenario for user cooperation. Instead of a single cluster-head we propose M cluster-heads in each cluster to obtain the diversity of order M. All cluster-heads gather data from all sensor nodes within the cluster using the same technique as LEACH. Cluster-heads transmit gathered data cooperatively towards the destination or higher order cluster-head. We propose a code combining based cooperative protocol. We also develop the upper bounds on frame error rate (FER) for our proposal. Simulation and analysis show that our proposal can significantly prolong the system lifetime.

  18. A Clustering-Based Approach to Enriching Code Foraging Environment.

    Science.gov (United States)

    Niu, Nan; Jin, Xiaoyu; Niu, Zhendong; Cheng, Jing-Ru C; Li, Ling; Kataev, Mikhail Yu

    2016-09-01

    Developers often spend valuable time navigating and seeking relevant code in software maintenance. Currently, there is a lack of theoretical foundations to guide tool design and evaluation to best shape the code base to developers. This paper contributes a unified code navigation theory in light of the optimal food-foraging principles. We further develop a novel framework for automatically assessing the foraging mechanisms in the context of program investigation. We use the framework to examine to what extent the clustering of software entities affects code foraging. Our quantitative analysis of long-lived open-source projects suggests that clustering enriches the software environment and improves foraging efficiency. Our qualitative inquiry reveals concrete insights into real developer's behavior. Our research opens the avenue toward building a new set of ecologically valid code navigation tools. PMID:25910273

  19. Reformative multicast routing protocol based on Ad Hoc

    Institute of Scientific and Technical Information of China (English)

    杨喜旺; 王华; 焦国太

    2008-01-01

    Mobile Ad Hoc networks has been widely applied to military field, emergency management, public service and so on. Because it is uncertain on network and communication, a great deal of energy will be consumed with nodes increasing and creating routing each other. The reformative on-demand multicast routing protocol was putted forward by researching the energy consuming of multicast routing protocol in Ad Hoc. It will decrease consumption in a big multicast flooding through studying the relaying group net structure based on map or wormhole. The energy consumption is reduced 30% by creating the two kinds of routing principles: minimization of energy consumption and minimization of maximum nodes energy consumption. The simulation result indicates that the reformative RODMRP is effective to reduce the energy consuming while routing protocol built.

  20. Traffic Flow Analysis Model based Routing Protocol For Multi-Protocol Label Switching Network

    OpenAIRE

    E.R. Naganathan; Rajagopalan, S.; P. H. Raj

    2011-01-01

    Problem statement: Multi-Protocol Label Switching (MPLS) is a mechanism which is used in high-performance telecommunications networks that directs and carries data from one network node to the next with the help of labels. Traffic management is still an issue in MPLS network as it involves high speed internet. Approach: This study proposed a traffic flow analysis of the real time MPLS traffic and segregates the MPLS traffic as three major class based on the outcome of traffic flow analysis. U...

  1. Comprehensive evaluation of imidazole-based polymers for the enrichment of selected non-steroidal anti-inflammatory drugs.

    Science.gov (United States)

    Schemeth, Dieter; Kappacher, Christoph; Rainer, Matthias; Thalinger, Ramona; Bonn, Günther K

    2016-06-01

    This study reports the comparison of four manufactured imidazole-based copolymers and two commercially available hydrophilic sorbents for the solid phase extraction (SPE) of selected non-steroidal anti-inflammatory drugs (NSAID). Different hydrophilic copolymers were obtained by a suspension polymerization using a styrene-based and a methacrylate-based cross-linker and by single step modifications for enhancing the ion-exchange character. SPE protocols were optimized for both non-modified and modified sorbents and applied for the enrichment of selected NSAID using all six copolymers. Comparison and evaluation were carried out by determining recovery rates of standard mixtures at different concentration levels ranging from 0.5mgL(-1) to 10mgL(-1) and by the enrichment of spiked human urine at two concentration levels. In order to gain insight into the complexity of the biological sample and its reduction after solid phase extraction, UHPLC-MS analysis and following database comparison was performed for the three mixed-mode strong anion-exchange sorbents. In order to prove the applicability of the modified imidazole-based polymers for the enrichment of NSAID in surface water, river water or groundwater, solid phase extraction was performed with 10ppb of NSAID which resulted into enhanced enrichment by a hundredfold. PMID:27130106

  2. Explicit window-based transport control protocols in lossy environments

    OpenAIRE

    de Vleeschouwer, C.; Frossard, P.

    2004-01-01

    This paper addresses efficient packet loss recovery by retransmission in window-based congestion control protocols. It builds on explicit congestion control mechanisms to decouple the packet loss detection from the congestion feedback signals. Implicit algorithms alternatively infer congestion from losses (which yields to window size reduction), and therefore do not allow to evaluate the performance of window-based transmission algorithms in lossy environments. We first propose a simple modif...

  3. GAME (Goals - Activity - Motor Enrichment): protocol of a single blind randomised controlled trial of motor training, parent education and environmental enrichment for infants at high risk of cerebral palsy

    OpenAIRE

    Morgan, Catherine; Novak, Iona; Dale, Russell C; Guzzetta, Andrea; Badawi, Nadia

    2014-01-01

    Background Cerebral palsy is the most common physical disability of childhood and early detection is possible using evidence based assessments. Systematic reviews indicate early intervention trials rarely demonstrate efficacy for improving motor outcomes but environmental enrichment interventions appear promising. This study is built on a previous pilot study and has been designed to assess the effectiveness of a goal - oriented motor training and enrichment intervention programme, “GAME”, on...

  4. Resin-assisted enrichment of thiols as a general strategy for proteomic profiling of cysteine-based reversible modifications

    Energy Technology Data Exchange (ETDEWEB)

    Guo, Jia [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gaffrey, Matthew J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Su, Dian [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Genentech Inc., South San Francisco, CA (United States); Liu, Tao [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Camp, David G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Smith, Richard D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Qian, Weijun [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2013-12-12

    Reversible modifications on cysteine thiols play a significant role in redox signaling and regulation. A number of reversible redox modifications, including disulfide formation, S-nitrosylation, and S-glutathionylation, have been recognized for their significance in various physiological and pathological processes. Here we describe in detail a resin-assisted thiol-affinity enrichment protocol for both biochemical and proteomics applications. This protocol serves as a general approach for specific isolation of thiol-containing proteins or peptides derived from reversible redox-modified proteins. This approach utilizes thiol-affinity resins to directly capture thiol-containing proteins or peptides through a disulfide exchange reaction followed by on-resin protein digestion and on-resin multiplexed isobaric labeling to facilitate LC-MS/MS based quantitative site-specific analysis of redox modifications. The overall approach requires a much simpler workflow with increased specificity compared to the commonly used biotin switch technique. By coupling different selective reduction strategies, the resin-assisted approach provides the researcher with a useful tool capable of enriching different types of reversible modifications on protein thiols. Procedures for selective enrichment and analyses of S-nitrosylation and total reversible cysteine oxidation are presented to demonstrate the utility of this general strategy.

  5. An Efficient MAC Protocol for WLAN based on OFDM modulation

    Science.gov (United States)

    Michelini, Marco; Fantacci, Romano; Giacomelli, Marco

    2002-11-01

    We propose and analyze a MAC protocol aptly designed for WLAN, based on OFDM modulation. The goal of the analysis is to provide an efficient tool to deliver to voice and data terminals acceptable QoS connections, overcoming the problem of large number of retransmissions, high delays and low reliability. Simulation results show that, in a real environment, the proposed algorithm is able to achieve good performance in terms of throughput and message delivery delay.

  6. Low Cost ZigBee Protocol Based Laboratory Platforms

    OpenAIRE

    Alvaro Romero-Acero; Alejandro Marín-Cano; Eliana I. Arango-Zuluaga

    2013-01-01

    This paper presents a low cost wireless communication platform, based on the ZigBee protocol. It is designed with the purpose to strengthen the use of information technology in the classroom. Guides laboratory practices are focused on developing undergraduate engineering students to the area of telecommunications. The platform structure is composed of: Labs custom designed, web tools embedded wireless communication system for data acquisition in real time, and the Human Machine Interface (HMI...

  7. A Secure Cloud-Based NFC Mobile Payment Protocol

    Directory of Open Access Journals (Sweden)

    Pardis Pourghomi

    2014-10-01

    Full Text Available Near Field Communication (NFC is one the most recent technologies in the area of application development and service delivery via mobile phone. NFC enables the mobile phone to act as identification and a credit card for customers. Dynamic relationships of NFC ecosystem players in an NFC transaction process make them partners in a way that sometimes they should share their access permissions on the applications that are running in the service environment. One of the technologies that can be used to ensure secure NFC transactions is cloud computing which offers wide range advantages compare to the use of a Secure Element (SE as a single entity in an NFC enabled mobile phone. In this paper, we propose a protocol based on the concept of NFC mobile payments. Accordingly, we present an extended version of the NFC cloud Wallet model [14], in which, the Secure Element in the mobile device is used for customer authentication whereas the customer's banking credentials are stored in a cloud under the control of the Mobile Network Operator (MNO. In this circumstance, Mobile Network Operator plays the role of network carrier which is responsible for controlling all the credentials transferred to the end user. The proposed protocol eliminates the requirement of a shared secret between the Point-of-Sale (POS and the Mobile Network Operator before execution of the protocol, a mandatory requirement in the earlier version of this protocol [16]. This makes it more practicable and user friendly. At the end, we provide a detailed analysis of the protocol where we discuss multiple attack scenarios.

  8. Enhanced Location Based Routing Protocol for 6LoWPAN

    OpenAIRE

    M.Rehenasulthana; P. T. V. Bhuvaneswari; Rama, N.

    2012-01-01

    6LoWPAN (IPv6 over IEEE 802.15.4) standardized by IEEE 802.15.4 provides IP communication capability for nodes in WSN. An adaptation layer is introduced above the MAC layer to achieve header compression, fragmentation and reassembly of IP packets. The location-based information is used to simplify the routing policy. This paper proposes an efficient location-based routing protocol, considering link quality and distance between nodes as the routing metric. The proposed Enhanced Location-based ...

  9. Addition of novobiocin in pre-enrichment step can improve Salmonella culture protocol of modified semisolid Rappaport-Vassiliadis

    DEFF Research Database (Denmark)

    Jensen, Annette Nygaard; Sørensen, Gitte; Baggesen, Dorte Lau; Bødker, Rene; Hoorfar, Jeffrey

    2003-01-01

    , 90 samples opposed to 50 yielded a strong positive reading (+++) when Novobiocin was applied. Growth was on average 0.3 scores higher when pre-enriched with Novobiocin. The difference in growth score medians of the two methods was highly significant (Sign test; p <0.001). Despite the increased...... sensitivity, 13 culture-positive samples were missed when using the Novobiocin-containing BPW. In conclusion, a simple addition of Novobiocin in the BPW pre-enrichment step of fecal samples may facilitate reading and thereby detection of Salmonella on MSRV. The increase of Salmonella in the semi-quantitative......The aim was to investigate the effect of addition of Novobiocin to the non-selective buffered peptone water (BPW) for pre-enrichment of Salmonella in connection with plating on modified semisolid Rappaport-Vassiliadis (MSRV). In a semi-quantitative study, the level of Salmonella following pre...

  10. Weaknesses of a dynamic identity based authentication protocol for multi-server architecture

    CERN Document Server

    Han, Weiwei

    2012-01-01

    Recently, Li et al. proposed a dynamic identity based authentication protocol for multi-server architecture. They claimed their protocol is secure and can withstand various attacks. But we found some security loopholes in the protocol. Accordingly, the current paper demonstrates that Li et al.'s protocol is vulnerable to the replay attack, the password guessing attack and the masquerade attack.

  11. TABLE-BASED IDENTIFICATION PROTOCOL OF COMPUTATIONAL RFID TAGS

    Directory of Open Access Journals (Sweden)

    Yunmin Kim

    2015-12-01

    Full Text Available Computation RFID (CRFID expands the limit of traditional RFID by granting computational capability to RFID tags. RFID tags are powered by Radio-Frequency (RF energy harvesting. However, CRFID tags need extra energy and processing time than traditional RFID tags to sense the environment and generate sensing data. Therefore, Dynamic Framed Slotted ALOHA (DFSA protocol for traditional RFID is no longer a best solution for CRFID systems. In this paper, we propose a table-based CRFID tag identification protocol considering CRFID operation. An RFID reader sends the message with the frame index. Using the frame index, CRFID tags calculate the energy requirement and processing time information to the reader along with data transmission. The RFID reader records the received information of tags into a table. After table recording is completed, the optimal frame size and proper time interval is provided based on the table. The proposed CRFID tag identification protocol is shown to enhance the identification rate and the delay via simulations.

  12. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Directory of Open Access Journals (Sweden)

    Francisco José Bellido-Outeiriño

    2016-04-01

    Full Text Available Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  13. Streetlight Control System Based on Wireless Communication over DALI Protocol.

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  14. An Improved Directed Diffusion Protocol based on Opportunistic Routing

    Directory of Open Access Journals (Sweden)

    Yi Xu

    2014-05-01

    Full Text Available Researchers are paying more and more attention to the application of wireless sensor networks (WSNs, where routing is one of the vital techniques. An advanced Directed Diffusion protocol, named DDOR, is presented in this paper based on Opportunistic Routing to improve the disadvantage of mono-forwarder of traditional routing protocol. Packet head has been modified in order to implement a forwarder list in DDOR. Instead of fixed next-hop forwarding in transmission, DDOR selects the optimal node to forward. DDOR mechanism can effectively save energy of WSNs by decreasing the hops from sources to sinks, thereby extends the life of WSNs. A large number of simulations prove that DDOR is feasible. Compared with Directed Diffusion, DDOR does decrease the energy consumption on packets forwarding

  15. Research and Implementation of Collision Detection Based on Modbus Protocol

    Directory of Open Access Journals (Sweden)

    Yinglan Fang

    2013-01-01

    Full Text Available In order to solve the communication errors resulted by traditional working condition multi-platform device communication using the custom protocol communication and link congestion malpractice brought by retransmission, it ensures network communication using time-sharing communication conflict detection based on mature Modbus protocol. Thereby it enhances the stability of the entire system during operation process, and provides simple, efficient, stable business specification interface for the future expansion of the system. After a comprehensive evaluation and analysis of system communication messages before and after improvement, system comprehensive evaluation target has improved. While the system is more flexible to modular design, develop transparent, structure open side and has a broad application prospects.

  16. Research of Video Steganalysis Algorithm Based on H265 Protocol

    Directory of Open Access Journals (Sweden)

    Wu Kaicheng

    2015-01-01

    This paper researches LSB matching VSA based on H265 protocol with the research background of 26 original Video sequences, it firstly extracts classification features out from training samples as input of SVM, and trains in SVM to obtain high-quality category classification model, and then tests whether there is suspicious information in the video sample. The experimental results show that VSA algorithm based on LSB matching can be more practical to obtain all frame embedded secret information and carrier and video of local frame embedded. In addition, VSA adopts the method of frame by frame with a strong robustness in resisting attack in the corresponding time domain.

  17. Modular approach to the design and analysis of password-based security protocols

    Institute of Scientific and Technical Information of China (English)

    FENG DengGuo; CHEN WeiDong

    2007-01-01

    In this paper, a general framework for designing and analyzing password-based security protocols is presented, First we introduce the concept of "weak computational indistinguishability" based on current progress of password-based security protocols. Then, we focus on cryptographic foundations for password-based security protocols, i.e., the theory of "weak pseudorandomness". Furthermore, based on the theory of weak pseudorandomness, we present a modular approach to design and analysis of password-based security protocols. Finally, applying the modular approach, we design two kinds of password-based security protocols, i.e.,password-based session key distribution (PSKD) protocol and protected password change (PPC) protocol. In addition to having forward secrecy and improved efficiency, new protocols are proved secure.

  18. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    Directory of Open Access Journals (Sweden)

    Jamal N. Al-Karaki

    2011-04-01

    Full Text Available The new characteristics of Wireless Multimedia Sensor Network (WMSN and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  19. A Tree Based Routing Protocol for Mobile Sensor Networks (MSNs

    Directory of Open Access Journals (Sweden)

    Mrityunjay Singh

    2010-01-01

    Full Text Available Wireless Sensor Networks (WSNs has foreseen big changes in data gathering, processing and disseminating for monitoring specific applications such as emergency services, disaster management, and military applications etc. Wireless sensor networks (WSN's are application dependent. Wireless sensor network can be classified into Static Sensor Network (SSN & Mobile Sensor Network (MSN. In Static Sensor Network, the sensor nodes localize only first time during deployment. In case of Mobile Sensor Network, nodes collect the data by moving from one place to another place hence localization is needed. Mobile sensor networks are more energy efficient, better targeting and provide more data fidelity than Static Sensor Network (SSN. Mobile Sensor networks have gained great attention in recent years due to their ability to offer economical and effective solutions in a variety of fields. There are many routing protocols present for the static sensor network. In this paper we have present a Tree based Routing Protocols (TBRP for mobile sensor network. TBRP was compared with LEACH and TEEN Protocol. Simulation results show that TBRP outperforms LEACH and TEEN in terms of mobility, energy efficiency & network life time.

  20. Energy Band Based Clustering Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Prabhat Kumar

    2012-07-01

    Full Text Available Clustering is one of the widely used techniques to prolong the lifetime of wireless sensor networks in environments where battery replacement of individual sensor nodes is not an option after their deployment. However, clustering overheads such as cluster formation, its size, cluster head selection rotation, directly affects the lifetime of WSN. This paper introduces and analyzes a new Single Hop Energy Band Based clustering protocol (EBBCP which tries to minimize the above said overheads resulting in a prolonged life for the WSN. EBBCP works on static clusters formed on the basis of energy band in the setup phase. The protocol reduces per round overhead of cluster formation which has been proved by the simulation result in MATLAB. The paper contains an in-depth analysis of the results obtained during simulation and compares EBBCP with LEACH. Unlike LEACH, EBBCP achieves evenly distributed Cluster Head throughout the target area. This protocol also produces evenly distributed dead nodes. EEBCP beats LEACH in total data packet received and produces better network life time. EBBCP uses the concept of grid node to eliminate the need of position finding system like GPS to estimating the transmission signal strength.

  1. Evaluation of Methyl-Binding Domain Based Enrichment Approaches Revisited.

    Directory of Open Access Journals (Sweden)

    Karolina A Aberg

    Full Text Available Methyl-binding domain (MBD enrichment followed by deep sequencing (MBD-seq, is a robust and cost efficient approach for methylome-wide association studies (MWAS. MBD-seq has been demonstrated to be capable of identifying differentially methylated regions, detecting previously reported robust associations and producing findings that replicate with other technologies such as targeted pyrosequencing of bisulfite converted DNA. There are several kits commercially available that can be used for MBD enrichment. Our previous work has involved MethylMiner (Life Technologies, Foster City, CA, USA that we chose after careful investigation of its properties. However, in a recent evaluation of five commercially available MBD-enrichment kits the performance of the MethylMiner was deemed poor. Given our positive experience with MethylMiner, we were surprised by this report. In an attempt to reproduce these findings we here have performed a direct comparison of MethylMiner with MethylCap (Diagenode Inc, Denville, NJ, USA, the best performing kit in that study. We find that both MethylMiner and MethylCap are two well performing MBD-enrichment kits. However, MethylMiner shows somewhat better enrichment efficiency and lower levels of background "noise". In addition, for the purpose of MWAS where we want to investigate the majority of CpGs, we find MethylMiner to be superior as it allows tailoring the enrichment to the regions where most CpGs are located. Using targeted bisulfite sequencing we confirmed that sites where methylation was detected by either MethylMiner or by MethylCap indeed were methylated.

  2. Enhancement of an Authenticated 3-round Identity-Based Group Key Agreement Protocol

    Directory of Open Access Journals (Sweden)

    Wei Yuan

    2011-11-01

    Full Text Available In 2008, Gang Yao et al. proposed an authenticated 3-round identity-based group key agreement protocol, which is based on Burmester and Desmedt’s protocol proposed at Eurocrypt 94. However, their protocol can only prevent passive attack. If the active attack is allowed, the protocol is vulnerable and an internal attacker can forge her neighbor’s keying material. It is obvious that the protocol do not achieve the aim of authentication. In this paper, we discuss the flaws to attack this protocol and propose an enhanced provably-secure protocol based on their protocol. At last, we make a detailed security analysis of our enhanced authenticated identity-based group key agreement protocol.

  3. On the Linearization of Human Identification Protocols: Attacks based on Linear Algebra, Coding Theory and Lattices

    OpenAIRE

    Asghar, HJ; Steinfeld, R.; Li, S.; Kaafar, MA; Pieprzyk, J

    2015-01-01

    Human identification protocols are challenge-response protocols that rely on human computational ability to reply to random challenges from the server based on a public function of a shared secret and the challenge to authenticate the human user. One security criterion for a human identification protocol is the number of challenge-response pairs the adversary needs to observe before it can deduce the secret. In order to increase this number, protocol designers have tried to construct protocol...

  4. Epeerdemics: a peer-to-peer simulator targeting epidemic-based protocols

    OpenAIRE

    Dazzi, Patrizio; Carlini, Emanuele

    2013-01-01

    In the last decade, several P2P simulators have been proposed. Essentially, they differ in the level of abstraction provided, the programming language used and flexibility in developing protocols. To ease the evaluation and comparison of protocols, these simulators are often bundled with several well-known protocols. Unfortunately, only a few P2P simulators are specific to unstructured protocols and only a subset of them provide a bundle of epidemic-based protocols as baselines for testing. W...

  5. Cryptanalysis of Pasargad, A Distance Bounding Protocol Based on RFID System

    OpenAIRE

    Mahdi Azizi; Abdolrasol Mirgadri; Nasour Bagheri

    2012-01-01

    In this paper we analyze an authentication protocol so-called Pasargad which proposed by Arjemand et al. [1]. The Pasargad protocol is a distance bounding protocol which has been designed for RFID-based electronic voting systems. The designers have claimed that this protocol is more secure than Preneel and Single protocol [2], against relay attacks. However, in this paper, we present some efficient attacks against it. Our attacks include conditional impersonation attack and recovery key attac...

  6. Quantum Private Query Protocol Based on Two Non-Orthogonal States

    OpenAIRE

    Yan Chang; Shibin Zhang; Guihua Han; Zhiwei Sheng; Lili Yan; Jinxin Xiong

    2016-01-01

    We propose a loss tolerant quantum private query (QPQ) protocol based on two non-orthogonal states and unambiguous state discrimination (USD) measurement. By analyzing a two-point attack by a third party, we find that our protocol has a stronger ability to resist external attacks than G-protocol and Y-protocol. Our protocol requires a smaller number of compressions than that in G-protocol (Gao et al., Opt. Exp. 2012, 20, 17411–17420) and Y-protocol (Yan et al. Quant. Inf. Process. 2014, 13, 8...

  7. Low Cost ZigBee Protocol Based Laboratory Platforms

    Directory of Open Access Journals (Sweden)

    Alvaro Romero-Acero

    2013-11-01

    Full Text Available This paper presents a low cost wireless communication platform, based on the ZigBee protocol. It is designed with the purpose to strengthen the use of information technology in the classroom. Guides laboratory practices are focused on developing undergraduate engineering students to the area of telecommunications. The platform structure is composed of: Labs custom designed, web tools embedded wireless communication system for data acquisition in real time, and the Human Machine Interface (HMI, which records analog data and digital. 

  8. Data mining based on gradual itemsets extraction : contextualization and enrichment

    OpenAIRE

    Oudni, Amal

    2014-01-01

    This thesis's works belongs to the framework of knowledge extraction and data mining applied to numerical or fuzzy data in order to extract linguistic summaries in the form of gradual itemsets: the latter express correlation between attribute values of the form « the more the temperature increases, the more the pressure increases ». Our goal is to contextualize and enrich these gradual itemsets by proposing different types of additional information so as to increase their quality and provide ...

  9. Two RFID standard-based security protocols for healthcare environments.

    Science.gov (United States)

    Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E

    2013-10-01

    Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations. PMID:23949845

  10. Kyoto Protocol, constraint or opportunity for coal based electricity producers

    International Nuclear Information System (INIS)

    Coming into force of Kyoto Protocol (KP) in February 2005, as a result of its signing by Russian Federation, created the lawfulness of its provisions and mechanisms in order to reduce the average emission of Greenhouse Gases (GHG) at a global level down to 5.2 %. Passing this environment problem from a constrained area (regulations, directives) to an opportunity area (business) created the possibility that the achievement of KP objectives to be not an exclusive financial task of 'polluting actors', but opened the opportunity of bringing on stage all the necessary elements of a modern business environment: banks, investments from founds companies, consultants, buyers, sellers, stocks exchange. Until now, the investments and emissions transactions based by KP mechanisms at the worldwide level was focused on renewable energy area. Because for the most of countries, including Romania, the production of electricity based on fossil fuels (special coal) is one of the main option, bringing the KP mechanisms in operation in this area is difficult for at least two reasons: - the investments are huge; - the emissions reduction is not spectacular. In these circumstances, this paper gives an overview of the present GHG emission market, transaction mechanisms on this market and of the ways through which coal based electricity producers from Romania can access this market. We consider that the filtration of the information in this area from electricity producer point of view makes the content of this paper a good start for a new approach of environment management and its conversion from constraint (financial resources consumer) to opportunity ( financial resources producer). The paper contains are as follows: 1. Kyoto Protocol at a glance; 2. Emission trading mechanisms; 2.1. Transaction mechanisms under KP; 2.1.1. Joint Implementation (JI); 2.1.2 Clean Development Mechanism (CDM); 2.1.3. Emissions Trading (ET); 2.2. Other transactions mechanisms; 2.2.1. European Union Emissions

  11. A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Comparison of Routing Protocol for WSNs: Redundancy Based Approach

    Directory of Open Access Journals (Sweden)

    Anand Prakash

    2014-03-01

    Full Text Available Wireless Sensor Networks (WSNs with their dynamic applications gained a tremendous attention of researchers. Constant monitoring of critical situations attracted researchers to utilize WSNs at vast platforms. The main focus in WSNs is to enhance network localization as much as one could, for efficient and optimal utilization of resources. Different approaches based upon redundancy are proposed for optimum functionality. Localization is always related with redundancy of sensor nodes deployed at remote areas for constant and fault tolerant monitoring. In this work, we propose a comparison of classic flooding and the gossip protocol for homogenous networks which enhances stability and throughput quiet significantly.  

  12. An Anonymous Authenticated Protocol Based on Zero Knowledge Proof

    Directory of Open Access Journals (Sweden)

    Chao Jing

    2012-11-01

    Full Text Available With the rapid development of the Internet, anonymity and privacy protection in many applications of the scene is critical. The anonymous authentication means that the server cant know the users identity when they are communicating with each other. In this paper, based on the Wangs zero knowledge proof scheme of possessing a digital signature, we propose a new anonymous authentication scheme. Compared with the Cui-Caos anonymous authentication protocol based on the ring signature, our scheme has two advantages. First, we dont need to know all users public keys. And then our scheme reduces the communication traffic largely. We also discuss the security attributes of our new scheme which are authentication, anonymity and unlinkablity. And then we introduce a concrete application of our scheme. Finally, we make a conclusion of this paper.

  13. Reputation-based Incentive Protocols in Crowdsourcing Applications

    CERN Document Server

    Zhang, Yu

    2011-01-01

    Crowdsourcing websites (e.g. Yahoo! Answers, Amazon Mechanical Turk, and etc.) emerged in recent years that allow requesters from all around the world to post tasks and seek help from an equally global pool of workers. However, intrinsic incentive problems reside in crowdsourcing applications as workers and requester are selfish and aim to strategically maximize their own benefit. In this paper, we propose to provide incentives for workers to exert effort using a novel game-theoretic model based on repeated games. As there is always a gap in the social welfare between the non-cooperative equilibria emerging when workers pursue their self-interests and the desirable Pareto efficient outcome, we propose a novel class of incentive protocols based on social norms which integrates reputation mechanisms into the existing pricing schemes currently implemented on crowdsourcing websites, in order to improve the performance of the non-cooperative equilibria emerging in such applications. We first formulate the exchange...

  14. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    Science.gov (United States)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  15. Quantum Private Query Protocol Based on Two Non-Orthogonal States

    Directory of Open Access Journals (Sweden)

    Yan Chang

    2016-05-01

    Full Text Available We propose a loss tolerant quantum private query (QPQ protocol based on two non-orthogonal states and unambiguous state discrimination (USD measurement. By analyzing a two-point attack by a third party, we find that our protocol has a stronger ability to resist external attacks than G-protocol and Y-protocol. Our protocol requires a smaller number of compressions than that in G-protocol (Gao et al., Opt. Exp. 2012, 20, 17411–17420 and Y-protocol (Yan et al. Quant. Inf. Process. 2014, 13, 805–813, which means less post-processing. Our protocol shows better database security and user privacy compared with G-protocol.

  16. A Quantitative Evaluation Method of Satellite Network Control Protocol based on Multi-attribute Utility Theory

    Directory of Open Access Journals (Sweden)

    Zhu Jun

    2016-01-01

    Full Text Available Satellite network control protocol plays an important part in satellite communication system. Different design schemes of protocol have very different protocol attribute values. It is difficult to select a proper protocol solution from many solution alternatives with quite different protocol attributes, especially some mutual conflicted protocol attributes. Thereupon, this paper provides a multi-attribute utility theory based quantitative method to evaluate these protocol design schemes, in order to make a wise decision on how to select protocol solution. This method introduces several critical protocol attributes by utilizing a Petri net model, and aggregates them into a decision making matrix. On the basis of multi-attribute utility theory, quantitative evaluation values are achieved with the support of user attribute preference weight vectors. In the end, the paper presents experiments and discussions.

  17. UDP-Based Multi-Stream Communication Protocol

    Directory of Open Access Journals (Sweden)

    Vandana Vijay Belkhode

    2013-05-01

    Full Text Available A network of the system is build with the help of all hardware and software. These all software and hardware components connected together. But the question is how used these devices or components together? The answer is, to share the resources of these device and component together! These resources could be containing various files, a printer and also web pages, e-mail, massages, pictures, MMS etc. The goal of networking and internet technology is to make resource shared by the remote system function like a resource on a local system. As discussed, there are various components involved while constructing a network. In these we have to discuss about two basic protocols one is connectionless and other is connection-oriented. In connectionless protocol handshaking are not required but in connection-oriented protocol handshaking process are most important. UDP (user datagram protocol is an example of connectionless protocol, TCP (transmission control protocol is connection-oriented protocol. A connection-oriented communication is a data communication made that requires an overhead in setting up a request for connection before sending any type of data communication message. In Connectionless Protocol cannot require any type of handshaking process for sending a data. This communication method in which communication occurs between hosts. The device at one end of the communication transmits data to the other, without first ensuring that the delivery report is available and ready to accepting the data. The server sending a message to sends it addressed to the intended recipient. The Internet Protocol (IP and User Datagram Protocol (UDP are connectionless protocols, but TCP/IP (the most common use of IP is connection-oriented. Here we have to study how to use UDP connectionless protocol as a connection oriented protocol. But these two protocols are not sufficient for today’s internet. Today we want more flexible, more efficient protocol. For fulfill is

  18. Development of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    The communication protocol, which provide overall communication rules and methods and give ways how to exchange information, is the most important part and it can affect the overall performance of communication network. Therefore, the first step of development of the communication network of an NPP is its own communication protocol design, which conforms to the requirements and characteristics of an NPP I and C. To manage the protocol development process, we establish development procedure and define detail substantive based on the procedure and we examine the adaptability of existing commercial communication protocols to the communication protocol of an NPP I and C. Existing commercial communication protocols based on Information Technology(IT) can be categorized into 3 groups: general commercial communication protocols, industrial communication protocols, military communication protocols. We analyze the design criteria and performance requirements of popular protocols in each group. And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications

  19. Data acquisition and meter unit based in wifi communication protocol

    Directory of Open Access Journals (Sweden)

    Gerardo Cázarez Ayala

    2012-05-01

    Full Text Available Without doubt, the competitive fast rhythm of the industries is one of the main causes helped bring to the accelerated growth of the electronic technology and the communication. The need to develop new products with a best quality, cheaper and faster as assure and increase the quality of the products in the international markets, requires of new technologies to the metering, monitoring and control of their production processes, of which finality is to improve the processes to guaranteed their products in the market in the less time possible, the best quality and low cost for the final consumer. This work is based in the design and implementation of a Wireless Data Acquisition Unit based in WiFi protocol, which is oriented to meter, monitoring and the control of processes in the industry, commercial and the home automation applications, using one of the wirelessprotocols with the biggest acceptance in the market, with the main objective of to take advantage of the installed physical infrastructure in the place of the application, like industry, company or house. The Unit is based in the RN-131G, a Roving Network company module, which is able to work in stand-alone mode with ultralow power consummation and supporting the IEEE 802.11b/g protocols, in which is possible to achieve transfer rates of up to 11 Mbps and 54 Mbps in /b & /g specifications respectively. Whit this unit is possible to meter up to 5 analogs signals with 14 bits precision and has include a temperature and relative humidity sensors. This unit can meter two digital signals and act mean two digitals outputs, and gas include an USB port for communication and programming tasks.

  20. VANET Clustering Based Routing Protocol Suitable for Deserts

    Science.gov (United States)

    Mohammed Nasr, Mohammed Mohsen; Abdelgader, Abdeldime Mohamed Salih; Wang, Zhi-Gong; Shen, Lian-Feng

    2016-01-01

    In recent years, there has emerged applications of vehicular ad hoc networks (VANETs) towards security, safety, rescue, exploration, military and communication redundancy systems in non-populated areas, besides its ordinary use in urban environments as an essential part of intelligent transportation systems (ITS). This paper proposes a novel algorithm for the process of organizing a cluster structure and cluster head election (CHE) suitable for VANETs. Moreover, it presents a robust clustering-based routing protocol, which is appropriate for deserts and can achieve high communication efficiency, ensuring reliable information delivery and optimal exploitation of the equipment on each vehicle. A comprehensive simulation is conducted to evaluate the performance of the proposed CHE and routing algorithms. PMID:27058539

  1. TCP-Rab:a receiver advertisement based TCP protocol

    Institute of Scientific and Technical Information of China (English)

    汤旭红; 刘正蓝; 朱淼良

    2004-01-01

    With the evolution of network technologies,the deficiencies of TCP protocol are becoming more and more distinct. The new TCP implementation,called Receiver Advertisement Based TCP(TCP-Rab)proposed here to eliminate these deficiencies,adopts two basic mechanisms:(1)Bandwidth Estimation and(2)Immediate Recovery. Bandwidth estimation is carried out at the receiver,and the result is sent back to the sender via the acknowledgments. Immediate Recovery guarantees high performance even in lossy link. Rab can distinguish the reason for packet loss,and thus adopt appropriate recovery strategy. For loss by network congestion,it will back off its congestion window,and for loss by link errors,it will recover the congestion window immediately. Simulations indicated that Rah has superiority over other TCP implementations.

  2. TCP-Rab: a receiver advertisement based TCP protocol

    Institute of Scientific and Technical Information of China (English)

    汤旭红; 刘正蓝; 朱淼良

    2004-01-01

    With the evolution of network technologies, the deficiencies of TCP protocol are becoming more and more distinct. The new TCP implementation, called Receiver Advertisement Based TCP (TCP-Rab) proposed here to eliminate these deficiencies, adopts two basic mechanisms: (1) Bandwidth Estimation and (2) Immediate Recovery. Bandwidth estimation is carried out at the receiver, and the result is sent back to the sender via the acknowledgments. Immediate Recovery guarantees high performance even in lossy link. Rab can distinguish the reason for packet loss, and thus adopt appropriate recovery strategy. For loss by network congestion, it will back off its congestion window, and for loss by link errors, it will recover the congestion window immediately. Simulations indicated that Rab has superiority over other TCP implementations.

  3. A Data-origin Authentication Protocol Based on ONOS Cluster

    Directory of Open Access Journals (Sweden)

    Qin Hua

    2016-01-01

    Full Text Available This paper is aim to propose a data-origin authentication protocol based on ONOS cluster. ONOS is a SDN controller which can work under a distributed environment. However, the security of an ONOS cluster is seldom considered, and the communication in an ONOS cluster may suffer from lots of security threats. In this paper, we used a two-tier self-renewable hash chain for identity authentication and data-origin authentication. We analyse the security and overhead of our proposal and made a comparison with current security measure. It showed that with the help of our proposal, communication in an ONOS cluster could be protected from identity forging, replay attacks, data tampering, MITM attacks and repudiation, also the computational overhead would decrease apparently.

  4. VANET Clustering Based Routing Protocol Suitable for Deserts.

    Science.gov (United States)

    Mohammed Nasr, Mohammed Mohsen; Abdelgader, Abdeldime Mohamed Salih; Wang, Zhi-Gong; Shen, Lian-Feng

    2016-01-01

    In recent years, there has emerged applications of vehicular ad hoc networks (VANETs) towards security, safety, rescue, exploration, military and communication redundancy systems in non-populated areas, besides its ordinary use in urban environments as an essential part of intelligent transportation systems (ITS). This paper proposes a novel algorithm for the process of organizing a cluster structure and cluster head election (CHE) suitable for VANETs. Moreover, it presents a robust clustering-based routing protocol, which is appropriate for deserts and can achieve high communication efficiency, ensuring reliable information delivery and optimal exploitation of the equipment on each vehicle. A comprehensive simulation is conducted to evaluate the performance of the proposed CHE and routing algorithms. PMID:27058539

  5. Analysis of security protocols based on challenge-response

    Institute of Scientific and Technical Information of China (English)

    LUO JunZhou; YANG Ming

    2007-01-01

    Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the existing analysis methods,which either adopt theorem proving techniques such as state exploration or logic reasoning techniques such as authentication logic, face the conflicts between analysis power and operability. To solve the problem, a new efficient method is proposed that provides SSM semantics-based definition of secrecy and authentication goals and applies authentication logic as fundamental analysis techniques,in which secrecy analysis is split into two parts: Explicit-Information-Leakage and Implicit-Information-Leakage, and correspondence analysis is concluded as the analysis of the existence relationship of Strands and the agreement of Strand parameters. This new method owns both the power of the Strand Space Model and concision of authentication logic.

  6. Development of pig welfare assessment protocol integrating animal-, environment-, and management-based measures

    OpenAIRE

    Renggaman, Anriansyah; Choi, Hong L.; Sudiarto, Sartika IA; Alasaarela, Laura; Nam, Ok S

    2015-01-01

    Abstract Background Due to increased interest in animal welfare, there is now a need for a comprehensive assessment protocol to be used in intensive pig farming systems. There are two current welfare assessment protocols for pigs: Welfare Quality® Assessment Protocols (applicable in the Europe Union), that mostly focuses on animal-based measures, and the Swine Welfare Assura...

  7. Whole-Exome Enrichment with the Illumina TruSeq Exome Enrichment Platform

    OpenAIRE

    Chen, Rui; Im, Hogune; Snyder, Michael

    2015-01-01

    Multiple platforms are available for whole-exome enrichment and sequencing (WES). This protocol is based on the Illumina TruSeq Exome Enrichment platform, which captures ~62 Mb of the human exonic regions using 95-base DNA probes. In addition to covering the RefSeq and Ensembl coding sequences, the enriched sequences also include ~28 Mb of RefSeq untranslated regions (UTR). The protocol can be performed at the benchside without the need for automation, and the resulting library can be used fo...

  8. A search-based approach to the automated design of security protocols

    OpenAIRE

    Hao, C.; Clark, JA; Jacob, Jeremy Lawrence

    2004-01-01

    Security protocols play an important role in modern communications. However, security protocol development is a delicate task; experience shows that computer security protocols are notoriously difficult to get right. Recently, Clark and Jacob provided a framework for automatic protocol generation based on combinatorial optimisation techniques and the symmetric key part of BAN logic. This paper shows how such an approach can be further developed to encompass the full BAN logic without loss of ...

  9. Modified Quantum Three Pass Protocol Based on Hybrid Cryptosystem

    OpenAIRE

    Abdullah, Alharith Abdulkareem

    2015-01-01

    In this thesis we propose an enhancement to the Quantum Three-Pass Protocol (QTPP) by adding quantum authentication. After detailed analysis of all possible classical as well as quantum attack methods of the original Quantum Three-Pass Protocol, we identified, that the original Quantum Three-Pass Protocol is only vulnerable against the man-in-the-middle attack. By adding authentication and an agent called the Quantum Distribution Centre, the man-in-the-middle attack is eliminated. All communi...

  10. A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles

    Institute of Scientific and Technical Information of China (English)

    Hai-Bo Tian; Willy Susilo; Yang Ming; Yu-Min Wang

    2008-01-01

    In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key confirmation keys so that there is no direct usage of hash functions in the protocol. The protocol is proved secure without random oracles in a variant of Bellare and Rogaway style model, an exception to current proof method in this style model in the ID-based setting. We believe that this key isolation method is novel and can be further studied for constructing more efficient protocols.

  11. Network Coding-Based Congestion Control at Network Layer: Protocol Design and Evaluation

    Directory of Open Access Journals (Sweden)

    Zsuzsanna Ilona Kiss

    2011-01-01

    Full Text Available The paper proposes a congestion control protocol based on Network Coding (NC operations for thebutterfly topology. The proposed protocol defines XOR-based coding and decoding algorithms adapted tostreams having different rates and characteristics, as well as a signalling protocol required for dynamicactivation and deactivation of NC operations. Some general principles related to the integration of NCoperations into data transmission protocols are also discussed. The congestion control protocol proposedwas simulated in OMNeT++ and implemented in a real network to demonstrate its feasibility and to testthe functioning of the proposed coding and signalling algorithm in different scenarios.

  12. Enhancement of an Authenticated 3-round Identity-Based Group Key Agreement Protocol

    OpenAIRE

    Wei Yuan; Liang Hu; Hongtu Li; Jianfeng Chu; Yuyu Sun

    2011-01-01

    In 2008, Gang Yao et al. proposed an authenticated 3-round identity-based group key agreement protocol, which is based on Burmester and Desmedt’s protocol proposed at Eurocrypt 94. However, their protocol can only prevent passive attack. If the active attack is allowed, the protocol is vulnerable and an internal attacker can forge her neighbor’s keying material. It is obvious that the protocol do not achieve the aim of authentication. In this paper, we discuss the flaws to attack ...

  13. Design and Implementation of Embedded Transmission Control Protocol/Internet Protocol Network Based on System-on-programmable Chip

    Institute of Scientific and Technical Information of China (English)

    LUO Yong; HAN Xiao-jun

    2008-01-01

    A scheme of transmission control protocol/Internet protocol(TCP/IP) network system based on system-on-programmable chip(SOPC) is proposed for the embedded network communication. In this system, Nios processor, Ethernet controller and other peripheral logic circuits are all integrated on a Stratix Ⅱ field programmable gate array(FPGA) chip by using SOPC builder design software. And the network communication is realized by transplanting MicroC/OS Ⅱ(μC/OS Ⅱ) operation system and light weight Internet protocol(LwIP). The design idea, key points and the structures of both software and hardware of the system are presented and ran with a telecommunication example. The experiment shows that the embedded TCP/IP network system has high reliability and real-time performance.

  14. FUZZY LOGIC BASED ENERGY EFFICIENT PROTOCOL IN WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Zhan Wei Siew

    2012-12-01

    Full Text Available Wireless sensor networks (WSNs have been vastly developed due to the advances in microelectromechanical systems (MEMS using WSN to study and monitor the environments towards climates changes. In environmental monitoring, sensors are randomly deployed over the interest area to periodically sense the physical environments for a few months or even a year. Therefore, to prolong the network lifetime with limited battery capacity becomes a challenging issue. Low energy adaptive cluster hierarchical (LEACH is the common clustering protocol that aim to reduce the energy consumption by rotating the heavy workload cluster heads (CHs. The CHs election in LEACH is based on probability model which will lead to inefficient in energy consumption due to least desired CHs location in the network. In WSNs, the CHs location can directly influence the network energy consumption and further affect the network lifetime. In this paper, factors which will affect the network lifetime will be presented and the demonstration of fuzzy logic based CH selection conducted in base station (BS will also be carried out. To select suitable CHs that will prolong the network first node dies (FND round and consistent throughput to the BS, energy level and distance to the BS are selected as fuzzy inputs.

  15. Cooperative MIMO Transmissions in WSN Using Threshold Based MAC Protocol

    OpenAIRE

    Vidhya, J.; Dananjayan, P.

    2010-01-01

    Sensor networks require robust and efficient communication protocols to maximise the network lifetime.Radio irregularity, channel fading and interference results in larger energy consumption and latency forpacket transmission over wireless channel. Cooperative multi-input multi-output (MIMO) schemes whenincorporated in wireless senor network (WSN) can significantly improve the communicationperformance. An inefficiently designed medium access control (MAC) protocol however, may diminishthe per...

  16. PS-LTL for constraint-based security protocol analysis

    NARCIS (Netherlands)

    Corin, Ricardo; Saptawijaya, Ari; Etalle, Sandro

    2005-01-01

    Several formal approaches have been proposed to analyse security protocols, e.g. [2,7,11,1,6,12]. Recently, a great interest has been growing on the use of constraint solving approach. Initially proposed by Millen and Shmatikov [9], this approach allows analysis of a finite number of protocol sessio

  17. Management of the infertile couple: an evidence-based protocol

    Directory of Open Access Journals (Sweden)

    Kamel Remah M

    2010-03-01

    Full Text Available Abstract Background Infertility is defined as inability of a couple to conceive naturally after one year of regular unprotected sexual intercourse. It remains a major clinical and social problem, affecting perhaps one couple in six. Evaluation usually starts after 12 months; however it may be indicated earlier. The most common causes of infertility are: male factor such as sperm abnormalities, female factor such as ovulation dysfunction and tubal pathology, combined male and female factors and unexplained infertility. Objectives The aim of this study is to provide the healthcare professionals an evidence-based management protocol for infertile couples away from medical information overload. Methods A comprehensive review where the literature was searched for "Management of infertility and/or infertile couples" at library website of University of Bristol (MetaLib by using a cross-search of different medical databases besides the relevant printed medical journals and periodicals. Guidelines and recommendations were retrieved from the best evidence reviews such as that from the American College of Obstetricians and Gynaecologists (ACOG, American Society for Reproductive Medicine (ASRM, Canadian Fertility and Andrology Society (CFAS, and Royal College of Obstetricians and Gynaecologists (RCOG. Results A simple guide for the clinicians to manage the infertile couples. Conclusions The study deploys a new strategy to translate the research findings and evidence-base recommendations into a simplified focused guide to be applied on routine daily practice. It is an approach to disseminate the recommended medical care for infertile couple to the practicing clinicians.

  18. Data distribution architecture based on standard real time protocol

    International Nuclear Information System (INIS)

    Data distribution architecture (DDAR) has been designed conforming to new requirements, taking into account the type of data that is going to be generated from experiments in International Thermonuclear Experimental Reactor (ITER). The main goal of this architecture is to implement a system that is able to manage on line all data that is being generated by an experiment, supporting its distribution for: processing, storing, analysing or visualizing. The first objective is to have a distribution architecture that supports long pulse experiments (even hours). The described system is able to distribute, using real time protocol (RTP), stored data or live data generated while the experiment is running. It enables researchers to access data on line instead of waiting for the end of the experiment. Other important objective is scalability, so the presented architecture can easily grow based on actual necessities, simplifying estimation and design tasks. A third important objective is security. In this sense, the architecture is based on standards, so complete security mechanisms can be applied, from secure transmission solutions until elaborated access control policies, and it is full compatible with multi-organization federation systems as PAPI or Shibboleth.

  19. Data distribution architecture based on standard real time protocol

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R. [Asociacion EURATOM/CIEMAT para Fusion, Avda. Complutense No. 22, 28040 Madrid (Spain)], E-mail: rodrigo.castro@ciemat.es; Vega, J.; Pereira, A.; Portas, A. [Asociacion EURATOM/CIEMAT para Fusion, Avda. Complutense No. 22, 28040 Madrid (Spain)

    2009-06-15

    Data distribution architecture (DDAR) has been designed conforming to new requirements, taking into account the type of data that is going to be generated from experiments in International Thermonuclear Experimental Reactor (ITER). The main goal of this architecture is to implement a system that is able to manage on line all data that is being generated by an experiment, supporting its distribution for: processing, storing, analysing or visualizing. The first objective is to have a distribution architecture that supports long pulse experiments (even hours). The described system is able to distribute, using real time protocol (RTP), stored data or live data generated while the experiment is running. It enables researchers to access data on line instead of waiting for the end of the experiment. Other important objective is scalability, so the presented architecture can easily grow based on actual necessities, simplifying estimation and design tasks. A third important objective is security. In this sense, the architecture is based on standards, so complete security mechanisms can be applied, from secure transmission solutions until elaborated access control policies, and it is full compatible with multi-organization federation systems as PAPI or Shibboleth.

  20. An Efficient Agent-Based AODV Routing Protocol in MANET

    Directory of Open Access Journals (Sweden)

    Preeti Bhati,

    2011-07-01

    Full Text Available A MANET (Mobile Adhoc Network consists of a collection of mobile nodes communicating with each other without any fixed infrastructure such as access points or base stations. MANETS are self organizing or self restoring. Network topology in MANETS is subject to continuous and precipitous (unpredictable change. The limited bandwidth availability, energy constraints and highly dynamic topology make the routing process as exigent. The routing process in MANET relies (based on the cooperation of individual nodes which constitute the network. In this paper, we have tried to remove the existence of misbehaving nodes that may paralyze or slows down the routing operation in MANET. This increases the efficiency of a network. Efficiency can be calculated by the parameters or factors such astransmission capacity, battery power and scalability. Here we are considering the most crucial factor named as transmission capacity of a node. In MANET, as the network size increases complexity of anetwork also increases. To overcome this we make network as modular. So the network becomes task specific which refer to a particular work only. This is the reason of infusing the concept of agents in anefficient network. This proposed protocol provides the most efficient and reliable route which may or may not be minimum hop count.

  1. The Improvement of RFID Authentication Protocols Based on R-RAPSE

    Directory of Open Access Journals (Sweden)

    QingLing Cai

    2014-01-01

    Full Text Available Numerous RFID authentication protocols proposed often have some security vulnerabilities, since they lack systematic theory support. We had proposed a series of rules called R-RAPSE (RFID Authentication Protocol Security Enhanced Rules for RFID authentication protocol design and verification. By three examples, this paper justifies why the protocols do not offer sufficient security and privacy protection, and thereafter, proposes relevant solutions to fix the security holes based on R-RAPSE, which demonstrates how R-RAPSE can be used to verify and improve RFID authentication protocols.

  2. SSL-MAP: A More Secure Gossamer-based Mutual Authentication Protocol for Passive RFID Tags

    OpenAIRE

    Rama N.; Suganya R.

    2010-01-01

    RFID systems that employ passive RFID tags, are run using lightweight protocols. The Gossamer protocol is a case in point. However, it is found that the Gossamer protocol uses rather simple operations, in order to ensure that the protocol is lightweight. This raises security concerns. A protocol based on the Sign/Logarithm number system to make it power-efficient, and the efficient use of one-dimensional convolution to secure the transmission of the tag’s ID value, is proposed. Thus, a protoc...

  3. Automated, Reproducible, Titania-Based Phosphopeptide Enrichment Strategy for Label-Free Quantitative Phosphoproteomics

    OpenAIRE

    Richardson, Brenna McJury; Soderblom, Erik J.; Thompson, J. Will; Moseley, M Arthur

    2013-01-01

    An automated phosphopeptide enrichment strategy is described using titanium dioxide (TiO2)-packed, fused silica capillaries for use with liquid chromatography (LC)-mass spectrometry (MS)/MS-based, label-free proteomics workflows. To correlate an optimum peptide:TiO2 loading ratio between different particle types, the ratio of phenyl phosphate-binding capacities was used. The optimum loading for the column was then verified through replicate enrichments of a range of quantities of digested rat...

  4. The Project Based Mechanisms of the Kyoto Protocol. Credible Instruments or Challenges to the Integrity of the Kyoto Protocol?

    Energy Technology Data Exchange (ETDEWEB)

    Takeuchi Waldegren, Linn

    2006-03-15

    The project based mechanisms of the Kyoto Protocol are innovative instruments which allow projects to earn credits for reducing greenhouse gas (GHG) emissions. The credits can in turn be used by countries to reach their emissions targets according to the Kyoto Protocol. The Project based mechanisms are known as the Clean Development Mechanism (CDM) and the Joint Implementation (JI). If the project based mechanisms are to be effective policy instruments they must ensure the integrity of the Kyoto Protocol, and their ability to promote and prove real emission reductions is critical. The environmental credibility of the project based mechanisms will also ensure their ability to promote cost effectiveness. Key concepts in this context are environmental and project additionality, and their role and value for the project based mechanisms are analyzed. Environmental additionality is established by comparing a project's emissions to a baseline. The baseline's credibility is thus vital. The concept of project additionality is somewhat controversial, but is nonetheless of equal importance. The case studies of CDM approved methodologies (AMs) and proposed projects suggest that there are credibility issues that need to be addressed if the project based mechanisms are to promote real emissions reductions.

  5. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Directory of Open Access Journals (Sweden)

    Alavalapati Goutham Reddy

    Full Text Available Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  6. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  7. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols. PMID:27163786

  8. Zone Based Routing Protocol for Homogeneous Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    S. Taruna

    2011-09-01

    Full Text Available Wireless Sensor Networks, are made of low-cost, low -power, small in size, and multifunctional sensor nodes. The efficient energy utilization is one of t he important performance factors for wireless senso r networks survivability be-cause nodes operate with limited battery power. In this paper we propose and analyze a new approach of zone based clustering hea d selection algorithm for wireless sensor network o f homogeneous nodes. Nodes in the network are uniform ly distributed. In this clustering algorithm, netwo rk performance is improved by selecting cluster heads on the basis of the residual energy of existing clu ster heads, and nearest hop distance of the node. In thi s paper we evaluate various performance metrics lik e energy consumption, network life time, number of ch annel heads metrics in each round and compare these with respect to random algorithm i.e. LEACH. We con clude that proposed protocol effectively extends th e network lifetime without degrading the other critic al overheads and perform-ance metrics.

  9. Petri Net-based Analysis of the Safety Communication Protocol

    Directory of Open Access Journals (Sweden)

    Liu Hongjie

    2013-10-01

    Full Text Available There is a few research in area of safety-critical system, therefore the study of performance analyzing method of the protocol has important practical significance for transportation engineering. This paper first briefly introduces the execution procedure of safety communication protocol, then explores the application of Petri net to establish the model of the protocol, including the process of state transition and corresponding timer which record the time, then obtains related performance data such as maintainability and failure probability, which users usually pay most attention to, with different probability of time delay and no fault in channel by simulation. Finally this paper finds that how the probability of time delay and no fault in channel could influent the maintainability and failure probability through data process with theory of probability and mathematical statistic, this could provide a certain reference for development of safety communication protocol.    

  10. Public Key Protocol Based on Amalgamated Free Product

    OpenAIRE

    Upadhyay, Sumit Kumar; Kumar, Shiv Datt; Lal, Ramji

    2011-01-01

    In the spirit of Diffie Hellman the concept of a protocol algebra is introduced using certain amalgamated free product of Braid group B and Thompson group T together with a nilpotent subgroup H of index 2.

  11. Interaction Protocols in Multi-Agent Systems based on Agent Petri Nets Model

    Directory of Open Access Journals (Sweden)

    Kamel Barkaoui

    2013-08-01

    Full Text Available This paper deals with the modeling of interaction between agents in Multi Agents System (MAS based on Agent Petri Nets (APN. Our models are created based on communicating agents. Indeed, an agent initiating a conversation with other can specify the interaction protocol wishes to follow. The combination of APN and FIPA Protocols schemes leads to a set of deployment formal rules for points where model interaction can be successfully implemented. We introduce some models FIPA standard protocols.

  12. A Novel Password based Multi Party Key Agreement Protocol on Elliptic Curve

    Directory of Open Access Journals (Sweden)

    Daniyal M. Alghazzawi

    2012-03-01

    Full Text Available Key agreement protocol a number of parties involved and communicate over a open public network to generate a common secret key called session key. This paper proposes an efficient password based multiparty Key Agreement Protocol. Security of the protocol is based difficulty of breaking Elliptic Curve Discrete Logarithm Problem and one way hash function. This is resistant against different attack. The security analysis have been discuss and proved in this aticle.

  13. Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation

    OpenAIRE

    Simonsen, Kent,; Kristensen, Lars,

    2014-01-01

    Model-based software engineering offers several attractive benefits for the implementation of protocols, including automated code generation for different platforms from design-level models. In earlier work, we have proposed a template-based approach using Coloured Petri Net formal models with pragmatic annotations for automated code generation of protocol software. The contribution of this paper is an application of the approach as implemented in the PetriCode tool to obtain protocol softwar...

  14. Discrete micropayment protocol based on master-slave payword chain

    Institute of Scientific and Technical Information of China (English)

    FAN Li-min; LIAO Jian-xin

    2007-01-01

    Using the idea of Payword, the new concept of master-slave payword chain (MSPC) is proposed in this article.MSPC consists of one master payword chain and one slave payword chain. On the basis of MSPC, a new micropaymentprotocol called discrete micropayment protocol (DMP), is presented in this article. DMP consists of three sub-protocols:registration, payment, and settlement. Both part fairness and non-unit-wise payment can be provided by DMP.

  15. Stop_times based Routing Protocol for VANET

    OpenAIRE

    Moawad, Hafez; Shaaban, Eman; Fayed, Zaki Taha

    2013-01-01

    Vehicular Ad hoc Network (VANET) is a special class of Mobile Ad hoc Network (MANET) where vehicles are considered as MANET nodes with wireless links. The key difference of VANET and MANET is the special mobility pattern and rapidly changeable topology. There has been significant interest in improving safety and traffic efficiency using VANET. The design of routing protocols in VANET is important and necessary issue for support the smart ITS. Existing routing protocols of MANET are not suitab...

  16. A standard protocol for describing individual-based and agent-based models

    Science.gov (United States)

    Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.

    2006-01-01

    Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.

  17. Coexistence of WiFi and WiMAX systems based on PS-request protocols.

    Science.gov (United States)

    Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young

    2011-01-01

    We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol. PMID:22163721

  18. Pedagogical Quality Enrichment in OER-Based Courseware: Guiding Principles

    Science.gov (United States)

    Misra, Pradeep Kumar

    2013-01-01

    This is a critical phase for Open Educational Resources (OER) movement: on one side the number of OER is increasing rapidly, and on other side debates about quality of OER-based courseware are heating up. These debates emanate from the fact that OER-based courseware are supposed to help users to follow a logical learning path and get an engaging,…

  19. A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications

    Institute of Scientific and Technical Information of China (English)

    JIANG Jun; HE Chen

    2005-01-01

    In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and "challenge-response" techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial procedure and real execution stage. Since the lightweight NTRU public key cryptography is employed, their protocol can not only overcome the security flaws of secret-key based authentication protocols such as those used in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols.

  20. Pedagogical quality enrichment in OER based courseware: Guiding principles

    OpenAIRE

    Pradeep Kumar Misra

    2013-01-01

    This is a critical phase for Open Educational Resources (OER) movement: on one side the number of OER is increasing rapidly, and on other side debates about quality of OER-based courseware are heating up. These debates emanate from the fact that OER-based courseware are supposed to help users to follow a logical learning path and get an engaging, interactive, and enjoyable learning experience. There are two aspects of quality assurance in OER-based courseware: content and pedagogy. The conten...

  1. Active Knowledge: Dynamically Enriching RDF Knowledge Bases by Web Services

    OpenAIRE

    Nicoleta Preda; Gjergji Kasneci; Fabian Suchanek; Thomas Neumann; Wenjun Yuan; Gerhard Weikum. Active Knowledge

    2010-01-01

    The proliferation of knowledge-sharing communities and the advances in information extraction have enabled the construction of large knowledge bases using the RDF data model to represent entities and relationships. However, as the Web and its latently embedded facts evolve, a knowledge base can never be complete and up-to-date. On the other hand, a rapidly increasing suite of Web services provide access to timely and high-quality information, but this is encapsulated by the service interface....

  2. An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.

    Science.gov (United States)

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Recently, Giri et al.'s proposed a RSA cryptosystem based remote user authentication scheme for telecare medical information system and claimed that the protocol is secure against all the relevant security attacks. However, we have scrutinized the Giri et al.'s protocol and pointed out that the protocol is not secure against off-line password guessing attack, privileged insider attack and also suffers from anonymity problem. Moreover, the extension of password guessing attack leads to more security weaknesses. Therefore, this protocol needs improvement in terms of security before implementing in real-life application. To fix the mentioned security pitfalls, this paper proposes an improved scheme over Giri et al.'s scheme, which preserves user anonymity property. We have then simulated the proposed protocol using widely-accepted AVISPA tool which ensures that the protocol is SAFE under OFMC and CL-AtSe models, that means the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The informal cryptanalysis has been also presented, which confirmed that the proposed protocol provides well security protection on the relevant security attacks. The performance analysis section compares the proposed protocol with other existing protocols in terms of security and it has been observed that the protocol provides more security and achieves additional functionalities such as user anonymity and session key verification. PMID:26123833

  3. Review on the Design of Web Based SCADA Systems Based on OPC DA Protocol

    Directory of Open Access Journals (Sweden)

    Hosny Ahmed Abbas, Ahmed M. Mohamed

    2011-08-01

    Full Text Available One of the most familiar SCADA (supervisory control and data acquisitionapplication protocols now is OPC protocol. This interface is supported by almostall SCADA, visualization, and process control systems. There are many researchefforts tried to design and implement an approach to access an OPC DA serverthrough the Internet. To achieve this goal they used diverse of modern ITtechnologies like XML, Webservices, Java and AJAX. In this paper, we present acomplete classification of the different approaches introduced in the litrature. Acomparative study is also introduced. Finally we study the feasibilty of therealization of these approaches based on the real time constraints imposed bythe nature of the problem.

  4. A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    Science.gov (United States)

    Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  5. Development of Research-Based Protocol Aligned to Predict High Levels of Teaching Quality

    Science.gov (United States)

    Schumacher, Gary; Grigsby, Bettye; Vesey, Winona

    2011-01-01

    This study proposes a research-based teacher selection protocol. The protocol is intended to offer school district hiring authorities a tool to identify teacher candidates with the behaviors expected to predict effective teaching. It is hypothesized that a particular series of research-based interview questions focusing on teaching behaviors in…

  6. LMEEC: Layered Multi-Hop Energy Efficient Cluster-based Routing Protocol for Wireless Sensor Networks

    CERN Document Server

    Khelifi, Manel

    2012-01-01

    In this paper, we propose LMEEC, a cluster-based routing protocol with low energy consumption for wireless sensor networks. Our protocol is based on a strategy which aims to provide a more reasonable exploitation of the selected nodes (cluster-heads) energy. Simulation results show the effectiveness of LMEEC in decreasing the energy consumption, and in prolonging the network lifetime, compared to LEACH.

  7. Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode

    Institute of Scientific and Technical Information of China (English)

    WANG ShengBao; CAO ZhenFu; CHENG ZhaoHui; CHOO Kim-KwangRaymond

    2009-01-01

    The majority of existing escrowable identity-based key agreement protocols only provide partial forward secrecy. Such protocols are, arguably, not suitable for many real-word applications, as the latter tends to require a stronger sense of forward secrecy-perfect forward secrecy. In this paper, we propose an efficient perfect forward-secure identity-based key agreement protocol in the escrow mode. We prove the security of our protocol in the random oracle model, assuming the intractability of the Gap Bilinear Diffie-Hellman (GBDH) problem.

  8. Enriching location-based games with navigational game activities

    DEFF Research Database (Denmark)

    Nadarajah, Stephanie Githa; Overgaard, Benjamin Nicholas; Pedersen, Peder Walz;

    2016-01-01

    Mobile location-based games are experiences that entertain its players by requiring interactions mainly at points of interest (POIs). Navigation between POIs often involve the use of either a physical or digital map, not taking advantage of the opportunity available to engage users in activities...

  9. Designing a Clustering and Prediction-based Protocol for Target Tracking in Wireless Sensor Networks (WSNs

    Directory of Open Access Journals (Sweden)

    Vahid Hosseini

    2013-07-01

    Full Text Available Target tracking is one of the applications of wireless sensor network which is set up in the areas of field surveillance, habitat monitoring, and intruder tracking. Energy saving is one of the main challenges in target tracking sensor networks. In this paper, we present a Clustering and Prediction-Based Protocol (CPBP for Target Tracking in Wireless Sensor Networks (WSNs. Also, the Base Station (BS was exploited as a cluster formation manager and target movement predictor. Our protocol uses two parameters, distance and energy, for clustering algorithm. For evaluation, the proposed protocol was compared to a number of protocols in terms of network lifetime, number of transmitted packets and number of target miss during network lifetime. Performance of the proposed protocol was compared with cluster size 5 and 7. The simulation results represented desirable performance of the presented protocol.

  10. An Efficient Multi-Carrier Position-Based Packet Forwarding Protocol For Wireless Sensor Networks

    CERN Document Server

    Bader, Ahmed; Alouini, Mohamed-Slim

    2011-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the node density grows, the overhead incurred in the process of relay selection grows significantly. As such, end-to-end performance in terms of energy and latency is adversely impacted. With the motivation of developing a packet forwarding mechanism that is tolerant to node density, an alternative position-based protocol is proposed in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the underlying overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. The end-to-end performance of the proposed protocol is evaluated...

  11. Validation of internal dosimetry protocols based on stochastic method

    Energy Technology Data Exchange (ETDEWEB)

    Mendes, Bruno M.; Fonseca, Telma C.F., E-mail: bmm@cdtn.br [Centro de Desenvolvimento da Tecnologia Nuclear (CDTN/CNEN-MG), Belo Horizonte, MG (Brazil); Almeida, Iassudara G.; Trindade, Bruno M.; Campos, Tarcisio P.R., E-mail: tprcampos@yahoo.com.br [Universidade Federal de Minas Gerais (DEN/UFMG), Belo Horizonte, MG (Brazil). Departamento de Engenharia Nuclear

    2015-07-01

    Computational phantoms adapted to Monte Carlo codes have been applied successfully in radiation dosimetry fields. NRI research group has been developing Internal Dosimetry Protocols - IDPs, addressing distinct methodologies, software and computational human-simulators, to perform internal dosimetry, especially for new radiopharmaceuticals. Validation of the IDPs is critical to ensure the reliability of the simulations results. Inter comparisons of data from literature with those produced by our IDPs is a suitable method for validation. The aim of this study was to validate the IDPs following such inter comparison procedure. The Golem phantom has been reconfigured to run on MCNP5. The specific absorbed fractions (SAF) for photon at 30, 100 and 1000 keV energies were simulated based on the IDPs and compared with reference values (RV) published by Zankl and Petoussi-Henss, 1998. The SAF average differences from RV and those obtained in IDP simulations was 2.3 %. The SAF largest differences were found in situations involving low energy photons at 30 keV. The Adrenals and thyroid, i.e. the lowest mass organs, had the highest SAF discrepancies towards RV as 7.2 % and 3.8 %, respectively. The statistic differences of SAF applying our IDPs from reference values were considered acceptable at the 30, 100 and 1000 keV spectra. We believe that the main reason for the discrepancies in IDPs run, found in lower masses organs, was due to our source definition methodology. Improvements of source spatial distribution in the voxels may provide outputs more consistent with reference values for lower masses organs. (author)

  12. An Authentication Protocol Based on Combined RFID-Biometric System

    Directory of Open Access Journals (Sweden)

    Mohamed Benmohammed

    2012-04-01

    Full Text Available Radio Frequency Identification (RFID and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, …. Our work focuses on the design of a RFID authentication protocol which uses biometric data and which confirms the secrecy, the authentication and the privacy. Our protocol requires a PRNG (Pseud-Random Number Generator, a robust hash function and Biometric hash function. The Biometric hash function is used to optimize and to protect biometric data. For Security analysis of protocol proposed, we will use AVISPA and SPAN tools to verify the authentication and the secrecy.

  13. Wi-Fi Protocol Vulnerability Discovery Based on Fuzzy Testing

    Directory of Open Access Journals (Sweden)

    Kunhua Zhu

    2013-08-01

    Full Text Available To detect the wireless network equipment whether there is protocol vulnerability, using the method of modular design and implementation of a new suitable for Wi-Fi protocol vulnerability discovery fuzzy test framework. It can be independent of its transmission medium, produce deformity packet and implementation of the attack on the target system. The author firstly describes the wireless network protocol vulnerability discovery and fuzzy test in this paper,then focused on the test frame technical scheme, detailed technical realization and so on, and its application are analyzed. In the experimental stage the fuzzy test is applied to a wireless networks gateway, the test results show that the fuzzy test framework can be well applied to the wireless network equipment agreement loophole mining work.  

  14. TBEE: Tier Based Energy Efficient Protocol Providing Sink and Source Mobility in Wireless Sensor Networks

    OpenAIRE

    Siddhartha Chauhan; Lalit Awasthi

    2011-01-01

    In resource constrained wireless sensor networks (WSNs) it is important to utilize energy efficiently. Data dissemination is mainly responsible for the consumption of energy in sensor nodes (SNs). The data dissemination protocols for WSNs should reduce the energy consumption of the SNs. Sink and source mobility is the major challenge for data dissemination protocols. In this paper, a Tier based Energy Efficient protocol (TBEE) providing sink and source mobility in WSNs has been proposed. TBEE...

  15. Trail-Using Ant Behavior Based Energy-Efficient Routing Protocol in Wireless Sensor Networks

    OpenAIRE

    Soon-gyo Jung; Byungseok Kang; Sanggil Yeoum; Hyunseung Choo

    2016-01-01

    Swarm Intelligence (SI) observes the collective behavior of social insects and other animal societies. Ant Colony Optimization (ACO) algorithm is one of the popular algorithms in SI. In the last decade, several routing protocols based on ACO algorithm have been developed for Wireless Sensor Networks (WSNs). Such routing protocols are very flexible in distributed system but generate a lot of additional traffic and thus increase communication overhead. This paper proposes a new routing protocol...

  16. Research of RFID Certification Security Protocol based on Hash Function and DES Algorithm

    OpenAIRE

    bin Xu; Zhang, Li-hui; Xiao-pin TAN

    2013-01-01

    RFID has been more and more attention and application by people, but the existence of security and privacy problems worthy of attention is concern. The certification process analysis of several typical security protocols is based on existing RFID authentication protocol. It proposed an improved bidirectional authentication algorithm. The use of one-way HASH function can solve the security problem of RFID. The protocol has anti-replay, impedance analysis, forgery, and tracking performance, and...

  17. Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature

    Science.gov (United States)

    Cai, Xiao-Qiu; Wei, Chun-Yan

    2013-04-01

    We analyze the security of an inter-bank E-payment protocol based on quantum proxy blind signature, and find that there is a security leak in the quantum channels of this protocol, which gives a chance for an outside opponent to launch a special denial-of-service attack. Furthermore, we show that the dishonest merchant can succeed to change the purchase information of the customer in this protocol.

  18. RATE BASED TRANSPORT PROTOCOL USING DELAY INFORMATION for REDUCING ENERGY CONSUMPTION of NODES in MANET

    OpenAIRE

    K. SASIKALA; Dr. R.S.D. Wahidabanu

    2013-01-01

    The MANET requires rate based transport protocol for node-to-node data transfer to be effective. The wellknown transport protocol processes the packets in sender, receiver and intermediate nodes and thus the energy consumption by the intermediate nodes are imperative. In this paper, a mechanism is proposed, which makes ATP as en-to-end protocol. The transmission and queuing delay is calculated and weight is assigned suitably to understand the effect of the delay in the network. The effect of ...

  19. Enhancements to prepare-and-measure based QKD protocols

    OpenAIRE

    Ryan, Peter; Christianson, Bruce

    2013-01-01

    We propose some simple changes to a class of Quantum Key Distribution protocols. The first enhancement ensures early detection of any attempted Man-in-the-Middle attack and results in less leakage of key material to any eavesdropping attacker. We argue that this version is at least as secure as the original BB'84 scheme, but ensures a closer binding of the key establishment and authentication components of the protocol. Further proposed enhancements lead to a doubling of the key rate, but the...

  20. An efficient multi-carrier position-based packet forwarding protocol for wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the node density grows, the overhead incurred in the process of relay selection grows significantly. As such, end-to-end performance in terms of energy and latency is adversely impacted. With the motivation of developing a packet forwarding mechanism that is tolerant to variation in node density, an alternative position-based protocol is proposed in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the underlying overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. The end-to-end performance of the proposed protocol is evaluated against existing beaconless position-based protocols analytically and as well by means of simulations. The proposed protocol is demonstrated in this paper to be more efficient. In particular, it is shown that for the same amount of energy the proposed protocol transports one bit from source to destination much quicker. © 2012 IEEE.

  1. Assessment of lectin and HILIC based enrichment protocols for characterization of serum glycoproteins by mass spectrometry

    DEFF Research Database (Denmark)

    Calvano, Cosima D; Zambonin, Carlo G; Jensen, Ole Nørregaard

    2008-01-01

    Protein glycosylation is a common post-translational modification that is involved in many biological processes, including cell adhesion, protein-protein and receptor-ligand interactions. The glycoproteome constitutes a source for identification of disease biomarkers since altered protein...... glycosylation profiles are associated with certain human ailments. Glycoprotein analysis by mass spectrometry of biological samples, such as blood serum, is hampered by sample complexity and the low concentration of the potentially informative glycopeptides and -proteins. We assessed the utility of lectin...... cancer patients and healthy individuals to assess glycosylation site frequencies....

  2. Analysis of Trusted Identity Based Encryption (IBE-Trust Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yusnani Mohd Yussoff

    2011-12-01

    Full Text Available The peculiarity of Wireless Sensor Networks demands extra consideration during the design of the security protocol. One of the most challenging yet important security features in Wireless Sensor Network is in establishing trusted communication between sensor node and base station. While the term trusted has been widely used referring to valid nodes in the group, this paper discuss the term trusted based on the specifications of Trusted Computing Group (TCG and presents an IBE-Trust security protocol utilizing well-known identity based encryption scheme. The protocol incorporates ideas from Trusted Computing Group and Identity-based cryptosystem by Boneh Franklin in ensuring trusted and secured communications between sender and receiver. The proposed protocols were then modeled using the high-level formal language HLPSL and verified using the model checking tool AVISPA. Analysis on the proposed protocols is presented at the end of this paper.

  3. A semantically enriched web usage based recommendation model

    CERN Document Server

    Ramesh, C; Govardhan, A

    2011-01-01

    With the rapid growth of internet technologies, Web has become a huge repository of information and keeps growing exponentially under no editorial control. However the human capability to read, access and understand Web content remains constant. This motivated researchers to provide Web personalized online services such as Web recommendations to alleviate the information overload problem and provide tailored Web experiences to the Web users. Recent studies show that Web usage mining has emerged as a popular approach in providing Web personalization. However conventional Web usage based recommender systems are limited in their ability to use the domain knowledge of the Web application. The focus is only on Web usage data. As a consequence the quality of the discovered patterns is low. In this paper, we propose a novel framework integrating semantic information in the Web usage mining process. Sequential Pattern Mining technique is applied over the semantic space to discover the frequent sequential patterns. Th...

  4. Stop_times based Routing Protocol for VANET

    Science.gov (United States)

    Moawad, Hafez; Shaaban, Eman; Taha Fayed, Zaki

    2013-11-01

    Vehicular Ad hoc Network (VANET) is a special class of Mobile Ad hoc Network (MANET) where vehicles are considered as MANET nodes with wireless links. The key difference of VANET and MANET is the special mobility pattern and rapidly changeable topology. There has been significant interest in improving safety and traffic efficiency using VANET. The design of routing protocols in VANET is important and necessary issue for support the smart ITS. Existing routing protocols of MANET are not suitable for VANET. AOMDV is the most important on demand multipath routing protocol. This paper proposes SSD-AOMDV as VANET routing protocol. SSD-AOMDV improves AOMDV to suit VANET characteristics. SSD-AOMDV adds the mobility parameters: Stop_times, Speed and Direction to hop count as new AOMDV routing metric to select next hop during the route discovery phase. Stop_times metric is added to simulate buses mobility pattern and traffic lights at intersections. Simulation results show that SSD-AOMDV achieves better performance compared to AOMDV.

  5. Property Enrichment of Aged Nickel Base Superalloy Supercast 247A

    Directory of Open Access Journals (Sweden)

    Lavakumar Avala

    2013-12-01

    Full Text Available The commercial nickel-base superalloy Supercast 247A can be used for applications in which is required high mechanical strength and corrosion resistance at elevated temperatures, such as turbine blades and automotive turbocharger rotors. The mechanical properties are totally connected to the morphology, size and distribution of γ' phase and carbides. In order to improve the mechanical properties, the material is subjected to solution and aging heat treatment, to raise the volume fraction of γ' phase in the matrix and to form carbides at grain boundaries. In the present study the Supercast 247A superalloy was remelted and cast to obtain the desired polycrystalline test bars by controlling casting parameters, followed by the investigation of precipitation morphology and mechanical properties with respect to solution treatment and aging treatment. The experimental results show that by well controlled casting parameters the Supercast 247A owns excellent castability to form a superalloy with fine grain structure, resistance to indentation as well as superior strength.

  6. A Study on the Distributed Antenna Based Heterogeneous Cognitive Wireless Network Synchronous MAC Protocol

    Directory of Open Access Journals (Sweden)

    Lian-Fen Huang

    2015-01-01

    Full Text Available This paper introduces distributed antennas into a cognitive radio network and presents a heterogeneous network. The best contribution of this paper is that it designs a synchronous cognitive MAC protocol (DAHCWNS-MAC protocol: distributed antenna based heterogeneous cognitive wireless network synchronous MAC protocol. The novel protocol aims at combining the advantages of cognitive radio and distributed antennas to fully utilize the licensed spectrum, broaden the communication range, and improve throughput. This paper carries out the mathematical modeling and performance simulation to demonstrate its superiority in improving the network throughput at the cost of increasing antenna hardware costs.

  7. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    Science.gov (United States)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  8. Two new Controlled not Gate Based Quantum Secret Sharing Protocols without Entanglement Attenuation

    Science.gov (United States)

    Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min

    2016-05-01

    In this paper, we propose two new controlled not gate based quantum secret sharing protocols. In these two protocols, each photon only travels once, which guarantees the agents located in long distance can be able to derive the dealer's secret without suffering entanglement attenuation problem. The protocols are secure against trojan horse attack, intercept-resend attack, entangle-measure attack and entanglement-swapping attack. The theoretical efficiency for qubits of these two protocols can approach 100 %, except those used for eavesdropping checking, all entangled states can be used for final secret sharing.

  9. Improved Quantum " Ping-Pong" Protocol Based on Extended Three-Particle GHZ State

    Institute of Scientific and Technical Information of China (English)

    Li Jian; Guo Xiaojing; Song Danjie; Xie Feng; Peng Yong

    2012-01-01

    In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.

  10. Rank-statistics based enrichment-site prediction algorithm developed for chromatin immunoprecipitation on chip experiments

    Directory of Open Access Journals (Sweden)

    Sekinger Edward

    2006-10-01

    Full Text Available Abstract Background High density oligonucleotide tiling arrays are an effective and powerful platform for conducting unbiased genome-wide studies. The ab initio probe selection method employed in tiling arrays is unbiased, and thus ensures consistent sampling across coding and non-coding regions of the genome. Tiling arrays are increasingly used in chromatin immunoprecipitation (IP experiments (ChIP on chip. ChIP on chip facilitates the generation of genome-wide maps of in-vivo interactions between DNA-associated proteins including transcription factors and DNA. Analysis of the hybridization of an immunoprecipitated sample to a tiling array facilitates the identification of ChIP-enriched segments of the genome. These enriched segments are putative targets of antibody assayable regulatory elements. The enrichment response is not ubiquitous across the genome. Typically 5 to 10% of tiled probes manifest some significant enrichment. Depending upon the factor being studied, this response can drop to less than 1%. The detection and assessment of significance for interactions that emanate from non-canonical and/or un-annotated regions of the genome is especially challenging. This is the motivation behind the proposed algorithm. Results We have proposed a novel rank and replicate statistics-based methodology for identifying and ascribing statistical confidence to regions of ChIP-enrichment. The algorithm is optimized for identification of sites that manifest low levels of enrichment but are true positives, as validated by alternative biochemical experiments. Although the method is described here in the context of ChIP on chip experiments, it can be generalized to any treatment-control experimental design. The results of the algorithm show a high degree of concordance with independent biochemical validation methods. The sensitivity and specificity of the algorithm have been characterized via quantitative PCR and independent computational approaches

  11. Communication protocol in chassis detecting wireless transmission system based on WiFi

    Science.gov (United States)

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  12. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  13. A Modified Protocol of Quantum Key Distribution Based on Entanglement Swapping

    Institute of Scientific and Technical Information of China (English)

    HUANG Xin; LI Shu-Min; WANG An-Min

    2007-01-01

    By comparing Cabello's addendum to his quantum key distribution protocol [Phys. Rev. A 64 (2001) 024301],we propose a more convenient modified protocol based on the entanglement swapping which is secure against the eavesdropping strategy addressed by Zhang et al. [Phys. Rev. A 63 (2001)036301] and other existing types of attack.

  14. Fair e-payment protocol based on blind signature

    Institute of Scientific and Technical Information of China (English)

    WANG Jian-hui; LIU Jing-wei; LI Xiao-hui; KOU Wei-dong

    2009-01-01

    Electronic transaction through e-payment protocol will grow tremendous in the coming years. In this article, by conversely using blind signature, the authors propose a fair electronic payment scheme for electronic commerce, which can ensure two participants' right simultaneously in electronic transaction process. This scheme is different from other existing schemes and it does not require strong trust relation between customer and merchant. In the scheme, a semi-trusted third party (S-TTP) is involved to provide a fair commerce environment. The S-TTP takes part in the protocol on-line and no secure information about the business is leaked. Moreover, the participants do not need to register to S-TTP. This scheme does not require intervention of a third party in case of dispute, if one user cheats or simply crashes.

  15. Inquiry-Based Science and Technology Enrichment Program for Middle School-Aged Female Students

    Science.gov (United States)

    Kim, Hanna

    2016-01-01

    This study investigates the effects of an intensive 1-week Inquiry-Based Science and Technology Enrichment Program (InSTEP) designed for middle school-aged female students. InSTEP uses a guided/open inquiry approach that is deepened and redefined as eight sciences and engineering practices in the Next Generation Science Standards, which aimed at…

  16. Temperature-dependent surface-enrichment effects of imidazolium-based ionic liquids.

    Science.gov (United States)

    Kolbeck, Claudia; Deyko, Alexey; Matsuda, Takashi; Kohler, Florian T U; Wasserscheid, Peter; Maier, Florian; Steinrück, Hans-Peter

    2013-11-11

    We present the first systematic study of the influence of temperature on the degree of surface enrichment of 1-alkyl-3-methylimidazolium-based ionic liquids (ILs). Using angle-resolved X-ray photoelectron spectroscopy, we demonstrate that the degree of surface enrichment strongly decreases with increasing temperature for all the studied ILs. For ILs with the same cation, but different anions, [C8 C1 Im]Br, [C8 C1 Im][TfO] and [C8 C1 Im][Tf2 N], no significant differences of the temperature-induced partial loss of surface enrichment are found. Measurements for [C4 C1 Im][TfO], [C8 C1 Im][TfO] and [C18 C1 Im][TfO] indicate a small effect of the chain length. For [C18 C1 Im][TfO], a continuous decrease of alkyl surface enrichment is found with increasing temperature, with no abrupt changes at the phase-transition temperature from the smectic A to the isotropic phase, indicating that the surface enrichment is not affected by this phase transition. PMID:24123477

  17. CTen: a web-based platform for identifying enriched cell types from heterogeneous microarray data

    Directory of Open Access Journals (Sweden)

    Shoemaker Jason E

    2012-09-01

    Full Text Available Abstract Background Interpreting in vivo sampled microarray data is often complicated by changes in the cell population demographics. To put gene expression into its proper biological context, it is necessary to distinguish differential gene transcription from artificial gene expression induced by changes in the cellular demographics. Results CTen (cell type enrichment is a web-based analytical tool which uses our highly expressed, cell specific (HECS gene database to identify enriched cell types in heterogeneous microarray data. The web interface is designed for differential expression and gene clustering studies, and the enrichment results are presented as heatmaps or downloadable text files. Conclusions In this work, we use an independent, cell-specific gene expression data set to assess CTen's performance in accurately identifying the appropriate cell type and provide insight into the suggested level of enrichment to optimally minimize the number of false discoveries. We show that CTen, when applied to microarray data developed from infected lung tissue, can correctly identify the cell signatures of key lymphocytes in a highly heterogeneous environment and compare its performance to another popular bioinformatics tool. Furthermore, we discuss the strong implications cell type enrichment has in the design of effective microarray workflow strategies and show that, by combining CTen with gene expression clustering, we may be able to determine the relative changes in the number of key cell types. CTen is available at http://www.influenza-x.org/~jshoemaker/cten/

  18. Examining How Middle School Science Teachers Implement a Multimedia-enriched Problem-based Learning Environment

    OpenAIRE

    Liu, Min; Wivagg, Jennifer; Geurtz, Renata; Lee, Shih-Ting; Chang, Hyeseung Maria

    2012-01-01

    This study examined how a group of ten middle school teachers implemented a technology enriched problem-based learning (PBL) environment. The goal was to understand their motivation, document their implementation techniques, and identify factors that teachers considered important in using technology-based PBL tools in their teaching. The analysis identified four factors that provided the impetus for teachers to consider the adoption of technology-based PBL instruction. These factors are (1) t...

  19. BIM-based Modeling and Data Enrichment of Classical Architectural Buildings

    OpenAIRE

    Fabrizio Ivan Apollonio; Marco Gaiani; Zheng Sun

    2012-01-01

    EnIn this paper we presented a BIM-based approach for the documentation of Architectural Heritage. Knowledge of classical architecture is first extracted from the treatises for parametric modeling in object level. Then we established a profile library based on semantic studies to sweep out different objects. Variants grow out from the parametric models by editing or regrouping parameters based on grammars. Multiple data including material, structure and real-life state are enriched with respe...

  20. Management of data networks based on IP protocol

    OpenAIRE

    Patala, Petr

    2012-01-01

    The objective of this master’s thesis is monitoring and management of computer networks via SNMP protocol and its practical application. The main part describes working with SNMPc program in an experimental network through implementation of its parts into the network and configuration of SNMP agents on routers, switch and end station. This thesis includes the results of traffic testing, disconnected links, effects of traffic load on QoS parameters, making longterm statistics, baselines and al...

  1. Smart Traffic Management Protocol Based on VANET architecture

    OpenAIRE

    2014-01-01

    Nowadays one of the hottest theme in wireless environments research is the application of the newest technologies to road safety problems and traffic management exploiting the (VANET) architecture. In this work, a novel protocol that aims to achieve a better traffic management is proposed. The overal system is able to reduce traffic level inside the city exploiting inter-communication among vehicles and support infrastructures also known as (V2V) and (V2I) communications. We design a network ...

  2. Smart Traffic Management Protocol Based on VANET architecture

    Directory of Open Access Journals (Sweden)

    Amilcare Francesco Santamaria

    2014-01-01

    Full Text Available Nowadays one of the hottest theme in wireless environments research is the application of the newest technologies to road safety problems and traffic management exploiting the (VANET architecture. In this work, a novel protocol that aims to achieve a better traffic management is proposed. The overal system is able to reduce traffic level inside the city exploiting inter-communication among vehicles and support infrastructures also known as (V2V and (V2I communications. We design a network protocol called (STMP that takes advantages of IEEE 802.11p standard. On each road several sensors system are placed and they are responsible of monitoring. Gathered data are spread in the network exploiting ad-hoc protocol messages. The increasing knowledge about environment conditions make possible to take preventive actions. Moreover, having a realtime monitoring of the lanes it is possible to reveal roads and city blocks congestions in a shorter time. An external entity to the (VANET is responsible to manage traffic and rearrange traffic along the lanes of the city avoiding huge traffic levels.

  3. Enriching semantic knowledge bases for opinion mining in big data applications.

    Science.gov (United States)

    Weichselbraun, A; Gindl, S; Scharl, A

    2014-10-01

    This paper presents a novel method for contextualizing and enriching large semantic knowledge bases for opinion mining with a focus on Web intelligence platforms and other high-throughput big data applications. The method is not only applicable to traditional sentiment lexicons, but also to more comprehensive, multi-dimensional affective resources such as SenticNet. It comprises the following steps: (i) identify ambiguous sentiment terms, (ii) provide context information extracted from a domain-specific training corpus, and (iii) ground this contextual information to structured background knowledge sources such as ConceptNet and WordNet. A quantitative evaluation shows a significant improvement when using an enriched version of SenticNet for polarity classification. Crowdsourced gold standard data in conjunction with a qualitative evaluation sheds light on the strengths and weaknesses of the concept grounding, and on the quality of the enrichment process. PMID:25431524

  4. Picture archiving and communications systems protocol based on ISO-OSI standard

    Science.gov (United States)

    Martinez, Ralph; Nam, Jiseung; Dallas, William J.; Osada, Masakazu; McNeill, Kevin M.; Ozeki, Takeshi; Komatsu, Ken-Ichi

    1991-07-01

    During the last decade, the concept of picture archiving and communication systems (PACS) has evolved and matured to integrate digital image information in a hospital. PACS integrates various imaging devices, database archive systems, and image viewing workstations. One of the most difficult problems for integration is the standardization of communication protocols required to connect devices from different vendors. When the ACR-NEMA standard was announced for communications in digital radiology in 1985, it solved some of the problems for PACS with a hardware interface, a set of software commands, and a consistent set of data formats. However, it has been found to be inadequate for networked PACS environments, not only because of its point-to-point nature and lack of a network layer, but also because of its inflexibility to allow other services and protocols to be added in the future. Based on previous experience, the case is made for a new standard for PACS networks and a suggested approach for new protocol is presented. This paper addresses the development of a new standard for PACS protocol layers and attempts to define the protocols from a layered-systems approach. The basis for the new protocol definition is primarily the International Organization for Standardization/Open Systems Interconnection (ISO/OSI) protocols and the data format portion of ACR-NEMA standard. The scope and rationale of the proposed protocol, background, and relationship to PACS technology are discussed. The proposed PACS protocol covers the protocol service definition and specification for the application, presentation, session, transport, and network layers. The proposed PACS protocol is intended to facilitate the development of PACSs by several vendors capable of interfacing with each other. The new PACS protocols will also support a global PACS environment.

  5. The Impact of Acceptance-Based Versus Avoidance-Based Protocols on Discomfort

    OpenAIRE

    Luciano, Carmen; Molina, Francisco (S.XVIII); Gutiérrez-Martínez, Olga; Barnes-Holmes, Dermot; Valdivia-Salas, Sonsoles; Cabello, Francisco; Barnes-Holmes, Yvonne; Rodríguez-Valverde, Miguel; Wilson, Kelly G.

    2010-01-01

    This study aimed to isolate the conditions under which aversive stimulation is experienced as more or less discomforting/unpleasant. Discomfort was induced by playing loud noises through headphones while participants performed computer tasks. We employed 4 main conditions. Condition 1: the acceptance-based protocol (ACT), intended to integrate discom- fort in a valued direction, was implemented before the Inclusion Task (task performance could continue despite the presence ...

  6. HLAODV - A Cross Layer Routing Protocol for Pervasive Heterogeneous Wireless Sensor Networks Based On Location

    Directory of Open Access Journals (Sweden)

    Jasmine Norman

    2010-07-01

    Full Text Available A pervasive network consists of heterogeneous devices with different computing, storage, mobility and connectivity properties working together to solve real-world problems. The emergence of wireless sensor networks has enabled new classes of applications in pervasive world that benefit a large number of fields. Routing in wireless sensor networks is a demanding task. This demand has led to a number of routing protocols which efficiently utilize the limited resources available at the sensor nodes. Most of these protocols either support stationary sensor networks or mobile networks. This paper proposes an energy efficient routing protocol for heterogeneous sensor networks with the goal of finding the nearest base station or sink node. Hence the problem of routing is reduced to finding the nearest base station problem in heterogeneous networks. The protocol HLAODV when compared with popular routing protocols AODV and DSR is energy efficient. Also the mathematical model of the proposed system and its properties are studied.

  7. Optimistic fair exchange E-commerce protocol based on secret sharing

    Institute of Scientific and Technical Information of China (English)

    Ma Changshe; Lei Feiyu; Chen Kefei

    2006-01-01

    A key problem of electronic commerce (for short e-commerce) is fair exchange which guarantees that at the end of the transaction, either both parties involved in the transaction receive each other's items or none do. A non-interactive optimistic fair exchange e-commerce protocol model based on the publicly verifiable secret sharing is presented. The main idea of our exchange protocol is to interchange verifiable and recoverable keys of the symmetric encryption for participants' items. So it is especially suitable for exchange of large-size items. Furthermore, our protocol is efficient and simple as it does not need interactive proof system which has been adopted by a large quantity of previously proposed fair exchange protocols. Based on a modified (2,2) secret sharing scheme, a concrete non-interactive fair exchange e-commerce protocol is designed.

  8. Self-Adaptive and Energy-Efficient MAC Protocol Based on Event-Driven

    Directory of Open Access Journals (Sweden)

    Xin Hou

    2013-01-01

    Full Text Available Combined with WSN MAC layer protocol characteristics and design requirements, according to the characteristic of WSN monitoring application requirements, this paper puts forward a method based on event driven MAC protocol. The agreement algorithm is to solve the problem of network congestion and node energy unnecessary consumption cause by a large number of redundant monitoring data transceiver. It is a kind of adaptive low power consumption of the MAC layer protocol, which is pointed out based on theoretical foundation of S_MAC protocol, made use of the event driven mechanism system theory, combined with event driven mechanism and the characteristics of the WSN. It has the periodic dormancy mechanism of S_MAC protocol, in the premise of the reliability data, to reduce data redundancy and communication delay time, improve the overall network throughput, to ensure the safety and reliability of the network, which can greatly extends  the node of working time.

  9. A RSVP-TE reservation protocol based on priority in multi-domain optical network

    Science.gov (United States)

    Wang, Jianping; Yang, Kai; Wu, Qiwu; Pan, Chaoping

    2009-11-01

    ASON (Automatic Switch Optical Network), which provides fast and dynamic connection from point to point, is the typical representation of the next generation intelligent optical network. There are two main kinds of resource reservation protocols in RSVP-TE (Resource Reservation Protocol-Traffic Engineering), the most widely applied signaling in ASON, which are FRP (forward reservation protocol) and BRP (backward reservation protocol). Both of them are used to apply in single-domain optical network, however, when they are used in multi-domain optical network, there are apparent drawbacks. On base of FRP and BRP, we propose a reservation protocol-IDRPBP, which is based on priority in multi-domain optical network with wavelength converter at border nodes. Through analysis and simulation, we find it can achieve the trade-off between blocking probability and connection setup time.

  10. Compressive Sensing Based Opportunistic Protocol for Throughput Improvement in Wireless Networks

    CERN Document Server

    Qaseem, Syed T

    2009-01-01

    A key feature in the design of any MAC protocol is the throughput it can provide. In wireless networks, the channel of a user is not fixed but varies randomly. Thus, in order to maximize the throughput of the MAC protocol at any given time, only users with large channel gains should be allowed to transmit. In this paper, compressive sensing based opportunistic protocol for throughput improvement in wireless networks is proposed. The protocol is based on the traditional protocol of R-ALOHA which allows users to compete for channel access before reserving the channel to the best user. We use compressive sensing to find the best user, and show that the proposed protocol requires less time for reservation and so it outperforms other schemes proposed in literature. This makes the protocol particularly suitable for enhancing R-ALOHA in fast fading environments. We consider both analog and digital versions of the protocol where the channel gains sent by the user are analog and digital, respectively.

  11. Development of microsatellite markers for common bean (Phaseolus vulgaris L.) based on screening of non-enriched, small-insert genomic libraries.

    Science.gov (United States)

    Blair, Matthew W; Torres, Monica Muñoz; Pedraza, Fabio; Giraldo, Martha C; Buendía, Hector F; Hurtado, Natalia

    2009-09-01

    Microsatellite markers are useful genetic tools for a wide array of genomic analyses although their development is time-consuming and requires the identification of simple sequence repeats (SSRs) from genomic sequences. Screening of non-enriched, small-insert libraries is an effective method of SSR isolation that can give an unbiased picture of motif frequency. Here we adapt high-throughput protocols for the screening of plasmid-based libraries using robotic colony picking and filter preparation. Seven non-enriched genomic libraries from common bean genomic DNA were made by digestion with four frequently cutting restriction enzymes, double digestion with a frequently cutting restriction enzyme and a less frequently cutting restriction enzyme, or sonication. Library quality was compared and three of the small-insert libraries were selected for further analysis. Each library was plated and picked into 384-well plates that were used to create high-density filter arrays of over 18 000 clones each, which were screened with oligonucleotide probes for various SSR motifs. Positive clones were found to have low redundancy. One hundred SSR markers were developed and 80 were tested for polymorphism in a standard parental survey. These microsatellite markers derived from non-SSR-enriched libraries should be useful additions to previous markers developed from enriched libraries. PMID:19935925

  12. Implementation of Embedded Ethernet Based on Hardware Protocol Stack in Substation Automation System

    Institute of Scientific and Technical Information of China (English)

    MA Qiang; ZHAO Jianguo; LIU Bingxu

    2008-01-01

    Embedded Ethernet technology has been utilized increasingly widely as the communication mode in the substation automation system (SAS). This paper introduces the current applying situation about embedded Ethernet in SAS First. After analyzing the protocol levels used in SAS based on embedded Ethernet and the differences between the TCP and UDP, UDP/IP is selected as the communication protocol between the station-level and bay-level devices for its real-time characteristic. Then a new kind of implementation of the embedded Ethernet is presented based on hardware protocol stack. The designed scheme can be implemented easily, reduce cost significantly and shorten developing cycle.

  13. SMS- based Recharge Protocol for Prepaid Energy Billing System

    Directory of Open Access Journals (Sweden)

    B. O. Omijeh

    2012-12-01

    Full Text Available A prepaid energy metering system enables power utilities to collect energy bills from the consumers’ prior to the usage of power by delivering only as much as what has been paid for. In Nigeria, the current prepaid meters use the keypad technology or smart card for their energy re-loading or recharging. This poses some challenges because the consumers have to travel a long distance to the utility company, waste a lot of time and energy before getting his/her energy meter activated when out of energy credit. In this paper, an SMS-recharge system for prepaid meter is proposed whereby consumers at the comfort of their homes, without stress or waste of energy or time, can recharge/activate their meters via SMS without the use of keypad by sending a 12-digit Pin number via SMS to the utility company. The aim of this paper is to model an intelligent billing system and develop an SMS protocol for the recharge scheme. This work contains the methodology and developed SMS protocol-link between the GSM modem (M20 and the Microcontroller (PIC 18F2550 for this process .The entire billing process is designed and simulated in Matlab/Simulink environments. Results obtained are very satisfactory. When fully implemented in Nigeria, revenue generation in the power sector will greatly increase as more sales of energy vouchers will be made.

  14. MAC protocol for an ATM-based SuperPON

    Science.gov (United States)

    Angelopoulos, John D.; Koulouris, John; Fragoulopoulos, Stratos K.

    1996-11-01

    Developments in optical amplifiers and the tendency towards fewer and larger switching stages made feasible and desirable the concept of SuperPONs with a range of 100km. Up to 15000 residential customers can share the SuperPON on a TDMA basis lowering the cost of access to B-ISDN services. Tree PONs require a MAC protocol to arbitrate the access to upstream slots among the competing customer ATM cells in a dynamic and efficient way. The protocol presented in this work combines different access mechanisms according to service quality requirements. All bursty traffic is manipulated transparently using a reservation approach with closed loop control so as to handle the unpredictability of arrivals. In contrast, voice, N-ISDN and other delay sensitive services are provided with unsolicited access permits. In addition, composite cells offered quasi- synchronous permits are used to support STM legacy traffic without echo-cancellers. So, ABR traffic which is delay tolerant and more cost sensitive, can and should be concentrated with full exploitation of multiplexing gain prospects. The permit distribution algorithm focuses on cell spacing, control of CDV, almost jitter free access for synchronous traffic and efficiency for ABR traffic.

  15. Handling Data-Based Concurrency in Context-Aware Service Protocols

    CERN Document Server

    Cubo, Javier; Salaün, Gwen; Canal, Carlos; 10.4204/EPTCS.30.5

    2010-01-01

    Dependency analysis is a technique to identify and determine data dependencies between service protocols. Protocols evolving concurrently in the service composition need to impose an order in their execution if there exist data dependencies. In this work, we describe a model to formalise context-aware service protocols. We also present a composition language to handle dynamically the concurrent execution of protocols. This language addresses data dependency issues among several protocols concurrently executed on the same user device, using mechanisms based on data semantic matching. Our approach aims at assisting the user in establishing priorities between these dependencies, avoiding the occurrence of deadlock situations. Nevertheless, this process is error-prone, since it requires human intervention. Therefore, we also propose verification techniques to automatically detect possible inconsistencies specified by the user while building the data dependency set. Our approach is supported by a prototype tool we...

  16. AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Ge Ma

    2009-07-01

    Full Text Available Designing low energy consumption, high efficiency Media Access Control (MAC protocols are one ofthe most important directions in wireless sensor networks (WSN. In this paper, we proposed a newcontention reserve MAC protocol, named CRMAC, under the inspiration of IEEE 802.15.4’s superframestructure. CRMAC is a MAC protocol suitable for intra-cluster WSN that combines the advantages ofcontention and schedule-based MAC protocols. We introduce the mechanism and superframe structure ofCRMAC in detail and verified the performance of this protocol through simulations. Our results showthat CRMAC performs better than IEEE 802.15.4 in energy consumption, system delay and networkthroughput. CRMAC is especially suitable for short packet transmission under low load networks, whichis the main situation in WSN.

  17. Nonlinear consensus protocols for multi-agent systems based on centre manifold reduction

    Institute of Scientific and Technical Information of China (English)

    Li Yu-Mei; Guan Xin-Ping

    2009-01-01

    Nonlinear consensus protocols for dynamic directed networks of multi-agent systems with fixed and switching topologies are investigated separately in this paper. Based on the centre manifold reduction technique,nonlinear consensus protocols are presented.We prove that a group of agents can reach a β-consensus,the value of which is the group decision value varying from the minimum and the maximum values of the initial states of the agents.Moreover,we derive the conditions to guarantee that all the agents reach a β-consensus on a desired group decision value.Finally,a simulation study concerning the vertical alignment manoeuvere of a team of unmanned air vehicles is performed.Simulation results show that the nonlinear consensus protocols proposed are more effective than the linear protocols for the formation control of the agents and they are an improvement over existing protocols.

  18. CHIP: Commodity based Hazard Identification Protocol for emerging diseases in plants and animals

    OpenAIRE

    Bremmer, J.; Swanenburg, M.; Galen, van, M.A.; Hoek, Maarten; Rau, M.L.; Hennen, W.H.G.J.; Benninga, J.; Ge, L.; Breukers, M.L.H.

    2012-01-01

    This project comprised the development of a commodity-based hazard identification protocol for biological hazards in plants and animals as a decision support tree programmed in Excel. The content of the decision tree is based on the results of a systematic review of pest and pathogen characteristics, a review of risk assessment schemes and on expert judgement. Application of the protocol results in an indication of the level of likelihood of entry of animal and plant pathogens/pests in the ar...

  19. A Local Energy Consumption Prediction-Based Clustering Protocol for Wireless Sensor Networks

    OpenAIRE

    Jiguo Yu; Li Feng; Lili Jia; Xin Gu; Dongxiao Yu

    2014-01-01

    Clustering is a fundamental and effective technique for utilizing sensor nodes’ energy and extending the network lifetime for wireless sensor networks. In this paper, we propose a novel clustering protocol, LECP-CP (local energy consumption prediction-based clustering protocol), the core of which includes a novel cluster head election algorithm and an inter-cluster communication routing tree construction algorithm, both based on the predicted local energy consumption ratio of nodes. We also p...

  20. Improved Coomassie Blue Dye-Based Fast Staining Protocol for Proteins Separated by SDS-PAGE

    OpenAIRE

    Májek, Pavel; Riedelová-Reicheltová, Zuzana; Pecánková, Klára; Dyr, Jan E.

    2013-01-01

    The time required to visualize proteins using Coomassie Blue dye has been significantly reduced with the introduction of fast staining protocols based on staining with a Coomassie Blue dye solution at boiling temperatures. However, fast stainings suffer from high gel backgrounds, reducing the signal-to-noise ratio and limiting the number of detectable spots in the case of 2D SDS-PAGE. The aim of this work was to eliminate the high gel background, and thus improve fast staining protocols based...

  1. LMEEC: Layered Multi-Hop Energy Efficient Cluster-based Routing Protocol for Wireless Sensor Networks

    CERN Document Server

    Khelifi, Manel

    2012-01-01

    In this paper, we propose LMEEC, a cluster-based rout- ing protocol with low energy consumption for wireless sensor networks. Our protocol is based on a strategy which aims to provide a more equitable exploitation of the selected nodes (cluster-heads) energy. Simulation results show the effective- ness of LMEEC in decreasing the energy consumption, and in prolonging the network lifetime, compared to LEACH.

  2. A lightweight neighbor-info-based routing protocol for no-base-station taxi-call system.

    Science.gov (United States)

    Zhu, Xudong; Wang, Jinhang; Chen, Yunchao

    2014-01-01

    Since the quick topology change and short connection duration, the VANET has had unstable routing and wireless signal quality. This paper proposes a kind of lightweight routing protocol-LNIB for call system without base station, which is applicable to the urban taxis. LNIB maintains and predicts neighbor information dynamically, thus finding the reliable path between the source and the target. This paper describes the protocol in detail and evaluates the performance of this protocol by simulating under different nodes density and speed. The result of evaluation shows that the performance of LNIB is better than AODV which is a classic protocol in taxi-call scene. PMID:24737984

  3. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Nenad Kojić

    2012-06-01

    Full Text Available The networking infrastructure of wireless mesh networks (WMNs is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs. This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission. The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.

  4. A neural networks-based hybrid routing protocol for wireless mesh networks.

    Science.gov (United States)

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  5. A Centralized Energy Efficient Distance Based Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rohit D. Gawade

    2016-01-01

    Full Text Available Wireless sensor network (WSN typically consists of a large number of low cost wireless sensor nodes which collect and send various messages to a base station (BS. WSN nodes are small battery powered devices having limited energy resources. Replacement of such energy resources is not easy for thousands of nodes as they are inaccessible to users after their deployment. This generates a requirement of energy efficient routing protocol for increasing network lifetime while minimizing energy consumption. Low Energy Adaptive Clustering Hierarchy (LEACH is a widely used classic clustering algorithm in WSNs. In this paper, we propose a Centralized Energy Efficient Distance (CEED based routing protocol to evenly distribute energy dissipation among all sensor nodes. We calculate optimum number of cluster heads based on LEACH’s energy dissipation model. We propose a distributed cluster head selection algorithm based on dissipated energy of a node and its distance to BS. Moreover, we extend our protocol by multihop routing scheme to reduce energy dissipated by nodes located far away from base station. The performance of CEED is compared with other protocols such as LEACH and LEACH with Distance Based Thresholds (LEACH-DT. Simulation results show that CEED is more energy efficient as compared to other protocols. Also it improves the network lifetime and stability period over the other protocols.

  6. Isolation and enrichment of low abundant particles with insulator-based dielectrophoresis.

    Science.gov (United States)

    LaLonde, Alexandra; Romero-Creel, Maria F; Saucedo-Espinosa, Mario A; Lapizco-Encinas, Blanca H

    2015-11-01

    Isolation and enrichment of low-abundant particles are essential steps in many bio-analytical and clinical applications. In this work, the capability of an insulator-based dielectrophoresis (iDEP) device for the detection and stable capture of low abundant polystyrene particles and yeast cells was evaluated. Binary and tertiary mixtures of particles and cells were tested, where the low-abundant particles had concentration ratios on the order of 1:10 000 000 compared to the other particles present in the mixture. The results demonstrated successful and stable capture and enrichment of rare particles and cells (trapping efficiencies over 99%), where particles remained trapped in a stable manner for up to 4 min. A device with four reservoirs was employed for the separation and enrichment of rare particles, where the particles of interest were first selectively concentrated and then effectively directed to a side port for future collection and analysis. The present study demonstrates that simple iDEP devices have appropriate screening capacity and can be used for handling samples containing rare particles; achieving both enrichment and isolation of low-abundant particles and cells. PMID:26674134

  7. Rheology, fatty acid profile and quality characteristics of nutrient enriched pizza base.

    Science.gov (United States)

    Gupta, Chaitali Sen; Milind; Jeyarani, T; Rajiv, Jyotsna

    2015-05-01

    Enrichment of thick bread type pizza base (PZB) was done by substituting wheat flour (WF) with 5, 10 and 15 % soya protein isolate (SPI). The rheological characteristics of WF showed that water absorption increased, extensibility and peak viscosity decreased when level of SPI increased from 5 to 15 %. Baking studies showed that spread ratio decreased and hardness values of PZB increased with the increase in amount of SPI from 5 to15 %. Beyond 10 % SPI, the overall quality of PZB was adversely affected. To the optimal blend of 10 % SPI, 5 % psyllium husk (PH) was added and the hydrogenated fat was replaced by canola oil (CAN) in enriched PZB. The enriched PZB treated with combination of additives had 1.7 and 1.6 times more protein and dietary fiber than the control PZB. Fatty acid analysis showed that the enriched PZB had 58.65 % oleic, 6.58 % linolenic acid and 31.28 % polyunsaturated fatty acid and no Trans fat was present. PMID:25892792

  8. Exercise and nutrition routine improving cancer health (ENRICH: The protocol for a randomized efficacy trial of a nutrition and physical activity program for adult cancer survivors and carers

    Directory of Open Access Journals (Sweden)

    Boyes Allison

    2011-04-01

    Full Text Available Abstract Background The Exercise and Nutrition Routine Improving Cancer Health (ENRICH study is investigating a novel lifestyle intervention aimed at improving the health behaviors of adult cancer survivors and their carers. The main purpose of the study is to determine the efficacy of lifestyle education and skill development delivered via group-based sessions on the physical activity and dietary behaviors of participants. This article describes the intervention development, study design, and participant recruitment. Methods/Design ENRICH is a randomized controlled trial, conducted in Australia, with two arms: an intervention group participating in six, two-hour face-to-face sessions held over eight weeks, and a wait-list control group. Intervention sessions are co-facilitated by an exercise physiologist and dietician. Content includes healthy eating education, and a home-based walking (utilizing a pedometer and resistance training program (utilizing elastic tubing resistance devices. The program was developed with reference to social cognitive theory and chronic disease self-management models. The study population consists of cancer survivors (post active-treatment and their carers recruited through community-based advertising and referral from health professionals. The primary outcome is seven-days of sealed pedometry. Secondary outcomes include: self-reported physical activity levels, dietary intake, sedentary behavior, waist circumference, body mass index, quality of life, and perceived social support. The outcomes will be measured at baseline (one week prior to attending the program, eight-weeks (at completion of intervention sessions, and 20-weeks. The intervention group will also be invited to complete 12-month follow-up data collection. Process evaluation data will be obtained from participants by questionnaire and attendance records. Discussion No trials are yet available that have evaluated the efficacy of group-based lifestyle

  9. SNP-guided identification of monoallelic DNA-methylation events from enrichment-based sequencing data.

    Science.gov (United States)

    Steyaert, Sandra; Van Criekinge, Wim; De Paepe, Ayla; Denil, Simon; Mensaert, Klaas; Vandepitte, Katrien; Vanden Berghe, Wim; Trooskens, Geert; De Meyer, Tim

    2014-11-10

    Monoallelic gene expression is typically initiated early in the development of an organism. Dysregulation of monoallelic gene expression has already been linked to several non-Mendelian inherited genetic disorders. In humans, DNA-methylation is deemed to be an important regulator of monoallelic gene expression, but only few examples are known. One important reason is that current, cost-affordable truly genome-wide methods to assess DNA-methylation are based on sequencing post-enrichment. Here, we present a new methodology based on classical population genetic theory, i.e. the Hardy-Weinberg theorem, that combines methylomic data from MethylCap-seq with associated SNP profiles to identify monoallelically methylated loci. Applied on 334 MethylCap-seq samples of very diverse origin, this resulted in the identification of 80 genomic regions featured by monoallelic DNA-methylation. Of these 80 loci, 49 are located in genic regions of which 25 have already been linked to imprinting. Further analysis revealed statistically significant enrichment of these loci in promoter regions, further establishing the relevance and usefulness of the method. Additional validation was done using both 14 whole-genome bisulfite sequencing data sets and 16 mRNA-seq data sets. Importantly, the developed approach can be easily applied to other enrichment-based sequencing technologies, like the ChIP-seq-based identification of monoallelic histone modifications. PMID:25237057

  10. Enhancing user privacy in SARG04-based private database query protocols

    Science.gov (United States)

    Yu, Fang; Qiu, Daowen; Situ, Haozhen; Wang, Xiaoming; Long, Shun

    2015-11-01

    The well-known SARG04 protocol can be used in a private query application to generate an oblivious key. By usage of the key, the user can retrieve one out of N items from a database without revealing which one he/she is interested in. However, the existing SARG04-based private query protocols are vulnerable to the attacks of faked data from the database since in its canonical form, the SARG04 protocol lacks means for one party to defend attacks from the other. While such attacks can cause significant loss of user privacy, a variant of the SARG04 protocol is proposed in this paper with new mechanisms designed to help the user protect its privacy in private query applications. In the protocol, it is the user who starts the session with the database, trying to learn from it bits of a raw key in an oblivious way. An honesty test is used to detect a cheating database who had transmitted faked data. The whole private query protocol has O( N) communication complexity for conveying at least N encrypted items. Compared with the existing SARG04-based protocols, it is efficient in communication for per-bit learning.

  11. A DUAL RESERVATION CDMA-BASED MAC PROTOCOL WITH POWER CONTROL FOR AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Jia Min; Chen Huimin; Yuan Yuhua

    2007-01-01

    This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel, broadcast channel and several data channels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol, the results show that the proposed mechanism improves the average throughput and limits the transmission delay efficiently.

  12. Efficient and configurable transmission protocol based on UDP in grid computing

    Institute of Scientific and Technical Information of China (English)

    Jigang WANG; Guochang GU; Chunguang MA; Weidong ZHONG

    2009-01-01

    At present,mainstream data transfer protocols are not always a good match for the diverse demands of grid computing.Considering this situation,this article proposes an efficient and configurable data transfer protocol (ECUDP) for grid computing.The ECUDP is based on the standard user datagram protocol (UDP),but with a collection of optimizations that meet the challenge of providing configurability and reliability while main-taining performance that meets the communication requirements of demanding applications.Experimental results show that the ECUDP performs efficiently in various grid computing scenarios and the performance analysis model can provide a good estimation of its performance.

  13. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    Science.gov (United States)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  14. An Energy- Aware Routing Protocol Based on Effective Transmission in Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    YUAN Linfeng; YANG Zongkai; CHENG Wenqing; DU Xu

    2006-01-01

    In order to minimize the energy consumption in the discovery of the routing path, this paper introduces a novel concept of effective transmission (ET) that ensures each forwarding node is not only farther from the source node, but also nearer to the destination node with respect to its sender.An energy-aware routing protocol based on ET is proposed.It enables the energy consumption for each hop to be the least for the transmission. The simulation results show the routing protocol is effective in the performance of energy consumption comparing with some other routing protocols.

  15. A Multiparty Controlled Bidirectional Quantum Secure Direct Communication and Authentication Protocol Based on EPR Pairs

    Science.gov (United States)

    Chang, Yan; Zhang, Shi-Bin; Yan, Li-Li; Sheng, Zhi-Wei

    2013-06-01

    A multiparty controlled bidirectional quantum secure direct communication and authentication protocol is proposed based on EPR pair and entanglement swapping. The legitimate identities of communicating parties are encoded to Bell states which act as a detection sequence. Secret messages are transmitted by using the classical XOR operation, which serves as a one-time-pad. No photon with secret information transmits in the quantum channel. Compared with the protocols proposed by Wang et al. [Acta Phys. Sin. 56 (2007) 673; Opt. Commun. 266 (2006) 732], the protocol in this study implements bidirectional communication and authentication, which defends most attacks including the ‘man-in-the-middle’ attack efficiently.

  16. Bioavailability of Mineral Nutrients in Plantain Based Product Enriched With Bambara Groundnut Protein Concentrate

    OpenAIRE

    David B. Kiin-Kabari; Sunday Y. Giami; Boisa Ndokiari

    2015-01-01

    Plantain based products (amala, cookies, bread and cakes) enriched with bambara groundnut protein concentrate were produced. Total minerals content of the products were investigated using the atomic absorption spectrophotometry. A total of six essential minerals: iron, calcium, potassium, phosphorus, magnesium and sodium were determined. The bioavailability of these minerals was studied using pepsin and pancreatin enzymes in-vitro digestion method. The products developed were high in potassiu...

  17. A Technology Based Program That Matches Enrichment Resources With Student Strengths

    OpenAIRE

    J.S. Renzulli; S.M. Reis

    2007-01-01

    Remarkable advances in instructionalcommunication technology (ICT) have now made ispossible to provide high levels of enrichment and thekinds of curricular differentiation that facilitateadvanced learning services to students who have accessto a computer and the Internet. But in order tomaximize the potential if ICT it is necessary to constructprograms that are based on learning theory that goesbeyond the didactic and prescriptive models that haveresulted in too much worksheets-on-line and el...

  18. SNP-guided identification of monoallelic DNA-methylation events from enrichment-based sequencing data

    OpenAIRE

    Steyaert, Sandra; Van Criekinge, Wim; De Paepe, Ayla; Denil, Simon; Mensaert, Klaas; Vandepitte, Katrien; Vanden Berghe, Wim; Trooskens, Geert; de Meyer, Tim

    2014-01-01

    Monoallelic gene expression is typically initiated early in the development of an organism. Dysregulation of monoallelic gene expression has already been linked to several non-Mendelian inherited genetic disorders. In humans, DNA-methylation is deemed to be an important regulator of monoallelic gene expression, but only few examples are known. One important reason is that current, cost-affordable truly genome-wide methods to assess DNA-methylation are based on sequencing post-enrichment. Here...

  19. DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH PROTOCOL FOR WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Abdallah Ijjeh

    2015-11-01

    Full Text Available A Wireless Sensor Network (WSN contains a large number of sensor nodes equipped with limited energy supplies. In most applications, sensor nodes are deployed in a random fashion. Therefore, battery replacement or charging is considered not practical. As a result, routing protocols must be energy-efficient to prolong the network’s lifetime. In this paper, we propose a new Dynamic Re-clustering LEACH-Based protocol (DR-LEACH which aims to reduce the energy consumption and extending the network’s lifetime. The idea is to balance energy consumption of Cluster Heads (CHs by generating clusters with almost equal number of nodes during each round of the network life time. To perform this, we first calculate the optimal number of CHs in each round, and based on that we calculate the optimal size of each cluster. Results show that the proposed protocol improves network lifetime and reduces overall energy consumption compared to LEACH and BCDCP protocols.

  20. Optimal hop position-based minimum energy routing protocol for underwater acoustic sensor networks

    OpenAIRE

    K.S. Geethu; A.V. Babu

    2015-01-01

    Development of energy-efficient routing protocols is a major concern in the design of underwater acoustic sensor networks (UASNs) since UASN nodes are typically powered by batteries, which are difficult to replace or recharge in aquatic environments. This study proposes an optimal hop position-based energy-efficient routing protocol for UASNs. Initially, the authors present an analytical model to compute the total energy consumption in a multi-hop UASN for deep water scenario, taking into acc...

  1. FHC-NCTSR: Node Centric Trust Based secure Hybrid Routing Protocol for Ad Hoc Networks

    OpenAIRE

    Prasuna V G; Dr. S Madhusudahan Verma

    2012-01-01

    To effectively support communication in such a dynamic networking environment as the ad hoc networks, the routing mechanisms should adapt to secure and trusted route discovery and service quality in data transmission. In this context, the paper proposed a routing protocol called Node Centric Trust based Secure Hybrid Routing Protocol [FHC-NCTSR] that opted to fixed hash chaining for data transmission and node centric trust strategy for secure route discovery. The route discovery is reactive i...

  2. Design and Simulation of Mobile Commerce Identity Authentication Protocol Based on OTP

    OpenAIRE

    Qin Wang; Huifeng Li

    2015-01-01

    With popularization and development of mobile commerce, the security of mobile commerce has drawn more and more attentions. Identity authentication is the first safety barrier, as communication security almost starts from its handshake process. Authentication protocol based on ciper technology is the safest method to realize identity authentication, and therefore identity authentication protocol is necessary to ensure communication security in mobile commerce. Combined One-time password (OTP)...

  3. An Improved Itinerary Recording Protocol for Securing Distributed Architectures Based on Mobile Agents

    OpenAIRE

    Guillaume Allée; Samuel Pierre; Roch H. Glitho; Abdelmorhit El Rhazi

    2005-01-01

    This paper proposes an improved itinerary recording protocol for securing distributed architectures based on mobile agents. The behavior of each of the cooperating agents is described, as well as the decision process establishing the identities of offenders when an attack is detected. Our protocol is tested on a set of potential attacks and the results confirm our assumption regarding offender designations and moments of detection. More precisely, the performance evaluation shows that our pro...

  4. On the security of a novel key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Recently, Xiao et al. proposed a novel key agreement protocol based on Chebyshev chaotic map. In this paper, the security of the protocol is analyzed, and two attack methods can be found in different scenarios. The essential principle of Xiao et al.'s scheme is summarized. It is also pointed out with proof that any attempt along this line to improve the security of Chebyshev map is redundant.

  5. A Privacy-Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID

    OpenAIRE

    Henry Ker-Chang Chang; Erl-Huei Lu; Shin-Yan Chiou; Wen-Tsai Ko

    2012-01-01

    An RFID (Radio-Frequency IDentification) system provides the mechanism to identify tags to readers and then to execute specific RFID-enabled applications. In those applications, secure protocols using lightweight cryptography need to be developed and the privacy of tags must be ensured. In 2010, Batina et al. proposed a privacy-preserving grouping proof protocol for RFID based on ECC (Elliptic Curve Cryptography) in public-key cryptosystem. In the next year, Lv et al. had shown that Batina et...

  6. AMQ Protocol Based Performance Analysis of Bare Metal Hypervisors

    Directory of Open Access Journals (Sweden)

    Dr Deepak Arora

    2014-06-01

    Full Text Available Cloud computing is one of the most exciting technology because of its cost-reducing approach, flexibility, and scalability. Hypervisor is the essential part of cloud technology; it is a component of software that provides a virtualized hardware environment to support running multiple operating systems concurrently using one physical server. In this paper we took KVM, XEN, Hyper-V and ESXi as hypervisors. We have compared the performance of Virtual Machines (VMs by RabbitMQ message broker server that uses Advanced Message Queuing Protocol(AMQP for breaking messages. We establish the setup on bare metal hypervisor that is installed directly on the hardware of the system. We took SAN (Shared Storage Network server for maintaining the storage of all VMs. By the evaluation of these hyperviosrs we got a brief idea about their performance on different parameters. These results will be beneficial to small enterprise, social group or any private IT firm which is choosing to build small cloud infrastructure with optimal benefits. Experiment results of checking the performance of VMs for all the hypervisors shows that there is performance variation on different applications and workloads of the hypervisors. None of the hypervisors outperform another at every aspect of our comparison.

  7. History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Affoua Thérèse Aby

    2016-06-01

    Full Text Available Wireless sensor networks (WSNs are increasingly used in environmental monitoring applications. They are designed to operate for several months by featuring low activity cycles in order to save energy. In this paper, we propose a Medium Access Control (MAC protocol for suchWSNs with very low duty-cycles of 1% and less. Nodes are activated randomly and use a history of previous successful frame exchanges to decide their next activation time. We study the choice of the history size, and we compare the performance of our protocol with other protocols from the literature. We show by simulations and real experiments that with a limited history size of only six entries, our protocol achieves better performance than other protocols from the literature, while keeping the advantages of fully asynchronous protocols.

  8. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    Science.gov (United States)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  9. Distributed Networked Control System for Power Supply System of the Accelerator Based on Canopen Protocol

    International Nuclear Information System (INIS)

    Network based control system for a power supply unit of the linear accelerator was developed. Front-end level of the system is based on CAN fieldbus with CANopen and CANEX application level protocols. Both local and remote control foe each CANopen node is provided. Level 2 control stations of the system are ARM9 CPU based machines, operating under Linux OS

  10. An Analysis of Energy Consumption on ACK+Rate Packet in Rate Based Transport Protocol

    Directory of Open Access Journals (Sweden)

    P.Ganeshkumar

    2009-09-01

    Full Text Available Rate based transport protocol determines the rate of data transmission between the sender and receiver and then sends the data according to that rate. To notify the rate to the sender, the receiver sends ACK+Rate packet based on epoch timer expiry. In this paper, through detailed arguments and simulation it is shown that the transmission of ACK+Rate packet based on epoch timer expiry consumes more energy in network with low mobility. To overcome this problem, a new technique called Dynamic Rate Feedback (DRF is proposed. DRF sends ACK+Rate whenever there is a change in rate of ±25% than the previous rate. Based on ns2 simulation DRF is compared with ATP.Keywords- Ad hoc network, Ad hoc transport Protocol, Rate based transport protocols, energy consumption, Intermediate node

  11. Pros and cons of methylation-based enrichment methods for ancient DNA

    DEFF Research Database (Denmark)

    Seguin-Orlando, Andaine; Gamba, Cristina; Der Sarkissian, Clio; Ermini, Luca; Louvel, Guillaume; Boulygina, Eugenia; Sokolov, Alexey; Nedoluzhko, Artem; Lorenzen, Eline; Lopez, Patricio; McDonald, H. Gregory; Scott, Eric; Tikhonov, Alexei; Stafford jr., Thomas; Alfarhan, Ahmed H.; Alquraishi, Saleh A.; Al-Rasheid, Khaled A. S.; Shapiro, Beth; Willerslev, Eske; Prokhortchouk, Egor; Orlando, Ludovic Antoine Alexandre

    2015-01-01

    The recent discovery that DNA methylation survives in fossil material provides an opportunity for novel molecular approaches in palaeogenomics. Here, we apply to ancient DNA extracts the probe-independent Methylated Binding Domains (MBD)-based enrichment method, which targets DNA molecules...... containing methylated CpGs. Using remains of a Palaeo-Eskimo Saqqaq individual, woolly mammoths, polar bears and two equine species, we confirm that DNA methylation survives in a variety of tissues, environmental contexts and over a large temporal range (4,000 to over 45,000 years before present). MBD...... enrichment, however, appears principally biased towards the recovery of CpG-rich and long DNA templates and is limited by the fast post-mortem cytosine deamination rates of methylated epialleles. This method, thus, appears only appropriate for the analysis of ancient methylomes from very well preserved...

  12. Protocol for emergency dosimetry based on phaners using EPR spectrometry

    International Nuclear Information System (INIS)

    dependence of properties following hair color was observed. Moreover, the significant influence of the conditions of irradiation and storage on the hair (in particular humidity), may limit the accuracy of the dose assessment. No specific sample preparation is required before measurement. Moreover, sample measurement can be performed within 5 minutes allowing measuring of a large number of samples in a very short delay.Taking into account sample specificities, it was possible to define an operational protocol for phaners specifically for emergency situation. The protocol can be divided in different stages. A first estimation can be done very quickly using averaged value of main characteristics (fading constant, radiation sensitivity, amplitude of background signal). In the next stages, the determination of the main constant values for each sample allows to increase the accuracy of the dose estimation. This study showed that it was possible, starting from EPR measurement of the phaners, to carry out a population triage according to the severity of the exposure, and to consider the dose received for the most irradiated victims, within a time and with uncertainties compatible with the management of accident. (authors)

  13. Enhancing data exploitation through DTN-based data transmission protocols

    Science.gov (United States)

    Daglis, Ioannis A.; Tsaoussidis, Vassilis; Rontogiannis, Athanasios; Balasis, Georgios; Keramitsoglou, Iphigenia; Paronis, Dimitrios; Sykioti, Olga; Tsinganos, Antonios

    2014-05-01

    Data distribution and data access are major issues in space sciences and geosciences as they strongly influence the degree of data exploitation. Processing and analysis of large volumes of Earth observation and space/planetary data face two major impediments: limited access capabilities due to narrow connectivity windows between spacecraft and ground receiving stations and lack of sufficient communication and dissemination mechanisms between space data receiving centres and the end-user community. Real-time data assimilation that would be critical in a number of forecasting capabilities is particularly affected by such limitations. The FP7-Space project "Space-Data Routers" (SDR) has the aim of allowing space agencies, academic institutes and research centres to disseminate/share space data generated by single or multiple missions, in an efficient, secure and automated manner. The approach of SDR relies on space internetworking - and in particular on Delay-Tolerant Networking (DTN), which marks the new era in space communications, unifies space and earth communication infrastructures and delivers a set of tools and protocols for space-data exploitation. The project includes the definition of limitations imposed by typical space mission scenarios in which the National Observatory of Athens is currently involved, including space and planetary exploration, as well as satellite-supported geoscience applications. In this paper, we present the mission scenarios, the SDR-application and the evaluation of the associated impact from the space-data router enhancements. The work leading to this paper has received funding from the European Union's Seventh Framework Programme (FP7-SPACE-2010-1) under grant agreement no. 263330 for the SDR (Space-Data Routers for Exploiting Space Data) collaborative research project. This paper reflects only the authors' views and the Union is not liable for any use that may be made of the information contained therein.

  14. An Efficient Password Security of Multi-Party Key Exchange Protocol Based on ECDLP

    Directory of Open Access Journals (Sweden)

    Banshidhar Majhi

    2009-12-01

    Full Text Available In this paper we have proposed an efficient password security of multiparty Key Exchange Protocol based on Elliptic Curve Discrete Logarithm Problem. Key exchange protocols allow a group of parties communicating over a public network to establish a common secret key called session key.Due to their significance by in building a secure communication channel, a number of key exchange protocols have been suggested over the years for a variety of settings.our Protocol is password authentication model, where group member are assumed to hold an individual password rather than a common password. Here we have taken two one-way hash functions to built the level of security high.

  15. Vehicle density based forwarding protocol for safety message broadcast in VANET.

    Science.gov (United States)

    Huang, Jiawei; Huang, Yi; Wang, Jianxin

    2014-01-01

    In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay. PMID:25121125

  16. A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment

    CERN Document Server

    Ruckmani, V

    2010-01-01

    In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

  17. Cryptanalysis and Improvement of Quantum Private Comparison Protocol Based on Bell Entangled States

    International Nuclear Information System (INIS)

    Recently, Liu et al. [Commun. Theor. Phys. 57 (2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party (TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol, it not only reduces the Bell states consumption but also simplifies the protocol steps. (general)

  18. Cryptanalysis and Improvement of Quantum Private Comparison Protocol Based on Bell Entangled States

    Science.gov (United States)

    Liu, Wen-Jie; Liu, Chao; Chen, Han-Wu; Li, Zhi-Qiang; Liu, Zhi-Hao

    2014-08-01

    Recently, Liu et al. [Commun. Theor. Phys. 57 (2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party (TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol, it not only reduces the Bell states consumption but also simplifies the protocol steps.

  19. A decentralized fuzzy C-means-based energy-efficient routing protocol for wireless sensor networks.

    Science.gov (United States)

    Alia, Osama Moh'd

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols. PMID:25162060

  20. FHC-NCTSR: Node Centric Trust Based secure Hybrid Routing Protocol for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Prasuna V G

    2012-07-01

    Full Text Available To effectively support communication in such a dynamic networking environment as the ad hoc networks, the routing mechanisms should adapt to secure and trusted route discovery and service quality in data transmission. In this context, the paper proposed a routing protocol called Node Centric Trust based Secure Hybrid Routing Protocol [FHC-NCTSR] that opted to fixed hash chaining for data transmission and node centric trust strategy for secure route discovery. The route discovery is reactive in nature, in contrast to this, data transmission is proactive, hence the protocol FHC-NCTSR termed as hybrid routing protocol. The performance results obtained from simulation environment concluding that due to the fixed hash chaining technique opted by FHC-NCTSR, it is more than one order of magnitude faster than other hash chain based routing protocols such as SEAD in packet delivery. Due to the node centric strategy of route discovery that opted by FHC-NCTSR, it elevated as trusted one against to Rushing, Routing table modification and Tunneling attacks, in contrast other protocols failed to provide security for one or more attacks listed, example is ARIADNE that fails to protect from tunneling attack.

  1. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Osama Moh’d Alia

    2014-01-01

    Full Text Available Energy conservation in wireless sensor networks (WSNs is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network’s lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  2. A Novel Multi-Channel MAC Protocol for Cluster Based Wireless Multimedia Sensor Networks

    Science.gov (United States)

    Wei, Lu; Longmei, Zhang

    An energy efficient, scalable and collision free MAC protocol, DTFMM, is presented in this paper, which combines frequency and time division principles for medium sharing. It is based on clustered network topology, and the protocol employs a distributed local coordinate algorithm for assigning channels among clusters to enable simultaneous non-interfering data collection. Intra-cluster transmissions are scheduled by cluster head (CH) based on time slot. CHs aggregate the gathered data and forward it over inter-CH paths to the base-station based on minimum spanning tree routing. Distinct channels are adopted by the independent branches of the inter-CH routing tree. Data transmission on a branch is further scheduled in depth-first ordering. DTFMM allows nodes to stay in sleeping mode for the longest duration and thus it minimizes energy consumption. Simulation demonstrated superiority of DTFMM in terms of convergent rate, throughput and delay performance when compared with well-known protocol MMSN.

  3. PERFORMANCE COMPARISON OF POSITION-BASED ROUTING PROTOCOLS IN VEHICLE-TOVEHICLE (V2V COMMUNICATION

    Directory of Open Access Journals (Sweden)

    SANJOY DAS

    2011-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs is the new wireless networking concept of the wireless ad hoc networks in the research community. Vehicle-to-Vehicle (V2V communication plays a significant role in providing a high level of safety and convenience to drivers and passengers. Routing in VANET is a major challenge and research area. Position based routing protocol has been identified to be suitable for VANETs because of frequently changed network topology and highly dynamic nature of vehicular nodes. Many position based routing protocols have been developed for routing messages in greedy orwarding way in VANETs. However, few of them are efficient when the network is highly dynamic. In this paper, we present an overview andqualitative comparison of existing position based routing protocols that are based on the position prediction of neighboring and destination nodes. We evaluate the performance metrics such as end-to-end delay and packet delivery ratio using NS-2 simulator.

  4. Implementing an ultrasound-based protocol for diagnosingappendicitis while maintaining diagnostic accuracy

    Energy Technology Data Exchange (ETDEWEB)

    Van Atta, Angela J. [University of Utah School of Medicine, Salt Lake City, UT (United States); Baskin, Henry J.; Maves, Connie K.; Dansie, David M. [Primary Children' s Hospital, Department of Radiology, Salt Lake City, UT (United States); Rollins, Michael D. [University of Utah School of Medicine, Department of Surgery, Division of Pediatric Surgery, Salt Lake City, UT (United States); Bolte, Robert G. [University of Utah School of Medicine, Department of Pediatrics, Division of Pediatric Emergency Medicine, Salt Lake City, UT (United States); Mundorff, Michael B.; Andrews, Seth P. [Primary Children' s Hospital, Systems Improvement, Salt Lake City, UT (United States)

    2015-05-01

    The use of ultrasound to diagnose appendicitis in children is well-documented but not universally employed outside of pediatric academic centers, especially in the United States. Various obstacles make it difficult for institutions and radiologists to abandon a successful and accurate CT-based imaging protocol in favor of a US-based protocol. To describe how we overcame barriers to implementing a US-based appendicitis protocol among a large group of nonacademic private-practice pediatric radiologists while maintaining diagnostic accuracy and decreasing medical costs. A multidisciplinary team of physicians (pediatric surgery, pediatric emergency medicine and pediatric radiology) approved an imaging protocol using US as the primary modality to evaluate suspected appendicitis with CT for equivocal cases. The protocol addressed potential bias against US and accommodated for institutional limitations of radiologist and sonographer experience and availability. Radiologists coded US reports according to the probability of appendicitis. Radiology reports were compared with clinical outcomes to assess diagnostic accuracy. During the study period, physicians from each group were apprised of the interim US protocol accuracy results. Problematic cases were discussed openly. A total of 512 children were enrolled and underwent US for evaluation of appendicitis over a 30-month period. Diagnostic accuracy was comparable to published results for combined US/CT protocols. Comparing the first 12 months to the last 12 months of the study period, the proportion of children achieving an unequivocal US result increased from 30% (51/169) to 53% (149/282) and the proportion of children undergoing surgery based solely on US findings increased from 55% (23/42) to 84% (92/109). Overall, 63% (325/512) of patients in the protocol did not require a CT. Total patient costs were reduced by $30,182 annually. We overcame several barriers to implementing a US protocol. During the study period our

  5. Video-Based Modeling: Differential Effects due to Treatment Protocol

    Science.gov (United States)

    Mason, Rose A.; Ganz, Jennifer B.; Parker, Richard I.; Boles, Margot B.; Davis, Heather S.; Rispoli, Mandy J.

    2013-01-01

    Identifying evidence-based practices for individuals with disabilities requires specification of procedural implementation. Video-based modeling (VBM), consisting of both video self-modeling and video modeling with others as model (VMO), is one class of interventions that has frequently been explored in the literature. However, current information…

  6. Gene Ontology and KEGG Pathway Enrichment Analysis of a Drug Target-Based Classification System.

    Directory of Open Access Journals (Sweden)

    Lei Chen

    Full Text Available Drug-target interaction (DTI is a key aspect in pharmaceutical research. With the ever-increasing new drug data resources, computational approaches have emerged as powerful and labor-saving tools in predicting new DTIs. However, so far, most of these predictions have been based on structural similarities rather than biological relevance. In this study, we proposed for the first time a "GO and KEGG enrichment score" method to represent a certain category of drug molecules by further classification and interpretation of the DTI database. A benchmark dataset consisting of 2,015 drugs that are assigned to nine categories ((1 G protein-coupled receptors, (2 cytokine receptors, (3 nuclear receptors, (4 ion channels, (5 transporters, (6 enzymes, (7 protein kinases, (8 cellular antigens and (9 pathogens was constructed by collecting data from KEGG. We analyzed each category and each drug for its contribution in GO terms and KEGG pathways using the popular feature selection "minimum redundancy maximum relevance (mRMR" method, and key GO terms and KEGG pathways were extracted. Our analysis revealed the top enriched GO terms and KEGG pathways of each drug category, which were highly enriched in the literature and clinical trials. Our results provide for the first time the biological relevance among drugs, targets and biological functions, which serves as a new basis for future DTI predictions.

  7. INTEROPERABILITY, TRUST BASED INFORMATION SHARING PROTOCOL AND SECURITY: DIGITAL GOVERNMENT KEY ISSUES

    Directory of Open Access Journals (Sweden)

    Md.Headayetullah

    2010-06-01

    Full Text Available Improved interoperability between public and private organizations is of key significance to make digitalgovernment newest triumphant. Digital Government interoperability, information sharing protocol andsecurity are measured the key issue for achieving a refined stage of digital government. Flawlessinteroperability is essential to share the information between diverse and merely dispersed organisationsin several network environments by using computer based tools. Digital government must ensure securityfor its information systems, including computers and networks for providing better service to the citizens.Governments around the world are increasingly revolving to information sharing and integration forsolving problems in programs and policy areas. Evils of global worry such as syndrome discovery andmanage, terror campaign, immigration and border control, prohibited drug trafficking, and more demandinformation sharing, harmonization and cooperation amid government agencies within a country andacross national borders. A number of daunting challenges survive to the progress of an efficientinformation sharing protocol. A secure and trusted information-sharing protocol is required to enableusers to interact and share information easily and perfectly across many diverse networks and databasesglobally. This article presents (1 literature review of digital government security and interoperabilityand, (2 key research issue trust based information sharing protocol for seamless interoperability amongdiverse government organizations or agencies around the world. While trust-based information access iswell studied in the literature, presented secure information sharing technologies and protocols cannotoffer enough incentives for government agencies to share information amid them without harming theirown national interest. To overcome the drawbacks of the exiting technology, an innovative and proficienttrust-based security protocol is proposed in this

  8. What does it cost to deliver information using position-based beaconless forwarding protocols?

    KAUST Repository

    Bader, Ahmed

    2012-04-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single node. Although useful, but a solid understanding of the end-to-end performance is still necessary. In this paper, we shed light on the end-to-end performance of beaconless position-based protocols along three distinct dimensions: energy, latency, and back-off probability. The latter is used as a direct indicator of the network\\'s transport capacity. Consequently, we are able to provide an elaborate response to the question: what does it really cost to deliver a packet in a wireless sensor network using position-based beaconless forwarding protocols? In responding to this question, we highlighted the different performance tradeoffs inherent to beaconless position-based protocols. Furthermore, some operational recommendations are also provided. © 2012 IEEE.

  9. A Multiple-Dimensional Tree Routing Protocol for Multisink Wireless Sensor Networks Based on Ant Colony Optimization

    OpenAIRE

    Hui Zhou; Dongliang Qing; Xiaomei Zhang; Honglin Yuan; Chen Xu

    2012-01-01

    Routing protocol is an important topic in the wireless sensor networks. For MultiSink wireless sensor networks, the routing protocol designs and implementations are more difficult due to the structure complexity. The paper deals with the problem of a multiple-dimensional tree routing protocol for multisink wireless sensor networks based on ant colony optimization. The proposed protocol is as follows: (1) listening mechanism is used to establish and maintain multidimensional tree routing topol...

  10. A novel approach for ID distribution problem in Tree-based tag anti-collision protocols of RFID systems

    OpenAIRE

    Milad HajMirzaei

    2013-01-01

    Tag collision is one of the most important issues in RFID systems and many tag anti-collision protocolswere proposed in literature. But some kind of these protocols like Tree-based protocols (specifically Querytree) which its performance depends on tag ID length and construction, have some issues like IDdistribution. In this paper we discuss about Query tree protocol which may influenced by ID distribution.Then we propose a novel type of this protocol called Informatics Query tree to solve it...

  11. Gossip Based Routing Protocol Design for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Toqeer Mahmood

    2012-01-01

    Full Text Available A spontaneously mannered decentralized network with no formal infrastructure and limited in temporal and spatial extent where each node communicate with each other over a wireless channel and is willing to forward data for other nodes is called as Wireless Ad Hoc network. In this research study, we proposed a routing strategy based on gossip based routing approach that follows the proactive routing with some treatment for wireless Ad Hoc network. The analytical verification of our proposed idea shows that it is a better approach based on gossip routing.

  12. A Novel Trigon-based Dual Authentication Protocol for Enhancing Security in Grid Environment

    Directory of Open Access Journals (Sweden)

    V. Ruckmani

    2009-12-01

    Full Text Available In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multi-domain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these units are stored in two different servers, namely, Authentication Server and Backend Server. Only when the combined authentication scheme from both the servers authenticates the user, the privilege of accessing the requested resources is obtained by the user. The main advantage of utilizing the dual authentication protocol in grid computing is that an adversary user cannot attain the access privilege by compromising a single consolidated server because of the fact that the split password is stored in different servers.Keywords- Dual authentication; authentication protocol; trigon parameters; authentication code; grid computing; grid security;

  13. Highly Scalable, UDP-Based Network Transport Protocols for Lambda Grids and 10 GE Routed Networks

    Energy Technology Data Exchange (ETDEWEB)

    PI: Robert Grossman Co-PI: Stephen Eick

    2009-08-04

    Summary of Report In work prior to this grant, NCDM developed a high performance data transport protocol called SABUL. During this grant, we refined SABUL’s functionality, and then extended both the capabilities and functionality and incorporated them into a new protocol called UDP-based Data transport Protocol, or UDT. We also began preliminary work on Composable UDT, a version of UDT that allows the user to choose among different congestion control algorithms and implement the algorithm of his choice at the time he compiles the code. Specifically, we: · Investigated the theoretical foundations of protocols similar to SABUL and UDT. · Performed design and development work of UDT, a protocol that uses UDP in both the data and control channels. · Began design and development work of Composable UDT, a protocol that supports the use of different congestion control algorithms by simply including the appropriate library when compiling the code. · Performed experimental studies using UDT and Composable UDT using real world applications such as the Sloan Digital Sky Survey (SDSS) astronomical data sets. · Released several versions of UDT and Composable, the most recent being v3.1.

  14. Simulation Based: Study and Analysis of Routing Protocol in Vehicular Ad-hoc Network Environment

    Directory of Open Access Journals (Sweden)

    Vaishali D. Khairnar

    2012-03-01

    Full Text Available A Vehicular Ad hoc Network (VANET consists of vehicles which communicate with each other and exchange data via wireless communication links available between the vehicles which are in communication ranges of vehicles to improve the road safety in city. The communication between vehicles is used to provide road safety, comfort and entertainment. The performance of communication depends on how better routing takes place in the network. Routing data between the source and destination vehicle depends on the routing protocols being used in vehicular ad-hoc network. In this simulation based study we investigated about different ad hoc routing protocols for vehicular ad-hoc network (VANET. The main goal of our study was to identify which ad hoc routing protocol has better performance in highly mobile environment of vehicular ad-hoc network. We have measured the performance of routing protocols using 802.11p in vehicular ad-hoc network in which we considered the scenario of city (i.e. Route between Nerul and Vashi where we have take 1200 different types of vehicles and checked their performance. Routing protocols are selected after the literature review. The selected protocols are then evaluated through simulation under 802.11p in terms of performance metrics (i.e PDR & E2E delay

  15. Engineering Analysis Using a Web-based Protocol

    Science.gov (United States)

    Schoeffler, James D.; Claus, Russell W.

    2002-01-01

    This paper reviews the development of a web-based framework for engineering analysis. A one-dimensional, high-speed analysis code called LAPIN was used in this study, but the approach can be generalized to any engineering analysis tool. The web-based framework enables users to store, retrieve, and execute an engineering analysis from a standard web-browser. We review the encapsulation of the engineering data into the eXtensible Markup Language (XML) and various design considerations in the storage and retrieval of application data.

  16. Multi-Gateway-Based Energy Holes Avoidance Routing Protocol for WSN

    Directory of Open Access Journals (Sweden)

    Rohini Sharma

    2016-04-01

    Full Text Available In wireless sensor networks (WSNs, efficient energy conservation is required to prolong the lifetime of the network. In this work, we have given emphasis on balanced energy consumption and energy holes avoidance. This paper proposes a multi-gateway-based approach to reduce the transmission distance between the sender and the sink node. The area to be monitored is divided into regions and gateway nodes are deployed at optimal positions. We have designed a transmission scheme, in which sensors in the sink region communicate directly to the sink, sensors in the gateway region communicate directly to the gateway, and sensors in the cluster region transmit their data directly to their respective cluster head which transmits data to the gateway in its region. If the distance between a cluster head and the sink is less than the distance between the cluster head and the gateway node, the cluster head transmits data to the sink instead of the gateway node. We have compared the proposed protocol with Low-Energy Adaptive Clustering Hierarchy (LEACH, Gateway Based Energy Aware Multi-Hop Routing (M-GEAR, and Gateway Based Stable Election Protocol (GSEP protocols. The protocol performs better than other protocols in terms of throughput, stability period, lifetime, residual energy, and the packet transmitted to the sink.

  17. A School-Based Suicide Risk Assessment Protocol

    Science.gov (United States)

    Boccio, Dana E.

    2015-01-01

    Suicide remains the third leading cause of death among young people in the United States. Considering that youth who contemplate suicide generally exhibit warning signs before engaging in lethal self-harm, school-based mental health professionals can play a vital role in identifying students who are at risk for suicidal behavior. Nevertheless, the…

  18. School-Based Methylphenidate Placebo Protocols: Methodological and Practical Issues.

    Science.gov (United States)

    Hyman, Irwin A.; Wojtowicz, Alexandra; Lee, Kee Duk; Haffner, Mary Elizabeth; Fiorello, Catherine A.; And Others

    1998-01-01

    Focuses on methodological issues involved in choosing instruments to monitor behavior, once a comprehensive evaluation has suggested trials on Ritalin. Case examples illustrate problems of teacher compliance in filling out measures, supplying adequate placebos, and obtaining physical cooperation. Emerging school-based methodologies are discussed…

  19. Magnetic-Particle-Sensing Based Diagnostic Protocols and Applications

    Directory of Open Access Journals (Sweden)

    Tsukasa Takamura

    2015-06-01

    Full Text Available Magnetic particle-labeled biomaterial detection has attracted much attention in recent years for a number of reasons; easy manipulation by external magnetic fields, easy functionalization of the surface, and large surface-to-volume ratio, to name but a few. In this review, we report on our recent investigations into the detection of nano-sized magnetic particles. First, the detection by Hall magnetic sensor with lock-in amplifier and alternative magnetic field is summarized. Then, our approach to detect sub-200 nm diameter target magnetic particles via relatively large micoro-sized “columnar particles” by optical microscopy is described. Subsequently, we summarize magnetic particle detection based on optical techniques; one method is based on the scattering of the magnetically-assembled nano-sized magnetic bead chain in rotating magnetic fields and the other one is based on the reflection of magnetic target particles and porous silicon. Finally, we report recent works with reference to more familiar industrial products (such as smartphone-based medical diagnosis systems and magnetic removal of unspecific-binded nano-sized particles, or “magnetic washing”.

  20. Improved IKE Protocol Design Based On PKI/ECC

    OpenAIRE

    Song-Ho, Pak; Myong-Suk, Pak; Chung-Hyok, Jang

    2016-01-01

    This Paper proposes an ECDH key exchange method and an ECsig Digital Signature Authentication method based on group with Koblits curve, man-in-the-middle attack prevention method for SA payload and initiator identification payload to design high intensity IKE that can be implemented in portable devices.

  1. A Unidirectional Split-key Based Signature Protocol with Encrypted Function in Mobile Code Environment

    Institute of Scientific and Technical Information of China (English)

    MIAOFuyou; YANGShoubao; XIONGYan; HUABei; WANGXingfu

    2005-01-01

    In mobile code environment, signing private keys are liable to be exposed; visited hosts are susceptible to be attacked by all kinds of vicious mobile codes, therefore a signer often sends remote nodes mobile codes containing an encrypted signature function to complete a signature. The paper first presents a unidirectional split-key scheme for private key protection based on RSA, which is more simple and secure than secret sharing; and then proposes a split-key based signature protocol with encrypted function, which is traceable, undeniable and malignance resistant. Security analysis shows that the protocol can effectively protect the signing private key and complete secure signatures in mobile code environment.

  2. Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures

    Directory of Open Access Journals (Sweden)

    Christian M. Mueller

    2010-12-01

    Full Text Available Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown attacks. In this paper, we present an extension to known Support Vector Machine (SVM based anomaly detection algorithms for the Session Initiation Protocol (SIP. Our contribution is to extend the amount of different features used for classification (feature space by exploiting the structure of SIP messages, which reduces the false positive rate. Additionally, we show how combining our approach with attribute reduction significantly improves throughput.

  3. Rheology, fatty acid profile and quality characteristics of nutrient enriched pizza base

    OpenAIRE

    Gupta, Chaitali Sen; Milind; Jeyarani, T.; Rajiv, Jyotsna

    2014-01-01

    Enrichment of thick bread type pizza base (PZB) was done by substituting wheat flour (WF) with 5, 10 and 15 % soya protein isolate (SPI). The rheological characteristics of WF showed that water absorption increased, extensibility and peak viscosity decreased when level of SPI increased from 5 to 15 %. Baking studies showed that spread ratio decreased and hardness values of PZB increased with the increase in amount of SPI from 5 to15 %. Beyond 10 % SPI, the overall quality of PZB was adversely...

  4. Condensin I recruitment to base damage-enriched DNA lesions is modulated by PARP1.

    Directory of Open Access Journals (Sweden)

    Xiangduo Kong

    Full Text Available Condensin I is important for chromosome organization and segregation in mitosis. We previously showed that condensin I also interacts with PARP1 in response to DNA damage and plays a role in single-strand break repair. However, whether condensin I physically associates with DNA damage sites and how PARP1 may contribute to this process were unclear. We found that condensin I is preferentially recruited to DNA damage sites enriched for base damage. This process is dictated by PARP1 through its interaction with the chromosome-targeting domain of the hCAP-D2 subunit of condensin I.

  5. Zone Based Routing Protocol for Homogeneous Wireless Sensor Network

    OpenAIRE

    Taruna, S; Jain Kusum Lata; Purohit G.N

    2011-01-01

    Wireless Sensor Networks, are made of low-cost, low -power, small in size, and multifunctional sensor nodes. The efficient energy utilization is one of t he important performance factors for wireless senso r networks survivability be-cause nodes operate with limited battery power. In this paper we propose and analyze a new approach of zone based clustering hea d selection algorithm for wireless sensor network o f hom...

  6. A statistical frame based TDMA protocol for human body communication

    OpenAIRE

    Nie, Zedong; Li, Zhao; Huang, Renwei; Liu, Yuhang; Li, Jingzhen; Wang, Lei

    2015-01-01

    Background Human body communication (HBC) using the human body as the transmission medium, which has been regarded as one of the most promising short-range communications in wireless body area networks (WBAN). Compared to the traditional wireless networks, two challenges are existed in HBC based WBAN. (1) Its sensor nodes should be energy saving since it is inconvenient to replace or recharge the battery on these sensor nodes; (2) the coordinator should be able to react dynamically and rapidl...

  7. Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Sunmyeng Kim

    2015-10-01

    Full Text Available IEEE 802.11a/b/g standards support multiple data rates. Although the use of multiple data rates increases the capacity of wireless networks, it can lead to a performance anomaly problem. Cooperative communication for wireless networks has attracted considerable interest owing to its ability to mitigate this performance anomaly problem. In cooperative communication, a number of relay nodes support a source node in the forwarding of data packets to a destination node. If the direct transmission of a data packet between a source node and a destination node is not successful, the overheard data packet from the source node is forwarded by relay nodes to the destination node. Several MAC (Medium Access Control protocols have been proposed for cooperative communication in wireless networks. A number of these can result in collisions among the relay nodes in a dense network. Further, cooperative communication can be interrupted by other nodes. To resolve these problems, we propose a new cooperative protocol. In the proposed protocol, relay nodes are divided into several groups based on their data rates. Then, to limit the number of contending relay nodes, only the relay nodes in the highest group are selected. Collisions among the selected relay nodes are resolved based on a backoff mechanism. The proposed protocol ensures that cooperative communication is not interrupted by other nodes by implementing a busy signal and NAV (Network Allocation Vector. The proposed protocol can reduce the collision probability and increase the network performance. Performance evaluation is conducted using simulation, and confirms that the proposed protocol significantly outperforms the previous protocol in terms of throughput, collision probability, and delay.

  8. NET-GE: a novel NETwork-based Gene Enrichment for detecting biological processes associated to Mendelian diseases

    OpenAIRE

    Di Lena, Pietro; Martelli, Pier Luigi; Fariselli, Piero; Casadio, Rita

    2015-01-01

    Background Enrichment analysis is a widely applied procedure for shedding light on the molecular mechanisms and functions at the basis of phenotypes, for enlarging the dataset of possibly related genes/proteins and for helping interpretation and prioritization of newly determined variations. Several standard and Network-based enrichment methods are available. Both approaches rely on the annotations that characterize the genes/proteins included in the input set; network based ones also include...

  9. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  10. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    International Nuclear Information System (INIS)

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  11. A Swarm Intelligent Algorithm Based Route Maintaining Protocol for Mobile Sink Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoming Wu

    2015-01-01

    Full Text Available Recent studies have shown that mobile sink can be a solution to solve the problem that energy consumption of sensor nodes is not balanced in wireless sensor networks (WSNs. Caused by the sink mobility, the paths between the sensor nodes and the sink change frequently and have profound influence on the lifetime of WSN. It is necessary to design a protocol that can find efficient routings between the mobile sink and nodes but does not consume too many network resources. In this paper, we propose a swarm intelligent algorithm based route maintaining protocol to resolve this issue. The protocol utilizes the concentric ring mechanism to guide the route researching direction and adopts the optimal routing selection to maintain the data delivery route in mobile sink WSN. Using the immune based artificial bee colony (IABC algorithm to optimize the forwarding path, the routing maintaining protocol could find an alternative routing path quickly and efficiently when the coordinate of sink is changed in WSN. The results of our extensive experiments demonstrate that our proposed route maintaining protocol is able to balance the network traffic load and prolong the network lifetime.

  12. Fuzzy Based Energy Efficient Multiple Cluster Head Selection Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sohel Rana

    2015-03-01

    Full Text Available The Wireless Sensor Network (WSN is made up with small batteries powered sensor devices with lim-ited energy resources within it. These sensor nodes are used to monitor physical or environmental conditions and to pass their data through the wireless network to the main location. One of the crucial issues in wireless sensor network is to create a more energy efficient system. Clustering is one kind of mechanism in Wireless Sensor Networks to prolong the network lifetime and to reduce network energy consumption. In this paper, we propose a new routing protocol called Fuzzy Based Energy Effi-cient Multiple Cluster Head Selection Routing Protocol (FEMCHRP for Wireless Sensor Network. The routing process involves the Clustering of nodes and the selection of Cluster Head (CH nodes of these clusters which sends all the information to the Cluster Head Leader (CHL. After that, the cluster head leaders send aggregated data to the Base Station (BS. The selection of cluster heads and cluster head leaders is performed by using fuzzy logic and the data transmission process is performed by shortest energy path which is selected applying Dijkstra Algorithm. The simulation results of this research are compared with other protocols BCDCP, CELRP and ECHERP to evaluate the performance of the proposed routing protocol. The evaluation concludes that the proposed routing protocol is better in prolonging network lifetime and balancing energy consumption.

  13. Hybrid Weighted-based Clustering Routing Protocol for Railway Communications

    Directory of Open Access Journals (Sweden)

    Jianli Xie

    2013-12-01

    Full Text Available In the paper, a hybrid clustering routing strategy is proposed for railway emergency ad hoc network, when GSM-R base stations are destroyed or some terminals (or nodes are far from the signal coverage. In this case, the cluster-head (CH election procedure is invoked on-demand, which takes into consideration the degree difference from the ideal degree, relative clustering stability, the sum of distance between the node and it’s one-hop neighbors, consumed power, node type and node mobility. For the clustering forming, the weights for the CH election parameters are allocated rationally by rough set theory. The hybrid weighted-based clustering routing (HWBCR strategy is designed for railway emergency communication scene, which aims to get a good trade-off between the computation costs and performances. The simulation platform is constructed to evaluate the performance of our strategy in terms of the average end-to-end delay, packet loss ratio, routing overhead and average throughput. The results, by comparing with the railway communication QoS index, reveal that our strategy is suitable for transmitting dispatching voice and data between train and ground, when the train speed is less than 220km/h

  14. A Structure-Based Design Protocol for Optimizing Combinatorial Protein Libraries.

    Science.gov (United States)

    Lunt, Mark W; Snow, Christopher D

    2016-01-01

    Protein variant libraries created via site-directed mutagenesis are a powerful approach to engineer improved proteins for numerous applications such as altering enzyme substrate specificity. Conventional libraries commonly use a brute force approach: saturation mutagenesis via degenerate codons that encode all 20 natural amino acids. In contrast, this chapter describes a protocol for designing "smarter" degenerate codon libraries via direct combinatorial optimization in "library space." Several case studies illustrate how it is possible to design degenerate codon libraries that are highly enriched for favorable, low-energy sequences as assessed using a standard all-atom scoring function. There is much to gain for experimental protein engineering laboratories willing to think beyond site saturation mutagenesis. In the common case that the exact experimental screening budget is not fixed, it is particularly helpful to perform a Pareto analysis to inspect favorable libraries at a range of possible library sizes. PMID:27094288

  15. Engineering protein therapeutics: predictive performances of a structure-based virtual affinity maturation protocol.

    Science.gov (United States)

    Oberlin, Michael; Kroemer, Romano; Mikol, Vincent; Minoux, Hervé; Tastan, Erdogan; Baurin, Nicolas

    2012-08-27

    The implementation of a structure based virtual affinity maturation protocol and evaluation of its predictivity are presented. The in silico protocol is based on conformational sampling of the interface residues (using the Dead End Elimination/A* algorithm), followed by the estimation of the change of free energy of binding due to a point mutation, applying MM/PBSA calculations. Several implementations of the protocol have been evaluated for 173 mutations in 7 different protein complexes for which experimental data were available: the use of the Boltzamnn averaged predictor based on the free energy of binding (ΔΔG(*)) combined with the one based on its polar component only (ΔΔE(pol*)) led to the proposal of a subset of mutations out of which 45% would have successfully enhanced the binding. When focusing on those mutations that are less likely to be introduced by natural in vivo maturation methods (99 mutations with at least two base changes in the codon), the success rate is increased to 63%. In another evaluation, focusing on 56 alanine scanning mutations, the in silico protocol was able to detect 89% of the hot-spots. PMID:22788756

  16. nPAKE+:A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords

    Institute of Scientific and Technical Information of China (English)

    Zhi-guo Wan; Robert H. Deng; Feng Bao; Bart Preneel; Ming Gu

    2009-01-01

    Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a tree-based group PAKE protocol -- nPAKE+ protocol under the setting where each party shares an independent password with a trusted server. The nPAKE+ protocol is a novel combination of the hierarchical key tree structure and the password-based Diffie-Hellman exchange, and hence it achieves substantial gain in computation efficiency. In particular, the computation cost for each client in our protocol is only O(log n). Additionally, the hierarchical feature of nPAKE+ enables every subgroup to obtain its own subgroup key in the end. We also prove the security of our protocol under the random oracle model and the ideal cipher model.

  17. A novel approach for ID distribution problem in Tree-based tag anti-collision protocols of RFID systems

    Directory of Open Access Journals (Sweden)

    Milad HajMirzaei

    2013-08-01

    Full Text Available Tag collision is one of the most important issues in RFID systems and many tag anti-collision protocolswere proposed in literature. But some kind of these protocols like Tree-based protocols (specifically Querytree which its performance depends on tag ID length and construction, have some issues like IDdistribution. In this paper we discuss about Query tree protocol which may influenced by ID distribution.Then we propose a novel type of this protocol called Informatics Query tree to solve it. Then we evaluatethe performance of presented protocol to approve its benefits.

  18. Enriched glucose and dextrin mannitol-based media modulates fibroblast behavior on bacterial cellulose membranes

    International Nuclear Information System (INIS)

    Bacterial cellulose (BC) produced by Gluconacetobacter hansenii is a suitable biopolymer for biomedical applications. In order to modulate the properties of BC and expand its use as substrate for tissue engineering mainly in the form of biomembranes, glucose or dextrin were added into a BC fermentation mannitol-based medium (BCGl and BCDe, respectively) under static culture conditions. SEM images showed effects on fiber density and porosity on both sides of the BC membranes. Both enriched media decreased the BET surface area, water holding capacity, and rehydration rate. Fourier transform infrared (attenuated total reflectance mode) spectroscopy (FTIR-ATR) analysis revealed no change in the chemical structure of BC. L929 fibroblast cells were seeded on all BC-based membranes and evaluated in aspects of cell adhesion, proliferation and morphology. BCG1 membranes showed the highest biological performance and hold promise for the use in tissue engineering applications. - Highlights: • Glucose and dextrin were used to modify culture media for BC production. • Microarchitecture of BC was different depending on the enriching agent. • Fibroblasts adhered on the surface of BC modified microarchitectures. • Fibroblasts adhered on glucose modified BC exhibited healthy cell morphology

  19. Enriched glucose and dextrin mannitol-based media modulates fibroblast behavior on bacterial cellulose membranes

    Energy Technology Data Exchange (ETDEWEB)

    Stumpf, Taisa R.; Pértile, Renata A.N. [Integrated Technologies Laboratory, Department of Chemical and Food Engineering (Brazil); Rambo, Carlos R., E-mail: rambo@intelab.ufsc.br [Department of Electrical Engineering, Federal University of Santa Catarina, Florianópolis 88040-900 (Brazil); Porto, Luismar M. [Integrated Technologies Laboratory, Department of Chemical and Food Engineering (Brazil)

    2013-12-01

    Bacterial cellulose (BC) produced by Gluconacetobacter hansenii is a suitable biopolymer for biomedical applications. In order to modulate the properties of BC and expand its use as substrate for tissue engineering mainly in the form of biomembranes, glucose or dextrin were added into a BC fermentation mannitol-based medium (BCGl and BCDe, respectively) under static culture conditions. SEM images showed effects on fiber density and porosity on both sides of the BC membranes. Both enriched media decreased the BET surface area, water holding capacity, and rehydration rate. Fourier transform infrared (attenuated total reflectance mode) spectroscopy (FTIR-ATR) analysis revealed no change in the chemical structure of BC. L929 fibroblast cells were seeded on all BC-based membranes and evaluated in aspects of cell adhesion, proliferation and morphology. BCG1 membranes showed the highest biological performance and hold promise for the use in tissue engineering applications. - Highlights: • Glucose and dextrin were used to modify culture media for BC production. • Microarchitecture of BC was different depending on the enriching agent. • Fibroblasts adhered on the surface of BC modified microarchitectures. • Fibroblasts adhered on glucose modified BC exhibited healthy cell morphology.

  20. Alveolar corticotomy: a new surgical approach based on bone activation: principle and protocol.

    Science.gov (United States)

    Petitbois, Renaud; Scortecci, Gérard

    2012-12-01

    Alveolar corticotomy has proven effective in shortening orthodontic treatments in adults. A new non-invasive and flapless surgical approach has, however, yielded the same results. This technique, based on prior osteogenic alveoli preparation, entails neither anatomical risk nor post-op pain. The present article describes this new protocol and uses a case report to illustrate it. PMID:23164922

  1. Improving International-Level Chess Players' Performance with an Acceptance-Based Protocol: Preliminary Findings

    Science.gov (United States)

    Ruiz, Francisco J.; Luciano, Carmen

    2012-01-01

    This study compared an individual, 4-hr intervention based on acceptance and commitment therapy (ACT) versus a no-contact control condition in improving the performance of international-level chess players. Five participants received the brief ACT protocol, with each matched to another chess player with similar characteristics in the control…

  2. Synchronization of ovulation in goats using prostaglandin F2α based protocols during the breeding season

    Institute of Scientific and Technical Information of China (English)

    João Simões

    2016-01-01

    The main aim of this review was to describe the feasibility of prostaglandin F2α (PGF2α)based protocols used as a tool for ovulation synchronization in cycling goats. There is a reproductive seasonality in small ruminants. However, from latitudes 45° towards equator, the intensity of anoestrus progressively decreases and tends to disappear in local breeds. Consequently, PGF2α or their synthetic analogues as luteolytic substances can assume a great importance in reproductive management of flocks from these regions. However, a single or double (9–11 days apart)PGF2α administration provokes a good induction but a moderate synchronization of ovulations if timed artificial insemination is considered, and a significant short oestrous cycle can occur with detrimental effects on fertility rate when compared with conventional progesterone-based protocols. In order to minimize this constraint, some gonadotropin-releasing hormone-PGF2α-gonadotropin-releasing hormone (Ovsynch)-based protocols and their modifications, manipulating the dominant follicles and corpora lutea, were successfully tested in goats. Similar to cows, thesePGF2α based protocols seem to be a promising and more cost-effective tool for reproductive management in cycling goats.

  3. Synchronization of ovulation in goats using prostaglandin F2α based protocols during the breeding season

    Directory of Open Access Journals (Sweden)

    João Simões

    2016-03-01

    Full Text Available The main aim of this review was to describe the feasibility of prostaglandin F2α (PGF2α based protocols used as a tool for ovulation synchronization in cycling goats. There is a reproductive seasonality in small ruminants. However, from latitudes 45 ° towards equator, the intensity of anoestrus progressively decreases and tends to disappear in local breeds. Consequently, PGF2α or their synthetic analogues as luteolytic substances can assume a great importance in reproductive management of flocks from these regions. However, a single or double (9–11 days apart PGF2α administration provokes a good induction but a moderate synchronization of ovulations if timed artificial insemination is considered, and a significant short oestrous cycle can occur with detrimental effects on fertility rate when compared with conventional progesterone-based protocols. In order to minimize this constraint, some gonadotropinreleasing hormone-PGF2α-gonadotropin-releasing hormone (Ovsynch-based protocols and their modifications, manipulating the dominant follicles and corpora lutea, were successfully tested in goats. Similar to cows, these PGF2α based protocols seem to be a promising and more cost-effective tool for reproductive management in cycling goats.

  4. Optimizing TiO2-based phosphopeptide enrichment for automated multidimensional liquid chromatography coupled to tandem mass spectrometry

    OpenAIRE

    Cantin, Greg T.; Shock, Teresa R.; Park, Sung Kyu; Madhani, Hiten D.; Yates, John R.

    2007-01-01

    An automated online multidimensional liquid chromatography system coupled to ESI-based tandem mass spectrometry was used to assess the effectiveness of TiO2 in the enrichment of phosphopeptides from tryptic digests of protein mixtures. By monitoring the enrichment of phosphopeptides, an optimized set of loading, wash, and elution conditions were realized for TiO2. A comparison of TiO2 with other resins used for phosphopeptide enrichment, Fe(III)-IMAC and ZrO2, was also carried out using trypt...

  5. Research on Design Scheme of WLAN Communication Adapter Based on 802.11 Protocols

    Science.gov (United States)

    Xiang, Chen; Guo-hua, Zhan

    in the present mobile data transmission methods, only WLAN has the high data rate supporting video service, so it will necessarily be an important part of future personal communication networks. This paper researches into the characteristics and technologies of WLAN, analyses the properties and features of stochastic competitive MAC protocol, and designs a high-rate WLAN terminal card, which is based on IEEE802.11 protocol. The card applies Direct-Sequence Spread-Spectrum technology, can support a highest data rate at 11Mbps and meet the high-rate wireless access requirement.

  6. A Cluster-Based Random Key Revocation Protocol for Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Yi Jiang; Hao-Shan Shi

    2008-01-01

    In recent years, several random key pre distribution schemes have been proposed to bootstrap keys for encryption, but the problem of key and node revocation has received relatively little attention. In this paper, based on a random key pre-distribution scheme using clustering, we present a novel random key revocation protocol, which is suitable for large scale networks greatly and removes compromised information efficiently. The revocation protocol can guarantee network security by using less memory consumption and communication load, and combined by centralized and distributed revocation, having virtues of timeliness and veracity for revocation at the same time.

  7. Hash-area-based data dissemination protocol in wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    WANG Tian; WANG Guo-jun; GUO Min-yi; JIA Wei-jia

    2008-01-01

    HashQuery, a Hash-area-based data dissemination protocol, was designed in wireless sensor networks. Using a Hash function which uses time as the key, both mobile sinks and sensors can determine the same Hash area. The sensors can send the information about the events that they monitor to the Hash area and the mobile sinks need only to query that area instead of flooding among the whole network, and thus much energy can be saved. In addition, the location of the Hash area changes over time so as to balance the energy consumption in the whole network. Theoretical analysis shows that the proposed protocol can be energy-efficient and simulation studies further show that when there are 5 sources and 5 sinks in the network, it can save at least 50% energy compared with the existing two-tier data dissemination(TTDD) protocol, especially in large-scale wireless sensor networks.

  8. A Hop Count Based Heuristic Routing Protocol for Mobile Delay Tolerant Networks

    Directory of Open Access Journals (Sweden)

    Lei You

    2014-01-01

    Full Text Available Routing in delay tolerant networks (DTNs is a challenge since it must handle network partitioning, long delays, and dynamic topology. Meanwhile, routing protocols of the traditional mobile ad hoc networks (MANETs cannot work well due to the failure of its assumption that most network connections are available. In this paper, we propose a hop count based heuristic routing protocol by utilizing the information carried by the peripatetic packets in the network. A heuristic function is defined to help in making the routing decision. We formally define a custom operation for square matrices so as to transform the heuristic value calculation into matrix manipulation. Finally, the performance of our proposed algorithm is evaluated by the simulation results, which show the advantage of such self-adaptive routing protocol in the diverse circumstance of DTNs.

  9. Relay-based routing protocol for space networks with predictable mobility

    Science.gov (United States)

    Zhang, Zhi; Dai, Guanzhong; Li, Lixin; Zhao, Yuting

    2005-11-01

    Future space scientific missions are envisioned to incorporate a large number of satellites and spacecrafts deployed in different orbits to network together into Space Networks. These networks have some unique characteristics such as limited resource of nodes, large latency and intermittent connectivity, which pose challenges to routing. In this paper, we propose a Relay-based Routing Protocol for Space Networks (RRPSN), which exploits the predictability of nodes motion to help deliver packets. Nodes use the link state and trajectory information received from other nodes to construct the routing tables where the next hop node is selected from the current as well as the future neighbors. Three key components of the protocol, including dissemination link information, modified Dijkstra's algorithm and packet processing are described in this paper. The computation complexity and overhead of the protocol is analyzed.

  10. Correlation dimension based nonlinear analysis of network traffics with different application protocols

    Institute of Scientific and Technical Information of China (English)

    Wang Jun-Song; Yuan Jing; Li Qiang; Yuan Rui-Xi

    2011-01-01

    This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols-HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic,furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components.

  11. Gene-ontology enrichment analysis in two independent family-based samples highlights biologically plausible processes for autism spectrum disorders.

    LENUS (Irish Health Repository)

    Anney, Richard J L

    2012-02-01

    Recent genome-wide association studies (GWAS) have implicated a range of genes from discrete biological pathways in the aetiology of autism. However, despite the strong influence of genetic factors, association studies have yet to identify statistically robust, replicated major effect genes or SNPs. We apply the principle of the SNP ratio test methodology described by O\\'Dushlaine et al to over 2100 families from the Autism Genome Project (AGP). Using a two-stage design we examine association enrichment in 5955 unique gene-ontology classifications across four groupings based on two phenotypic and two ancestral classifications. Based on estimates from simulation we identify excess of association enrichment across all analyses. We observe enrichment in association for sets of genes involved in diverse biological processes, including pyruvate metabolism, transcription factor activation, cell-signalling and cell-cycle regulation. Both genes and processes that show enrichment have previously been examined in autistic disorders and offer biologically plausibility to these findings.

  12. A unified protocol for the transdiagnostic psychodynamic treatment of anxiety disorders: an evidence-based approach.

    Science.gov (United States)

    Leichsenring, Falk; Salzer, Simone

    2014-06-01

    Although there is evidence for the efficacy of psychodynamic therapy (PDT) in anxiety disorders, results are not yet satisfactory, for example, if rates of remission and response are considered. To address this problem, a unified psychodynamic protocol for anxiety disorders (UPP-ANXIETY) is proposed that integrates the treatment principles of those methods of PDT that have proven to be efficacious in anxiety disorders. In addition, this protocol is transdiagnostic, implying that it is applicable to various forms of anxiety disorders and related disorders (generalized anxiety disorder, social phobia, panic disorders, avoidant personality disorder). Based on supportive-expressive therapy, the UPP-ANXIETY represents an integrated form of psychodynamic therapy that allows for a flexible use of empirically supported treatment principles. UPP-ANXIETY encompasses the following 9 treatment principles (modules): (1) socializing the patient for psychotherapy, (2) motivating and setting treatment goals, (3) establishing a secure helping alliance, (4) identifying the core conflict underlying anxiety, (5) focusing on the warded-off wish/affect, (6) modifying underlying internalized object relations, (7) changing underlying defenses and avoidance, (8) modifying underlying response of self, and (9) termination and relapse prevention. Some principles are regarded as core components to be used in every treatment (principles 3-8). A unified protocol for the psychodynamic treatment of anxiety disorders has several advantages, that is (1) integrating the most effective treatment principles of empirically supported psychodynamic treatments for anxiety disorders can be expected to further improve the efficacy of PDT; (2) using a unified protocol in efficacy studies has the potential to enhance the evidence-based status of PDT by aggregating the evidence; (3) a unified protocol will facilitate both training in PDT and transfer of research to clinical practice; and (4) thus, a unified

  13. Efficient dielectrophoretic cell enrichment using a dielectrophoresis-well based system.

    Science.gov (United States)

    Abdul Razak, Mohd Azhar; Hoettges, Kai F; Fatoyinbo, Henry O; Labeed, Fatima H; Hughes, Michael P

    2013-01-01

    Whilst laboratory-on-chip cell separation systems using dielectrophoresis are increasingly reported in the literature, many systems are afflicted by factors which impede "real world" performance, chief among these being cell loss (in dead spaces, attached to glass and tubing surfaces, or sedimentation from flow), and designs with large channel height-to-width ratios (large channel widths, small channel heights) that make the systems difficult to interface with other microfluidic systems. In this paper, we present a scalable structure based on 3D wells with approximately unity height-to-width ratios (based on tubes with electrodes on the sides), which is capable of enriching yeast cell populations whilst ensuring that up to 94.3% of cells processed through the device can be collected in tubes beyond the output. PMID:24396544

  14. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-01-01

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio. PMID:26999162

  15. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  16. Intervention mapping protocol for developing a theory-based diabetes self-management education program.

    Science.gov (United States)

    Song, Misoon; Choi, Suyoung; Kim, Se-An; Seo, Kyoungsan; Lee, Soo Jin

    2015-01-01

    Development of behavior theory-based health promotion programs is encouraged with the paradigm shift from contents to behavior outcomes. This article describes the development process of the diabetes self-management program for older Koreans (DSME-OK) using intervention mapping (IM) protocol. The IM protocol includes needs assessment, defining goals and objectives, identifying theory and determinants, developing a matrix to form change objectives, selecting strategies and methods, structuring the program, and planning for evaluation and pilot testing. The DSME-OK adopted seven behavior objectives developed by the American Association of Diabetes Educators as behavioral outcomes. The program applied an information-motivation-behavioral skills model, and interventions were targeted to 3 determinants to change health behaviors. Specific methods were selected to achieve each objective guided by IM protocol. As the final step, program evaluation was planned including a pilot test. The DSME-OK was structured as the 3 determinants of the IMB model were intervened to achieve behavior objectives in each session. The program has 12 weekly 90-min sessions tailored for older adults. Using the IM protocol in developing a theory-based self-management program was beneficial in terms of providing a systematic guide to developing theory-based and behavior outcome-focused health education programs. PMID:26062288

  17. Design and Evaluation of a Novel HIP-Based Network Mobility Protocol

    Directory of Open Access Journals (Sweden)

    Szabolcs Nováczki

    2008-01-01

    Full Text Available The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and changes its point of attachment to the Internet. The main goal of any protocol supporting network mobility is to provide continuous, optimal and secure Internet access to all nodes and even recursively nested mobile subnetworks inside a moving network. For this purpose, the IETF (Internet Engineering Task Force has developed the NEtwork MObility Basic Support (NEMO BS protocol which extends the operation of Mobile IPv6 (MIPv6. In order to bypass the same problems suffered by MIPv6 and NEMO BS, a novel Host Identity Protocol (HIP extension called HIP-NEMO is introduced, proposed and evaluated in this paper. Our proposal is based on hierarchical topology of mobile RVSs (mRVS, signaling delegation and inter-mRVS communication to enable secure and efficient network mobility support in the HIP layer. The method provides secure connectivity and reachability for every node and nested subnet in the moving network and supports multihomed scenarios as well. Moreover, HIPNEMO reduces signaling and packet overhead during network mobility management by achieving route optimization inside any moving network even in nested scenarios. To evaluate the proposed scheme we present a simulation model implemented in OMNeT++ and discuss the results of our simulation based analysis to show the efficiency of the approach compared to the NEMO BS protocol formulated by the IETF.

  18. A Technology Based Program That Matches Enrichment Resources With Student Strengths

    Directory of Open Access Journals (Sweden)

    J.S. Renzulli

    2007-09-01

    Full Text Available Remarkable advances in instructionalcommunication technology (ICT have now made ispossible to provide high levels of enrichment and thekinds of curricular differentiation that facilitateadvanced learning services to students who have accessto a computer and the Internet. But in order tomaximize the potential if ICT it is necessary to constructprograms that are based on learning theory that goesbeyond the didactic and prescriptive models that haveresulted in too much worksheets-on-line and electronicencyclopedias. The Renzulli Learning System (RLSuses a strength-based learning theory called theEnrichment Triad Model that is purposefully designedto promote advanced level learning, creativeproductivity, and high levels of student engagement byfocusing on the application of knowledge rather than themere acquisition and storage of information.The Renzulli Learning System is acomprehensive program that begins by providing acomputer-generated profile of each student’s academicstrengths, interests, learning styles, and preferred modesof expression. A search engine then matches Internetresources to the student’s profile from fourteen carefullyscreened data bases that are categorized by subject area,grade level, state curricular standards, and degree ofcomplexity. There are also hundreds of enrichmentactivities that can be down loaded and reproduced forindividual or group learning activities. A managementsystem called the Wizard Project Maker guides studentsin the application of knowledge to teacher or studentselected assignments, independent research studies, orcreative projects that individuals or small groups wouldlike to pursue. Students and teachers can evaluate thequality of students’ products using a rubric called TheStudent Product Assessment Form. Students can rateeach site visited, conduct a self-assessment of what theyhave gained from the site, and place resources in theirown Total talent Portfolio for future use. RLS alsoincludes a

  19. A disposition strategy for highly enriched, aluminum-based fuel from research and test reactors

    International Nuclear Information System (INIS)

    The strategy proposed in this paper offers the Department of Energy an approach for disposing of aluminum-based, highly enriched uranium (HEU) spent fuels from foreign and domestic research reactors. The proposal is technically, socially, and economically sound. If implemented, it would advance US non-proliferation goals while also disposing of the spent fuel's waste by timely and proven methods using existing technologies and facilities at SRS without prolonged and controversial storage of the spent fuel. The fuel would be processed through 221-H. The radioactive fission products (waste) would be treated along with existing SRS high level waste by vitrifying it as borosilicate glass in the Defense Waste Processing Facility (DWPF) for disposal in the national geological repository. The HEU would be isotopically diluted, during processing, to low-enriched uranium (LEU) which can not be used to make weapons, thus eliminating proliferation concerns. The LEU can be sold to fabricators of either research reactor fuel or commercial power fuel. This proposed processing-LEU recycle approach has several important advantages over other alternatives, including: Lowest capital investment; lowest net total cost; quickest route to acceptable waste form and final geologic disposal; and likely lowest safety, health, and environmental impacts

  20. An Analysis of Energy Consumption on ACK plus Rate Packet in Rate Based Transport Protocol

    CERN Document Server

    Ganeshkumar, P

    2009-01-01

    Rate based transport protocol determines the rate of data transmission between the sender and receiver and then sends the data according to that rate. To notify the rate to the sender, the receiver sends ACKplusRate packet based on epoch timer expiry. In this paper, through detailed arguments and simulation it is shown that the transmission of ACKplusRate packet based on epoch timer expiry consumes more energy in network with low mobility. To overcome this problem, a new technique called Dynamic Rate Feedback (DRF) is proposed. DRF sends ACKplusRate whenever there is a change in rate of (plus or minus) 25 percent than the previous rate. Based on ns2 simulation DRF is compared with a reliable transport protocol for ad hoc network (ATP)

  1. A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks

    OpenAIRE

    Ingelrest, François; Mitton, Nathalie; Simplot-Ryl, David

    2007-01-01

    International audience We present a turnover based adaptive HELLO protocol (TAP), which enables nodes in mobile networks to dynamically adjust their HELLO messages frequency depending on the current speed of nodes. To the best of our knowledge, all existing solutions are based on specific assumptions (\\eg{} slotted networks) and/or require specific hardware (\\eg{} GPS) for speed evaluation. One of the key aspects of our solution is that no additional hardware is required since it does not ...

  2. The protocols for the 10/66 dementia research group population-based research programme

    OpenAIRE

    Salas Aquiles; de Rodriguez Juan; McKeigue Paul; Jacob KS; Krishnamoorthy ES; Huang Yueqin; Guerra Mariella; Gavrilova Svetlana I; Dewey Michael; Arizaga Raul; Albanese Emiliano; Acosta Daisy; Ferri Cleusa P; Prince Martin; Sosa Ana

    2007-01-01

    Abstract Background Latin America, China and India are experiencing unprecedentedly rapid demographic ageing with an increasing number of people with dementia. The 10/66 Dementia Research Group's title refers to the 66% of people with dementia that live in developing countries and the less than one tenth of population-based research carried out in those settings. This paper describes the protocols for the 10/66 population-based and intervention studies that aim to redress this imbalance. Meth...

  3. Key rate for calibration robust entanglement based BB84 quantum key distribution protocol

    Energy Technology Data Exchange (ETDEWEB)

    Gittsovich, O. [Institute for Quantum Computing, University of Waterloo, Waterloo, Ontario, N2L 3G1 (Canada); Moroder, T. [Naturwissenschaftlich-Technische Fakultät, Universität Siegen, Walter-Flex-Str. 3, D-57068 Siegen (Germany)

    2014-12-04

    We apply the approach of verifying entanglement, which is based on the sole knowledge of the dimension of the underlying physical system to the entanglement based version of the BB84 quantum key distribution protocol. We show that the familiar one-way key rate formula holds already if one assumes the assumption that one of the parties is measuring a qubit and no further assumptions about the measurement are needed.

  4. Key rate for calibration robust entanglement based BB84 quantum key distribution protocol

    International Nuclear Information System (INIS)

    We apply the approach of verifying entanglement, which is based on the sole knowledge of the dimension of the underlying physical system to the entanglement based version of the BB84 quantum key distribution protocol. We show that the familiar one-way key rate formula holds already if one assumes the assumption that one of the parties is measuring a qubit and no further assumptions about the measurement are needed

  5. A secure and private RFID authentication protocol based on quadratic residue

    OpenAIRE

    Kardaş, Süleyman; Kardas, Suleyman; ÇELIK, Serkan; CELIK, SERKAN; Sarıyüce, Mehmet; Sariyuce, Mehmet; Levi, Albert

    2012-01-01

    Radio Frequency IDentification based systems are getting pervasively deployed in many real-life applications in various settings for identification and authentication of remote objects. However, the messages that are transmitted over a insecure channel, are vulnerable to security and privacy concerns such as data privacy, location privacy of tag owner and etc. Recently, Yeh et al.'s proposed a RFID authentication protocol based on quadratic residue which is claimed to provide location privacy...

  6. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    . Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware

  7. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    . Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware

  8. Ground-Based Network and Supersite Observations to Complement and Enrich EOS Research

    Science.gov (United States)

    Tsay, Si-Chee; Holben, Brent N.; Welton, Ellsworth J.

    2011-01-01

    Since 1997 NASA has been successfully launching a series of satellites - the Earth Observing System (EOS) - to intensively study, and gain a better understanding of, the Earth as an integrated system. Space-borne remote sensing observations, however, are often plagued by contamination of surface signatures. Thus, ground-based in-situ and remote-sensing measurements, where signals come directly from atmospheric constituents, the sun, and/or the Earth-atmosphere interactions, provide additional information content for comparisons that confirm quantitatively the usefulness of the integrated surface, aircraft, and satellite datasets. Through numerous participations, particularly but not limited to the EOS remote-sensing/retrieval and validation projects over the years, NASA/GSFC has developed and continuously refined ground-based networks and mobile observatories that proved to be vital in providing high temporal measurements, which complement and enrich the satellite observations. These are: the AERO NET (AErosol RObotic NETwork) a federation of ground-based globally distributed network of spectral sun-sky photometers; the MPLNET (Micro-Pulse Lidar NETwork, a similarly organized network of micro-pulse lidar systems measuring aerosol and cloud vertical structure continuously; and the SMART-COMMIT (Surface-sensing Measurements for Atmospheric Radiative Transfer - Chemical, Optical & Microphysical Measurements of In-situ Troposphere, mobile observatories, a suite of spectral radiometers and in-situ probes acquiring supersite measurements. Most MPLNET sites are collocated with those of AERONET, and both networks always support the deployment of SMART-COMMIT worldwide. These data products follow the data structure of EOS conventions: Level-0, instrument archived raw data; Level-1 (or 1.5), real-time data with no (or limited) quality assurance; Level-2, not real high temporal and spectral resolutions. In this talk, we will present NASA/GSFC groundbased facilities, serving

  9. TBEE: Tier Based Energy Efficient Protocol Providing Sink and Source Mobility in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Siddhartha Chauhan

    2011-11-01

    Full Text Available In resource constrained wireless sensor networks (WSNs it is important to utilize energy efficiently. Data dissemination is mainly responsible for the consumption of energy in sensor nodes (SNs. The data dissemination protocols for WSNs should reduce the energy consumption of the SNs. Sink and source mobility is the major challenge for data dissemination protocols. In this paper, a Tier based Energy Efficient protocol (TBEE providing sink and source mobility in WSNs has been proposed. TBEE protocol has been designed so that fewer SNs located nearer to the dissemination point (DP respond to the sinks message for grid formation thereby reducing message overheads. TBEE exploits an improved approach of communication amongst the SNs so that the collisions are reduced. TBEE efficiently handles the movement of the sinks and sources in the network and reduces the overheads associated with their mobility. TBEEs performance was evaluated in different conditions and scenarios. Simulation results show substantial improvement by TBEE as compared with the other existing grid based approaches for most of the scenarios.

  10. A Rule-Based Data Transfer Protocol for On-Demand Data Exchange in Vehicular Environment

    Directory of Open Access Journals (Sweden)

    Liao Hsien-Chou

    2009-01-01

    Full Text Available The purpose of Intelligent Transport System (ITS is mainly to increase the driving safety and efficiency. Data exchange is an important way to achieve the purpose. An on-demand data exchange is especially useful to assist a driver avoiding some emergent events. In order to handle the data exchange under dynamic situations, a rule-based data transfer protocol is proposed in this paper. A set of rules is designed according to the principle of request-forward-reply (RFR. That is, they are used to determine the timing of data broadcasting, forwarding, and replying automatically. Two typical situations are used to demonstrate the operation of rules. One is the front view of a driver occluded by other vehicles. The other is the traffic jam. The proposed protocol is flexible and extensible for unforeseen situations. Three simulation tools were also implemented to demonstrate the feasibility of the protocol and measure the network transmission under high density of vehicles. The simulation results show that the rule-based protocol is efficient on data exchange to increase the driving safety.

  11. Energy Efficiency of Cluster-based Routing Protocols used in Wireless Sensor Networks

    Science.gov (United States)

    Meelu, Rajni; Anand, Rohit

    2010-11-01

    WSN faces a challenge in energy consumption. Because the sensor nodes in WSN are provided energy by compact batteries and the data transmission is frequent, the energy could be used up in a short time. Minimizing energy dissipation and maximizing network lifetime are among the central concerns when designing applications and protocols for sensor networks. Clustering has been proven to be energy-efficient in sensor networks since data routing and relaying are only operated by cluster heads. Besides, cluster heads can process, filter and aggregate data sent by cluster members, thus reducing network load and alleviating the bandwidth. In this paper, we propose a cluster-based routing algorithm viz. DCR (Distributed Cluster Routing) protocol and LEACH (Low Energy Adaptive Clustering Hierarchy) protocol. Sensor's eligibility to be elected cluster head is based on its residual energy and the distance. A simulation shows the comparison of above said algorithms in terms of time to live for nodes and data transmission. The results show that these protocols are almost similar for energy consumption but in terms of data transmission DCR performs better than LEACH.

  12. An Update based Energy-Efficient Reactive Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dhirendra Kumar Sharma

    2013-09-01

    Full Text Available Low cost energy-efficient (power based routing protocols of mobile ad hoc networks (MANETs increase the lifetime of static networks by using received signal strength (RSS and battery power status (PS. They require GPS service to find the exact location of mobile nodes. The GPS devices themselves consume power because they need excessive updates to find the stationary nodes for efficient routing. To overcome this, RSS is being used as a metric, followed by, residual battery power. The recent protocols, based on these concepts, provide energy efficient routes during the route discovery phase only. Topological changes make these routes weak in due course of time. To update routes, HELLO process can be used, which however creates unnecessary overhead, delay and consumes power. Hence, these protocols do not update the routes. We propose an energy-efficient reactive routing protocol that uses the RSS and PS of mobile nodes. Proposed Link Failure Prediction (LFP algorithm uses the link-layer feedback system to update active routes. We use ns2 for simulation of the proposed algorithm. Comparing the results of proposed scheme and existing scheme, in terms of energy consumption, link failure probability, and retransmission of packets, we observe that the proposed scheme outperforms the existing one.

  13. Clustering and OFDMA-based MAC protocol (COMAC for vehicular ad hoc networks

    Directory of Open Access Journals (Sweden)

    Abdel Hafeez Khalid

    2011-01-01

    Full Text Available Abstract The IEEE community is working on the wireless access in vehicular environments as a main technology for vehicular ad hoc networks. The medium access control (MAC protocol of this system known as IEEE 802.11p is based on the distributed coordination function (DCF of the IEEE 802.11 and enhanced DCF of the IEEE 802.11e that have low performance especially in high-density networks with nodes of high mobility. In this paper, we propose a novel MAC protocol where nodes dynamically organize themselves into clusters. Cluster heads are elected based on their stability on the road with minimal overhead since all clustering information is embedded in control channel's safety messages. The proposed MAC protocol is adaptable to drivers' behavior on the road and has learning mechanism for predicting the future speed and position of all cluster members using the fuzzy logic inference system. By using OFDMA, each cluster will use a set of subcarriers that are different from the neighboring clusters to eliminate the hidden terminal problem. Increasing the system reliability, reducing the time delay for vehicular safety applications and efficiently clustering vehicles in highly dynamic and dense networks in a distributed manner are the main contributions of our proposed MAC protocol.

  14. Securing Host-Based Mobility and Multi-Homing Protocols against On-Path Attackers

    Directory of Open Access Journals (Sweden)

    Vladimir Kolesnikov

    2011-02-01

    Full Text Available Host-based mobility and multi-homing protocols allow hosts to migrate ongoing transport sessions between networks or network interfaces. While such protocols can facilitate vertical mobility in a cost-efficient and access-agnostic manner, they are hard to secure when strong authentication between end points is not available. We present a balanced security solution which protects these protocols against redirection- and DoS attacks performed by on-path adversaries, while demanding only insignificant processing overhead on the end nodes. The solution is based on proof of session ownership using secret/answer chains as well as temporal separation and routability tests. It creates a level of protection that requires more (in some cases, significantly more effort to break than conducting corresponding attacks through existing Internet signaling protocols. We discuss how this solution can strengthen the security of Multi-path TCP. We further show how it improves the security of route-optimized Mobile IPv6 while permitting operation without home agent.

  15. Practical security analysis of two-way quantum-key-distribution protocols based on nonorthogonal states

    Science.gov (United States)

    Henao, C. Ivan; Serra, Roberto M.

    2015-11-01

    Within the broad research scenario of quantum secure communication, two-way quantum key distribution (TWQKD) is a relatively new proposal for sharing secret keys that is not yet fully explored. We analyze the security of TWQKD schemes that use qubits prepared in nonorthogonal states to transmit the key. Investigating protocols that employ an arbitrary number of bases for the channel preparation, we show, in particular, that the security of the LM05 protocol cannot be improved by the use of more than two preparation bases. We also provide an alternative proof of unconditional security for a deterministic TWQKD protocol recently proposed in Beaudry et al., Phys. Rev. A 88, 062302 (2013), 10.1103/PhysRevA.88.062302. In addition, we introduce a deterministic protocol named "TWQKD six-state" and compute an analytical lower bound (which can be tightened) for the maximum amount of information that an eavesdropper could extract in this case. An interesting advantage of our approach to the security analysis of TWQKD is the great simplicity and transparency of the derivations.

  16. SNP-based pathway enrichment analysis for genome-wide association studies

    Directory of Open Access Journals (Sweden)

    Potkin Steven G

    2011-04-01

    Full Text Available Abstract Background Recently we have witnessed a surge of interest in using genome-wide association studies (GWAS to discover the genetic basis of complex diseases. Many genetic variations, mostly in the form of single nucleotide polymorphisms (SNPs, have been identified in a wide spectrum of diseases, including diabetes, cancer, and psychiatric diseases. A common theme arising from these studies is that the genetic variations discovered by GWAS can only explain a small fraction of the genetic risks associated with the complex diseases. New strategies and statistical approaches are needed to address this lack of explanation. One such approach is the pathway analysis, which considers the genetic variations underlying a biological pathway, rather than separately as in the traditional GWAS studies. A critical challenge in the pathway analysis is how to combine evidences of association over multiple SNPs within a gene and multiple genes within a pathway. Most current methods choose the most significant SNP from each gene as a representative, ignoring the joint action of multiple SNPs within a gene. This approach leads to preferential identification of genes with a greater number of SNPs. Results We describe a SNP-based pathway enrichment method for GWAS studies. The method consists of the following two main steps: 1 for a given pathway, using an adaptive truncated product statistic to identify all representative (potentially more than one SNPs of each gene, calculating the average number of representative SNPs for the genes, then re-selecting the representative SNPs of genes in the pathway based on this number; and 2 ranking all selected SNPs by the significance of their statistical association with a trait of interest, and testing if the set of SNPs from a particular pathway is significantly enriched with high ranks using a weighted Kolmogorov-Smirnov test. We applied our method to two large genetically distinct GWAS data sets of schizophrenia, one

  17. Compressed Sensing based Protocol for Efficient Reconstruction of Sparse Superimposed Data in a Multi-Hop Wireless Sensor Network

    OpenAIRE

    Kaneko, Megumi; Agha, Khaldoun Al

    2012-01-01

    We consider a multi-hop wireless sensor network that measures sparse events and propose a simple forwarding protocol based on Compressed Sensing (CS) which does not need any sophisticated Media Access Control (MAC) scheduling, neither a routing protocol, thereby making significant overhead and energy savings. By means of flooding, multiple packets with different superimposed measurements are received simultaneously at any node. Thanks to our protocol, each node is able to recover each measure...

  18. RLT Code Based Handshake-Free Reliable MAC Protocol for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiujuan Du

    2016-01-01

    Full Text Available The characteristics of underwater acoustic channels such as long propagation delay and low bit rate cause the medium access control (MAC protocols designed for radio channels to either be inapplicable or have low efficiency for underwater sensor networks (UWSNs. Meanwhile, due to high bit error, conventional end-to-end reliable transfer solutions bring about too many retransmissions and are inefficient in UWSN. In this paper, we present a recursive LT (RLT code. With small degree distribution and recursive encoding, RLT achieves reliable transmission hop-by-hop while reducing the complexity of encoding and decoding in UWSN. We further propose an RLT code based handshake-free (RCHF reliable MAC protocol. In RCHF protocol, each node maintains a neighbor table including the field of state, and packages are forwarded according to the state of a receiver, which can avoid collisions of sending-receiving and overhearing. The transmission-avoidance time in RCHF decreases data-ACK collision dramatically. Without RTS/CTS handshaking, the RCHF protocol improves channel utilization while achieving reliable transmission. Simulation results show that, compared with the existing reliable data transport approaches for underwater networks, RCHF can improve network throughput while decreasing end-to-end overhead.

  19. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  20. A Handoff-based And Limited Flooding (HALF Routing Protocol in Delay Tolerant Network (DTN

    Directory of Open Access Journals (Sweden)

    Anika Aziz

    2012-05-01

    Full Text Available In a Delay Tolerant Network (DTN, routing protocols are developed to manage the disconnected mobilenodes. We propose a routing protocol named HALF (Handoff-based And Limited Flooding in DTN thatcan work in both infra-structured and infra-structure less networking environment and hence it canimprove the performance of the network significantly. In this paper, it is shown that HALF givessatisfactory delivery ratio and latency under almost all conditions and different network scenarios whencompared to the other existing DTN routing protocols. As the traffic intensity of the network grows fromlow (.2 to high (.75 values, HALF shows about 5% decrease in the delivery ratio compare to muchlarger values showed by the other routing protocols and on the average takes same time to deliver all themessages to their destinations. As the radio range is increased over the range from 10m Bluetooth rangeto 250m WLAN range, due to the increased connectivity, the delivery ratio and the latency are increasedby 4 times and decreased by 5 times respectively.

  1. A Wireless Video Transmission Scheme Based on MAC-independent Opportunistic Routing &Encoding Protocol

    Directory of Open Access Journals (Sweden)

    Yong Liu

    2010-11-01

    Full Text Available It is a tremendous challenge to transmit real-time video streams over wireless sensor network because of the poor wireless communication conditions and the high requirements of video transmission. The opportunistic routing protocol can take advantage of the broadcast nature of wireless communication and can improve transfer throughput significantly. But the bigger size of transmission unit also increases the end-to-end delay at the same time. In order to overcome this problem and improve the real-time video transmission quality in wireless video sensor network, we propose a source adaptive frame discard algorithm for MAC-independent Opportunistic Routing & Encoding (MORE Protocol in this paper. In our approach, the historical transmission delay is recorded to estimate current network transmission rate. Based on the video deadline, frames predicted to be delayed are discarded adaptively in the source node to get better overall video quality. In some practice application scenarios, there are usually need to deliver multiple video streams over multi-hop wireless network. It can’t work effectively with the originally MORE protocol in such scenarios. Furthermore, we modify the MORE protocol and design an adaptive scheme to support multiple video streams over multi-hop wireless video sensor network in this paper. The simulation results show that our algorithm can reduce frame loss rate and improve video quality significantly.

  2. PERFORMANCE EVALUATION OF MANET ROUTING PROTOCOLS GRP, DSR AND AODV BASED ON PACKET SIZE

    Directory of Open Access Journals (Sweden)

    AMAR NATH MURAW

    2012-06-01

    Full Text Available Mobile Ad hoc Networks has become an essential part of interest of researchers in last couple of years. A Mobile Ad-Hoc Network is a collection of independent wireless mobile nodes having no any centralized accesspoint, infrastructure and any centralized administration. In order to communicate with other nodes inside thenetwork, a routing protocol is used to find out best possible routes among nodes. The most important goal of adhoc network routing protocol is to discover, validate and establish route between a couples of nodes, for appropriate, fast and reliable message delivery. In this research work authors have analyzed the performance of three most popular MANET routing protocols GRP, DSR and AODV under different parameters like throughput, Network delay and network load. Authors have performed entire analysis to study the behaviour ofthese protocols under different test measures based on packet size as a key parameter. Authors have also given their test results by using OPNET as a testing tool and demonstrated all the simulations in this work.

  3. IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality

    Directory of Open Access Journals (Sweden)

    Gongliang Liu

    2014-01-01

    Full Text Available In order to overcome the shortcomings of existing medium access control (MAC protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput.

  4. Phosphopeptide enrichment: Development of magnetic solid phase extraction method based on polydopamine coating and Ti(4+)-IMAC.

    Science.gov (United States)

    Piovesana, Susy; Capriotti, Anna Laura; Cavaliere, Chiara; Ferraris, Francesca; Samperi, Roberto; Ventura, Salvatore; Laganà, Aldo

    2016-02-25

    Protein post translational modifications currently represent one of the main challenges with proteomic analysis, due to the important biological role they play within cells. Protein phosphorylation is one of the most important, with several approaches developed for phosphopeptides enrichment and analysis, essential for comprehensive phosphoproteomic analysis. However, the development of new materials for phosphopeptides enrichment may overcome previous drawbacks and improve enrichment of such peptides. In this regard, new magnetic stationary phases based on polydopamine coating and Ti(4+) immobilization exploit the potential of IMAC enrichment and couple it with the versatility of magnetic solid phase extraction. In this work the use of such stationary phase was extended from the MALDI proof of concept stage with the development of an optimized method for phosphopeptides enrichment compatible with typical shotgun proteomics experimental workflows. Different loading and elution buffers were tested to improve phosphopeptides recovery and enrichment selectivity. Finally, the analysis of isolated peptides pointed out that polydopamine alone is an ideal support matrix for polar post translational modifications because it enables to reduce unspecific binding and preferentially binds hydrophilic peptides. PMID:26851086

  5. A local energy consumption prediction-based clustering protocol for wireless sensor networks.

    Science.gov (United States)

    Yu, Jiguo; Feng, Li; Jia, Lili; Gu, Xin; Yu, Dongxiao

    2014-01-01

    Clustering is a fundamental and effective technique for utilizing sensor nodes' energy and extending the network lifetime for wireless sensor networks. In this paper, we propose a novel clustering protocol, LECP-CP (local energy consumption prediction-based clustering protocol), the core of which includes a novel cluster head election algorithm and an inter-cluster communication routing tree construction algorithm, both based on the predicted local energy consumption ratio of nodes. We also provide a more accurate and realistic cluster radius to minimize the energy consumption of the entire network. The global energy consumption can be optimized by the optimization of the local energy consumption, and the energy consumption among nodes can be balanced well. Simulation results validate our theoretical analysis and show that LECP-CP has high efficiency of energy utilization, good scalability and significant improvement in the network lifetime. PMID:25479330

  6. A Local Energy Consumption Prediction-Based Clustering Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jiguo Yu

    2014-12-01

    Full Text Available Clustering is a fundamental and effective technique for utilizing sensor nodes’ energy and extending the network lifetime for wireless sensor networks. In this paper, we propose a novel clustering protocol, LECP-CP (local energy consumption prediction-based clustering protocol, the core of which includes a novel cluster head election algorithm and an inter-cluster communication routing tree construction algorithm, both based on the predicted local energy consumption ratio of nodes. We also provide a more accurate and realistic cluster radius to minimize the energy consumption of the entire network. The global energy consumption can be optimized by the optimization of the local energy consumption, and the energy consumption among nodes can be balanced well. Simulation results validate our theoretical analysis and show that LECP-CP has high efficiency of energy utilization, good scalability and significant improvement in the network lifetime.

  7. Industrial WSN Based on IR-UWB and a Low-Latency MAC Protocol

    Science.gov (United States)

    Reinhold, Rafael; Underberg, Lisa; Wulf, Armin; Kays, Ruediger

    2016-07-01

    Wireless sensor networks for industrial communication require high reliability and low latency. As current wireless sensor networks do not entirely meet these requirements, novel system approaches need to be developed. Since ultra wideband communication systems seem to be a promising approach, this paper evaluates the performance of the IEEE 802.15.4 impulse-radio ultra-wideband physical layer and the IEEE 802.15.4 Low Latency Deterministic Network (LLDN) MAC for industrial applications. Novel approaches and system adaptions are proposed to meet the application requirements. In this regard, a synchronization approach based on circular average magnitude difference functions (CAMDF) and on a clean template (CT) is presented for the correlation receiver. An adapted MAC protocol titled aggregated low latency (ALL) MAC is proposed to significantly reduce the resulting latency. Based on the system proposals, a hardware prototype has been developed, which proves the feasibility of the system and visualizes the real-time performance of the MAC protocol.

  8. A Game Theory-Based Obstacle Avoidance Routing Protocol for Wireless Sensor Networks

    OpenAIRE

    Shujun Bi; Huayang Wu; Xin Guan

    2011-01-01

    The obstacle avoidance problem in geographic forwarding is an important issue for location-based routing in wireless sensor networks. The presence of an obstacle leads to several geographic routing problems such as excessive energy consumption and data congestion. Obstacles are hard to avoid in realistic environments. To bypass obstacles, most routing protocols tend to forward packets along the obstacle boundaries. This leads to a situation where the nodes at the boundaries exhaust their ener...

  9. Dental care protocol based on visual supports for children with autism spectrum disorders

    OpenAIRE

    Cagetti, Maria Grazia; Mastroberardino, Stefano; Campus, Guglielmo; Olivari, Benedetta; Faggioli, Raffaella; Lenti, Carlo; Strohmenger, Laura

    2015-01-01

    Background Subjects with Autism Spectrum Disorders (ASDs) have often difficulties to accept dental treatments. The aim of this study is to propose a dental care protocol based on visual supports to facilitate children with ASDs to undergo to oral examination and treatments. Material and Methods 83 children (age range 6-12 years) with a signed consent form were enrolled; intellectual level, verbal fluency and cooperation grade were evaluated. Children were introduced into a four stages path in...

  10. A novel protocol for assessing aquatic pollution, based on the feeding inhibition of Daphnia magna

    OpenAIRE

    Kovács A.; Abdel-Hameid N.-A.; Ács A.; Á. Ferincz; Kováts N.

    2012-01-01

    In this study, sensitivity of a novel acute bioassay based on the feeding activity of Daphnia magna was assessed, using 2 and 4 h of exposure. For calibration purposes, results were compared with those of the standard immobility test as described by the ISO 6341:1996 standard. Using potassium dichromate as the reference chemical, after 4 h of exposure the proposed protocol showed similar sensitivity in comparison with the stan...

  11. Quantum and classical coin-flipping protocols based on bit-commitment and their point games

    OpenAIRE

    Nayak, Ashwin; Sikora, Jamie; Tunçel, Levent

    2015-01-01

    We focus on a family of quantum coin-flipping protocols based on bit-commitment. We discuss how the semidefinite programming formulations of cheating strategies can be reduced to optimizing a linear combination of fidelity functions over a polytope. These turn out to be much simpler semidefinite programs which can be modelled using second-order cone programming problems. We then use these simplifications to construct their point games as developed by Kitaev. We also study the classical versio...

  12. Social-aware Opportunistic Routing Protocol based on User's Interactions and Interests

    OpenAIRE

    Moreira, Waldir; Mendes, Paulo; Sargento, Susana

    2014-01-01

    Nowadays, routing proposals must deal with a panoply of heterogeneous devices, intermittent connectivity, and the users' constant need for communication, even in rather challenging networking scenarios. Thus, we propose a Social-aware Content-based Opportunistic Routing Protocol, SCORP, that considers the users' social interaction and their interests to improve data delivery in urban, dense scenarios. Through simulations, using synthetic mobility and human traces scenarios, we compare the per...

  13. Protocol-based metabolic evaluation in high-risk patients with renal stones in North India

    Directory of Open Access Journals (Sweden)

    Sandeep Julka

    2012-01-01

    Full Text Available Context: Renal calculus disease has a lifetime recurrence rate of 80%. Protocol-based metabolic evaluation in high-risk subjects for recurrent renal stones reveals abnormalities in a large subset of subjects. However, such information is not available in Indian subjects. Aims: To evaluate the abnormalities by a protocol-based metabolic evaluation in patients at a high risk for recurrent renal stones. Settings and Design: Prospective, academic tertiary care center. Materials and Methods: Fifty North Indian patients (38 males and 12 females; mean age 38 ± 10.2 years with recurrent or bilateral renal stones were evaluated. All subjects underwent a protocol-based evaluation involving estimation of serum total calcium, phosphorus, creatinine, albumin, iPTH, 25(OHD 3 , 1,25(OH 2 D 3 , and a calcium load test. Estimation of daily urinary excretion of volume, oxalate, calcium, uric acid, and citrate, and urinary acidification studies were performed. Statistical Analysis Used: Descriptive statistics and t-test. Results: An underlying disorder was detected in 48 (96% patients. Almost half had two or more metabolic abnormalities. The metabolic abnormalities detected were: Hypercalciuria 26 (52% patients, renal hypercalciuria 16 (32%, absorptive hypercalciuria 6 (12%, unclassified hypercalciuria 4 (8%, hyperoxaluria 27 (54%, hyperuricosuria 9 (18%, distal renal tubular acidosis 4 (8%; 2 complete and 2 partial, primary hyperparathyroidism 3 (6%, and hypocitraturia 14 (n=18, 77%. In two patients, the etiology could not be detected. Conclusions: Protocol-based metabolic evaluation reveals metabolic abnormalities in majority of patients with nephrolithiasis. The spectrums of metabolic abnormalities are different in Indian subjects as compared to the western population.

  14. Driving Path Predication Based Routing Protocol in Vehicular Ad hoc Networks

    OpenAIRE

    Yong Feng; Feng Wang; Jingjing Liao; Qian Qian

    2013-01-01

    The vehicular mobility is reflection and extension of the human social activity. Since human trajectories show a high degree of temporal and spatial regularity, thus vehicular driving paths are predictable to a large extent. In this paper, we firstly analyze the predictabilities of different types of vehicles and then propose a new driving path predication based routing protocol (DPPR). With hello messages to broadcast vehicles’ driving path predication information to neighbor vehicles, DPPR ...

  15. Coexistence of WiFi and WiMAX Systems Based on PS-Request Protocols

    OpenAIRE

    Ho Young Hwang; Young-uk Chung; Yong-Hoon Choi; Jongwoo Kim; Suwon Park; Seung Hyong Rhee

    2011-01-01

    We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within t...

  16. 一种基于PKI的密钥%An Internet Key Exchange Protocol Based on Public Key Infrastructure

    Institute of Scientific and Technical Information of China (English)

    朱建明; 马建峰

    2004-01-01

    Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs).Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services.In this paper, we concentrate on the properties of the protocol of Phase 1 IKE.After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI.Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol.The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.

  17. BIM-based Modeling and Data Enrichment of Classical Architectural Buildings

    Directory of Open Access Journals (Sweden)

    Fabrizio Ivan Apollonio

    2012-12-01

    Full Text Available EnIn this paper we presented a BIM-based approach for the documentation of Architectural Heritage. Knowledge of classical architecture is first extracted from the treatises for parametric modeling in object level. Then we established a profile library based on semantic studies to sweep out different objects. Variants grow out from the parametric models by editing or regrouping parameters based on grammars. Multiple data including material, structure and real-life state are enriched with respect to different research motivations. The BIM models are expected to ease the modeling process and provide comprehensive data shared among different platforms for further simulations.ItIn questo articolo è presentata una procedura definita nell'ambito dei sistemi BIM con l'obiettivo di documentare il Patrimonio Architettonico. I dati conoscitivi relativi all'architettura classica sono, in una prima fase, ottenuti dai trattati al fine di modellare in maniera parametrica a livello di oggetti. Successivamente è stata definita una libreria di profili, basata su principi semantici, dalla quale è possibile ottenere oggetti differenti. Dati di natura differente, relativi ad esempio ai materiali, alle strutture, allo stato di fatto, sono implementati in funzione delle differenti esigenze. I modelli BIM hanno la potenzialità di facilitare le procedure di modellazione e di fornire informazioni e dati completi che possono essere condivisi tra piattaforme differenti per ulteriori simulazioni ed analisi.

  18. Uranium enrichment

    International Nuclear Information System (INIS)

    This paper reports that in 1990 the Department of Energy began a two-year project to illustrate the technical and economic feasibility of a new uranium enrichment technology-the atomic vapor laser isotope separation (AVLIS) process. GAO believes that completing the AVLIS demonstration project will provide valuable information about the technical viability and cost of building an AVLIS plant and will keep future plant construction options open. However, Congress should be aware that DOE still needs to adequately demonstrate AVLIS with full-scale equipment and develop convincing cost projects. Program activities, such as the plant-licensing process, that must be completed before a plant is built, could take many years. Further, an updated and expanded uranium enrichment analysis will be needed before any decision is made about building an AVLIS plant. GAO, which has long supported legislation that would restructure DOE's uranium enrichment program as a government corporation, encourages DOE's goal of transferring AVLIS to the corporation. This could reduce the government's financial risk and help ensure that the decision to build an AVLIS plant is based on commercial concerns. DOE, however, has no alternative plans should the government corporation not be formed. Further, by curtailing a planned public access program, which would have given private firms an opportunity to learn about the technology during the demonstration project, DOE may limit its ability to transfer AVLIS to the private sector

  19. Uranium enrichment

    International Nuclear Information System (INIS)

    This chapter discusses the development of uranium enrichment processes. In the introduction there is a brief history of uranium enrichment, followed by a summary of the criteria used for the assessment of an isotope separation process, e.g. the separation factor, separative power, and the power consumption of a separating element. This is followed by a discussion of the two main processes used, i.e. gaseous diffusion and centrifugation. The reason for the change from diffusion to centrifugation in the UK, mainly on power costs, is discussed. The development potential of centrifuges is also assessed. Other processes which have been developed up to pilot stage are described, e.g. the Becker jet nozzle and the South African process. This is followed by a description of some plasma-based methods. The next topic is concerned with chemical exchange methods and an attempt is made to assess their potential in the enrichment scene from published information. This chapter concludes with a discussion of the advanced laser isotope-separation methods. The two approaches, i.e. the atomic and the molecular routes are discussed again using published information. This information is insufficient to give a complete assessment of the methods, especially the molecular route, but is enough to give indications of their potential

  20. Gene-based analysis of regionally enriched cortical genes in GWAS data sets of cognitive traits and psychiatric disorders.

    Directory of Open Access Journals (Sweden)

    Kari M Ersland

    Full Text Available BACKGROUND: Despite its estimated high heritability, the genetic architecture leading to differences in cognitive performance remains poorly understood. Different cortical regions play important roles in normal cognitive functioning and impairment. Recently, we reported on sets of regionally enriched genes in three different cortical areas (frontomedial, temporal and occipital cortices of the adult rat brain. It has been suggested that genes preferentially, or specifically, expressed in one region or organ reflect functional specialisation. Employing a gene-based approach to the analysis, we used the regionally enriched cortical genes to mine a genome-wide association study (GWAS of the Norwegian Cognitive NeuroGenetics (NCNG sample of healthy adults for association to nine psychometric tests measures. In addition, we explored GWAS data sets for the serious psychiatric disorders schizophrenia (SCZ (n = 3 samples and bipolar affective disorder (BP (n = 3 samples, to which cognitive impairment is linked. PRINCIPAL FINDINGS: At the single gene level, the temporal cortex enriched gene RAR-related orphan receptor B (RORB showed the strongest overall association, namely to a test of verbal intelligence (Vocabulary, P = 7.7E-04. We also applied gene set enrichment analysis (GSEA to test the candidate genes, as gene sets, for enrichment of association signal in the NCNG GWAS and in GWASs of BP and of SCZ. We found that genes differentially expressed in the temporal cortex showed a significant enrichment of association signal in a test measure of non-verbal intelligence (Reasoning in the NCNG sample. CONCLUSION: Our gene-based approach suggests that RORB could be involved in verbal intelligence differences, while the genes enriched in the temporal cortex might be important to intellectual functions as measured by a test of reasoning in the healthy population. These findings warrant further replication in independent samples on cognitive traits.

  1. A Simple Battery Aware Gossip Based Sleep Protocol for Densely Deployed Ad-hoc and Sensor Networks

    CERN Document Server

    Shukla, Ashish

    2010-01-01

    Conserving power in mobile ad-hoc and sensor networks is a big challenge. Most of the nodes in these networks, in general, are battery powered, therefore, an efficient power saving protocol is required to extend the lifetime of such networks. A lot of work has been done and several protocols have been proposed to address this problem. Gossip based protocols, which are based on the results of percolation theory, significantly reduce power consumption with very little implementation overhead. However, not much work has been done to make gossiping battery aware. In this paper we introduce a simple gossip based battery aware sleep protocol. The protocol allows low battery nodes to sleep more, therefore, improves overall network lifetime.

  2. Optimal hop position-based minimum energy routing protocol for underwater acoustic sensor networks

    Directory of Open Access Journals (Sweden)

    K.S. Geethu

    2015-05-01

    Full Text Available Development of energy-efficient routing protocols is a major concern in the design of underwater acoustic sensor networks (UASNs since UASN nodes are typically powered by batteries, which are difficult to replace or recharge in aquatic environments. This study proposes an optimal hop position-based energy-efficient routing protocol for UASNs. Initially, the authors present an analytical model to compute the total energy consumption in a multi-hop UASN for deep water scenario, taking into account dependence of usable bandwidth on transmission distance and propagation characteristics of underwater acoustic channel. They derive analytical solution for the optimal hop distance that minimises total energy consumption in the network. They then propose an energy-efficient routing protocol that relies on the computation of optimal hop distance. In their routing scheme, selection of forwarding nodes are based on their depth, residual energy and closeness to the computed optimal hop position corresponding to source node. Simulation results show that total energy consumption of the network gets reduced drastically, leading to improvement in network lifetime. Moreover, the proposed routing scheme makes use of courier nodes to handle coverage-hole problem. The efficient movement of courier nodes improves packet delivery ratio and network throughput.

  3. A web product data management system based on Simple Object Access Protocol

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which includes three tiers: the user services tier, the business services tier, and the data services tier. The client service component uses the serverside technology, and Extensible Markup Language (XML) web service which uses SOAP as the communication protocol is chosen as the business service component. To illustrate how to build a web-based PDM system using the proposed architecture,a case PDM system which included three logical tires was built. To use the security and central management features of the database, a stored procedure was recommended in the data services tier. The business object was implemented as an XML web service so that client could use standard internet protocols to communicate with the business object from any platform. In order to satisfy users using all sorts of browser, the server-side technology and Microsoft ASP.NET was used to create the dynamic user interface.

  4. Optimal Relay Selection using Efficient Beaconless Geographic Contention-Based Routing Protocol in Wireless Adhoc Networks

    Directory of Open Access Journals (Sweden)

    G. Srimathy

    2012-04-01

    Full Text Available In Wireless Ad hoc network, cooperation of nodes can be achieved by more interactions at higher protocol layers, particularly the MAC (Medium Access Control and network layers play vital role. MAC facilitates a routing protocol based on position location of nodes at network layer specially known as Beacon-less geographic routing (BLGR using Contention-based selection process. This paper proposes two levels of cross-layer framework -a MAC network cross-layer design for forwarder selection (or routing and a MAC-PHY for relay selection. CoopGeo; the proposed cross-layer protocol provides an efficient, distributed approach to select next hops and optimal relays to form a communication path. Wireless networks suffers huge number of communication at the same time leads to increase in collision and energy consumption; hence focused on new Contention access method that uses a dynamical change of channel access probability which can reduce the number of contention times and collisions. Simulation result demonstrates the best Relay selection and the comparative of direct mode with the cooperative networks. And Performance evaluation of contention probability with Collision avoidance.

  5. Licklider Transmission Protocol (LTP)-base DTN for cislunar communications in presence of long link disruption

    Science.gov (United States)

    Gullapalli, Vasdev

    The National Aeronautics and Space Administration (NASA) are consigned to the safe, sustained, affordable human and robotic exploration of the Moon, Mars, and beyond. The goal is to create sustainable human settlements on the Moon and Mars with the motivation to preserve the human race. So, NASA has been trying different protocols to advance cis-lunar communication such as Delay Tolerant Networking (DTN), and the latest one: Interplanetary Overlay Network (ION). ION is an implementation of DTN. ION was designed mainly to reduce the cost and risk in space communication. ION implements the TCPCL, LTPCL, and UDPCL to work with high channel Bit Error Rate (BER), long link breaks, and long link delays. In this thesis, we present a performance evaluation of Licklider Transmission Protocol (LTP)-based DTN for cis-lunar communications in presence of long link disruption. Based on experimental evaluation and statistical analysis, we conclude that good-put performance variation is very less for different bit error rates at the particular link break, and also LTP is capable for reliable communication even in the link break for 16 hours to the maximum. Finally, the protocol is the best for higher BER's and long link break.

  6. Research of RFID Certification Security Protocol based on Hash Function and DES Algorithm

    Directory of Open Access Journals (Sweden)

    bin Xu

    2013-10-01

    Full Text Available RFID has been more and more attention and application by people, but the existence of security and privacy problems worthy of attention is concern. The certification process analysis of several typical security protocols is based on existing RFID authentication protocol. It proposed an improved bidirectional authentication algorithm. The use of one-way HASH function can solve the security problem of RFID. The protocol has anti-replay, impedance analysis, forgery, and tracking performance, and is suitable for the distributed system. With the development of computer and Internet is widely used in various industries, interaction of high-speed information transfer process. The problem of information security is concern. The paper produce and use all kinds of algorithms based on hash function firstly. Then as information on a solid safety lock, MD5, SHA-1 file verification, encryption, digital signature, PKI building has security full of all kinds of information. Finally, it can effectively prevent the attack, ensuring the authenticity of the information not to be modified or leaks

  7. Priority Based Congestion Control Dynamic Clustering Protocol in Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Jayakumari, R Beulah; Senthilkumar, V Jawahar

    2015-01-01

    Wireless sensor network is widely used to monitor natural phenomena because natural disaster has globally increased which causes significant loss of life, economic setback, and social development. Saving energy in a wireless sensor network (WSN) is a critical factor to be considered. The sensor nodes are deployed to sense, compute, and communicate alerts in a WSN which are used to prevent natural hazards. Generally communication consumes more energy than sensing and computing; hence cluster based protocol is preferred. Even with clustering, multiclass traffic creates congested hotspots in the cluster, thereby causing packet loss and delay. In order to conserve energy and to avoid congestion during multiclass traffic a novel Priority Based Congestion Control Dynamic Clustering (PCCDC) protocol is developed. PCCDC is designed with mobile nodes which are organized dynamically into clusters to provide complete coverage and connectivity. PCCDC computes congestion at intra- and intercluster level using linear and binary feedback method. Each mobile node within the cluster has an appropriate queue model for scheduling prioritized packet during congestion without drop or delay. Simulation results have proven that packet drop, control overhead, and end-to-end delay are much lower in PCCDC which in turn significantly increases packet delivery ratio, network lifetime, and residual energy when compared with PASCC protocol. PMID:26504898

  8. A BROADCAST BASED ROUTING PROTOCOL FOR INTER-CLUSTER DATA DISSEMINATION IN VEHICULAR COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Auxeeliya Jesudoss

    2014-01-01

    Full Text Available Vehicular communication is one of the fast growing and promising technologies for a safe and comfortable driving environment. These technologies do not end up with economic and safety ramifications, but also extended with other informational and entertainment oriented services. Data are being propagated multi-hop between source and destination vehicles for many real-life applications. Clustering is one of the effective and scalable solutions for data dissemination in wireless ad hoc networks. Though many cluster-based methods have been proposed for multi-hop data delivery in vehicular ad hoc networks, most of them do not consider the real-time changes in the network topology or imposes large penalties in routing such as unstable clusters, broken links, updating route tables. In order to address these issues, we propose a broadcast based routing protocol for inter-cluster data dissemination in this study that works on real-time vehicle information. Unlike, most existing routing algorithms, it only uses hello messages to obtain routing information without many other control messages. In addition, it alleviates the storage of routing information in every node, which largely reduces the overheads in routing. We performed extensive simulation to demonstrate the effectiveness and efficiency of the proposed routing protocol. Results show that the proposed protocol outperforms other approaches in terms of average delay, average delivery ratio and average number of hops.

  9. Cryptanalysis on Identity-based Authenticated Key Agreement Protocols from Pairings

    Directory of Open Access Journals (Sweden)

    Mengbo Hou

    2010-07-01

    Full Text Available Two-party authenticated key agreement protocol is used to authenticate entities and establish session keys in an open network in order to provide secure communications between two parties. Several security attributes are highly desired for such protocols, such as perfect forward secrecy (the corruption of long-term keys of all the entities should not compromise any session key, PKG forward secrecy (the corruption of the PKG's master key in the ID-based system should not compromise the established session keys, and known session-key specific temporary information secrecy (The exposure of private temporary information should not compromise the secrecy of generated session keys. In 2005, Choie et al. proposed three identity-based authenticated key agreement protocols from pairings. Our analysis shows that they all didn't provide protection against known session-key specific temporary information attack and some of them are vulnerable against man-in-the-middle attack, such as the key replicating attack. We analyze some of the attacks under the BR93 security model.

  10. Aptamer based peptide enrichment for quantitative analysis of gonadotropin-releasing hormone by LC-MS/MS.

    Science.gov (United States)

    Richards, S L; Cawley, A T; Cavicchioli, R; Suann, C J; Pickford, R; Raftery, M J

    2016-04-01

    Over recent years threats to racing have expanded to include naturally occurring biological molecules, such as peptides and proteins, and their synthetic analogues. Traditionally, antibodies have been used to enable detection of these compounds as they allow purification and concentration of the analyte of interest. The rapid expansion of peptide-based therapeutics necessitates a similarly rapid development of suitable antibodies or other means of enrichment. Potential alternative enrichment strategies include the use of aptamers, which offer the significant advantage of chemical synthesis once the nucleic acid sequence is known. A method was developed for the enrichment, detection and quantitation of gonadotropin-releasing hormone (GnRH) in equine urine using aptamer-based enrichment and LC-MS/MS. The method achieved comparable limits of detection (1 pg/mL) and quantification (2.5 pg/mL) to previously published antibody-based enrichment methods. The intra- and inter-assay precision achieved was less than 10% at both 5 and 20 pg/mL, and displayed a working dynamic range of 2.5-100 pg/mL. Significant matrix enhancement (170 ± 8%) and low analytical recovery (29 ± 15%) was observed, although the use of an isotopically heavy labelled GnRH peptide, GnRH (Pro(13)C5,(15)N), as the internal standard provides compensation for these parameters. Within the current limits of detection GnRH was detectable up to 1h post administration in urine and identification of a urinary catabolite extended this detection window to 4h. Based on the results of this preliminary investigation we propose the use of aptamers as a viable alternative to antibodies in the enrichment of peptide targets from equine urine. PMID:26838458

  11. A Network Coding Based Hybrid ARQ Protocol for Underwater Acoustic Sensor Networks.

    Science.gov (United States)

    Wang, Hao; Wang, Shilian; Zhang, Eryang; Zou, Jianbin

    2016-01-01

    Underwater Acoustic Sensor Networks (UASNs) have attracted increasing interest in recent years due to their extensive commercial and military applications. However, the harsh underwater channel causes many challenges for the design of reliable underwater data transport protocol. In this paper, we propose an energy efficient data transport protocol based on network coding and hybrid automatic repeat request (NCHARQ) to ensure reliability, efficiency and availability in UASNs. Moreover, an adaptive window length estimation algorithm is designed to optimize the throughput and energy consumption tradeoff. The algorithm can adaptively change the code rate and can be insensitive to the environment change. Extensive simulations and analysis show that NCHARQ significantly reduces energy consumption with short end-to-end delay. PMID:27618044

  12. A sensory- and consumer-based approach to optimize cheese enrichment with grape skin powders.

    Science.gov (United States)

    Torri, L; Piochi, M; Marchiani, R; Zeppa, G; Dinnella, C; Monteleone, E

    2016-01-01

    The present study aimed to present a sensory- and consumer-based approach to optimize cheese enrichment with grape skin powders (GSP). The combined sensory evaluation approach, involving a descriptive and an affective test, respectively, was applied to evaluate the effect of the addition of grape skin powders from 2 grape varieties (Barbera and Chardonnay) at different levels [0.8, 1.6, and 2.4%; weight (wt) powder/wt curd] on the sensory properties and consumer acceptability of innovative soft cow milk cheeses. The experimental plan envisaged 7 products, 6 fortified prototypes (at rates of Barbera and Chardonnay of 0.8, 1.6, and 2.4%) and a control sample, with 1 wk of ripening. By means of a free choice profile, 21 cheese experts described the sensory properties of prototypes. A central location test with 90 consumers was subsequently conducted to assess the acceptability of samples. The GSP enrichment strongly affected the sensory properties of innovative products, mainly in terms of appearance and texture. Fortified samples were typically described with a marbling aspect (violet or brown as function of the grape variety) and with an increased granularity, sourness, saltiness, and astringency. The fortification also contributed certain vegetable sensations perceived at low intensity (grassy, cereal, nuts), and some potential negative sensations (earthy, animal, winy, varnish). The white color, the homogeneous dough, the compact and elastic texture, and the presence of lactic flavors resulted the positive drivers of preference. On the contrary, the marbling aspect, granularity, sandiness, sourness, saltiness, and astringency negatively affected the cheese acceptability for amounts of powder, exceeding 0.8 and 1.6% for the Barbera and Chardonnay prototypes, respectively. Therefore, the amount of powder resulted a critical parameter for liking of fortified cheeses and a discriminant between the 2 varieties. Reducing the GSP particle size and improving the GSP

  13. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    Science.gov (United States)

    Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Ding, Qing-Yan; Zhang, Shu-Hui

    2016-06-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. Supported by the National Natural Science Foundation of China under Grant Nos. 61572297, 61303199, 61272514, and 61373131, the Shandong Provincial Natural Science Foundation of China under Grant Nos. ZR2013FM025, ZR2013FQ001, ZR2014FM003, and ZY2015YL018, the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China under Grant Nos. BS2015DX006 and BS2014DX007, the National Development Foundation for Cryptological Research, China under Grant No. MMJJ201401012, the Priority Academic Program Development of Jiangsu Higher Education Institutions and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Funds, and the Shandong Academy of Sciences Youth Fund Project, China under Grant Nos. 2015QN003 and 2013QN007

  14. Performance Analysis of AODV Routing Protocol for Wireless Sensor Network based Smart Metering

    Science.gov (United States)

    >Hasan Farooq, Low Tang Jung,

    2013-06-01

    Today no one can deny the need for Smart Grid and it is being considered as of utmost importance to upgrade outdated electric infrastructure to cope with the ever increasing electric load demand. Wireless Sensor Network (WSN) is considered a promising candidate for internetworking of smart meters with the gateway using mesh topology. This paper investigates the performance of AODV routing protocol for WSN based smart metering deployment. Three case studies are presented to analyze its performance based on four metrics of (i) Packet Delivery Ratio, (ii) Average Energy Consumption of Nodes (iii) Average End-End Delay and (iv) Normalized Routing Load.

  15. Performance Analysis of AODV Routing Protocol for Wireless Sensor Network based Smart Metering

    International Nuclear Information System (INIS)

    Today no one can deny the need for Smart Grid and it is being considered as of utmost importance to upgrade outdated electric infrastructure to cope with the ever increasing electric load demand. Wireless Sensor Network (WSN) is considered a promising candidate for internetworking of smart meters with the gateway using mesh topology. This paper investigates the performance of AODV routing protocol for WSN based smart metering deployment. Three case studies are presented to analyze its performance based on four metrics of (i) Packet Delivery Ratio, (ii) Average Energy Consumption of Nodes (iii) Average End-End Delay and (iv) Normalized Routing Load.

  16. A Stream Control Transmission Protocol Based OAM System of 3G Cellular Network

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    OAM (Operations, Administration and Maintenance) system is a very important component of 3G cellular network. In order to acquire overall management, fast response and steady operation, an SCTP (Stream Control Transmission Protocol) based OAM, i. e. , SOAM system was proposed. SOAM implements new characters of SCTP such as multi-stream, enforced SACK and heartbeat mechanism on its transport layer. These characters help SOAM decrease the message transmission delay and accelerate the link failure detection. Besides, a new component named SOAM agent was introduced to improve the operation efficiency of SOAM. The experimental results prove the proposed SOAM system achieves better performance on signaling transmission compared with conventional TCP based OAM system.

  17. A Unique Approach to Dissemination of Evidence-Based Protocols: A Successful CAUTI Reduction Pilot.

    Science.gov (United States)

    Dols, Jean Dowling; White, Sondra K; Timmons, Amy L; Bush, Michelle; Tripp, Joanne; Childers, Amanda Kay; Mathers, Nicholas; Tobias, Maria M

    2016-01-01

    A unique approach to disseminate an evidence-based protocol for urinary catheter management was led by a staff-driven catheter-associated urinary tract infection (CAUTI) reduction team in one hospital. The nurseeducators, faculty from a local university, and the facility's clinical nurse leader mentored the team. As an approachto reduce CAUTIs in the transplant care and intensive care units, the team developed an interdisciplinary CAUTIEducation Fair, which provided a safe, nonthreateningenvironment to unlearn prior behaviors and showcompetency in new evidence-based ones. PMID:26797307

  18. Zein based oil-in-glycerol emulgels enriched with β-carotene as margarine alternatives.

    Science.gov (United States)

    Chen, Xiao-Wei; Fu, Shi-Yao; Hou, Jun-Jie; Guo, Jian; Wang, Jin-Mei; Yang, Xiao-Quan

    2016-11-15

    Structuring edible oils into solid lipids without saturated and trans fats has attracted increasing interest due to the benefits for human health and promises potential as novel delivery systems for lipophilic bioactive ingredients. The study shows that a zein stabilized high (ϕ=0.6) oil-in-glycerol (O/G) emulgels enriched with β-carotene was performed, by a facile one-step homogenization. Rheological measurements and morphologies observations indicated that increasing β-carotene resulted in a progressive strengthening of gel-like network and improving their spreadability in the O/G emulgels stabilized by zein, which was closely related to the hydrophobic interaction of zein and β-carotene. The formation of emulgels significantly enhanced the UV photo-stability of β-carotene, and more than 88% of β-carotene was retained in 64h storage under UV exposure, and consequently retarded oil oxidation while storage. Further, cakes prepared using zein-based O/G emulgels as a margarine alternative showed comparable functionalities (texture and sensory attributes) to the standard cake. PMID:27283703

  19. Inquiry-Based Science and Technology Enrichment Program for Middle School-Aged Female Students

    Science.gov (United States)

    Kim, Hanna

    2016-04-01

    This study investigates the effects of an intensive 1-week Inquiry-Based Science and Technology Enrichment Program (InSTEP) designed for middle school-aged female students. InSTEP uses a guided/open inquiry approach that is deepened and redefined as eight sciences and engineering practices in the Next Generation Science Standards, which aimed at increasing female students' interest in science and science-related careers. This study examined the effectiveness of InSTEP on 123 female students' pre-assessment and post-assessment changes in attitudes toward science and content knowledge of selected science concepts. An attitude survey, a science content test with multiple-choice questions, written assignments, and interviews to collect data were all used to measure students' attitudes and content knowledge. A within-group, repeated measure design was conducted, and the results indicated that at the post-intervention level, InSTEP increased the participants' positive attitudes toward science, science-related careers, and content knowledge of selected science concepts.

  20. Starch-based extruded cereals enriched in fibers: a behavior of composite solid foams.

    Science.gov (United States)

    Chanvrier, Hélène; Desbois, Fabrice; Perotti, Fabienne; Salzmann, Claire; Chassagne, Sophie; Gumy, Jean-Claude; Blank, Imre

    2013-10-15

    Extruded cereals mainly composed of starch and enriched in fibers were produced with two types of base recipes: (i) one recipe mainly composed of wheat flour and (ii) one recipe mainly composed of corn and soya flours. The addition of fibers was performed through the use of oat bran concentrate or wheat bran, up to 32% of the recipe. The structure of the extrudates, assessed by X-ray tomography, pointed out the decrease of porosity and of mean cells size with the increase of the total dietary fibers content of the recipe. The hardness of the products, i.e. the maximum stress determined by a compression test, was linked to their porosity. The Gibson-Ashby relationship could be applied and the fit was even improved when considering the walls of the solid foam as composite materials. Fibers and proteins can be indeed considered as particles dispersed in the starchy phase. This work thus shows the impact of the structure of the extrudates on their mechanical properties. The structure is taken into account at different length scales; at the level of the porous structure and at the level of the phase of the main biopolymers present in the recipe (starch, proteins and fibers). The mechanical behavior of these products is then discussed according to their characteristics of composite solid foams. PMID:23987420

  1. A Zigbee and Bluetooth Protocol Converter Based on Multi-sinks Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Chunhong Guo

    2014-07-01

    Full Text Available A Zigbee and Bluetooth converter is designed in this paper. A multi-sinks wireless sensor network is used to solve the notable problems appeared in the single node wireless sensor network. These problems are solved in converter system such as data transmission reliability and node energy consumption imbalance and so on. The converter system can be better adapted to the large-scale, high-density development trend of network layout. Zigbee technology has low power consumption, low cost. And Bluetooth technology shows outstanding advantages in terms of terminal access. This paper attempts to combine the advantages of two wireless technology, and design a point-to-many method of Zigbee and Bluetooth protocol converter. Then apply the Zigbee and Bluetooth protocol of converter to the multi-sinks wireless sensor networks. At the sensor nodes, it forms a network based on the Zigbee protocol. At the converter nodes, it communicates with Bluetooth devices through point-to-many method. The experiment results show that the point-to-many method of Zigbee and Bluetooth system can convert data effectively, and improve the data transmission reliably of the wireless sensor network. It has important values in the application of wireless sensor networks.

  2. An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae

    With the growing trend towards convergence in broadcast and communications media, Internet Protocol television (IPTV) that delivers real-time multimedia content over diverse types of communications networks (e.g., broadband Internet, cable TV, and satellite TV) has become a mainstream technology. Authenticating mobile IPTV subscribers who are continuously on the move is a challenge. A complex authentication process often impairs conditional access security or service quality as increasing illegal users and delaying service. This paper proposes an RFID-USB authentication protocol, for mobile IPTV users, combined with USIM-based personalized authentication and lightweight authentication that utilizes the RFID-USB technology with an implanted agent module (called an "agent tag") which temporarily enhanced user status information. The proposed authentication protocol adopts a plug-and-play security agent module that is placed in both an RFID tag and an RFID-USB. The implanted security agents cooperate in such a way that multiple RFID tags are connected seamlessly to an RFID-USB.

  3. A TDMA-BASED MAC PROTOCOL SUPPORTING COOPERATIVE COMMUNICATIONS IN WIRELESS MESH NETWORKS

    Directory of Open Access Journals (Sweden)

    Hongzhi Jiao

    2011-10-01

    Full Text Available This paper proposes a TDMA-based medium access control protocol which enables cooperative communications in multi-hop wireless mesh networks. According to the proposed scheme, each router at the two-hop neighbourhood of each other is allocated to a specific time slot for accommodating either direct or cooperative transmissions in a coordinated manner, controlled by mini-slots which are part of the time slot. Benefiting from the elaborate mini-slot design, channel resources are fairly and efficiently allocated to each router so that no handshake is needed prior to each packet transmission. By providing access priority to cooperative transmission through an optimal relay which is determined by combined instantaneous relay channel conditions, higher system throughput can be achieved. To analyze the performance of the proposed cooperative protocol a Markov chain is introduced to model the behavior ofthe protocol. Simulation results demonstrate that the proposed MAC scheme can improve not only the one-hop transmission throughput but also the end-to-end throughput significantly. Moreover, the throughput performance of the proposed scheme is robust as packet size varies.

  4. A Selection Region Based Routing Protocol for Random Mobile ad hoc Networks

    CERN Document Server

    Li, Di; Chen, Changhai; Cui, Shuguang

    2010-01-01

    We propose a selection region based multi-hop routing protocol for random mobile ad hoc networks, where the selection region is defined by two parameters: a reference distance and a selection angle. At each hop, a relay is chosen as the nearest node to the transmitter that is located within the selection region. By assuming that the relay nodes are randomly placed, we derive an upper bound for the optimum reference distance to maximize the expected density of progress and investigate the relationship between the optimum selection angle and the optimum reference distance. We also note that the optimized expected density of progress scales as $\\Theta(\\sqrt{\\lambda})$, which matches the prior results in the literature. Compared with the spatial-reuse multi-hop protocol in \\cite{Baccelli:Aloha} recently proposed by Baccelli \\emph{et al.}, in our new protocol the amount of nodes involved and the calculation complexity for each relay selection are reduced significantly, which is attractive for energy-limited wirele...

  5. Performance Evaluation of Mesh based Multicast Reactive Routing Protocol under Black Hole Attack

    CERN Document Server

    Anita, E A Mary

    2009-01-01

    A mobile ad-hoc network is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. The wireless and dynamic nature of ad-hoc networks makes them vulnerable to attacks especially in routing protocols. Providing security in mobile ad-hoc networks has been a major issue over the recent years. One of the prominent mesh base reactive multicast routing protocols used in ad-hoc networks is On Demand Multicast Routing protocol (ODMRP). The security of ODMRP is compromised by a primary routing attack called black hole attack. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. This paper discusses the impact of black hole attack on ODMRP under various scenarios. The performance is evaluated using metrics such as packet delivery ratio and end to end delay for various numbers of senders and receivers via...

  6. An evidence based protocol for peer review of radiographer musculoskeletal plain film reporting

    International Nuclear Information System (INIS)

    Aims: Medical image interpretation by non-medically trained staff continues to court controversy. This article aims to show that any potential risks associated with radiographer reporting can be monitored and mitigated if a robust peer review system is introduced. A search of the evidence base illustrates a paucity of guidance on how reporting radiographers should be audited or how a peer review process should be implemented. A practical framework for designing a reporting radiographer peer review process is provided. Methods: Following a literature review, key issues faced when designing a peer review protocol were identified. The following questions are answered: How frequent should peer review take place? How many reports should be reviewed? How are reports selected for review? Who should peer review the radiographer reports? How should radiographer's reporting performance be measured? What standard of reporting is acceptable? Results: Details are provided of the process that has been used for over three years at a busy inner-city teaching hospital for auditing musculoskeletal plain film radiographer reporting. The peer review method presented is not intended to produce robust statistical data; it is a practical method of locally assessing the reporting competency. As such, our protocol should be viewed as part of a larger programme for continuing professional development. Conclusion: It is hoped that this practical protocol will encourage radiology departments to engage in a programme of peer review for reporting radiographers.

  7. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    Science.gov (United States)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  8. RATE BASED TRANSPORT PROTOCOL USING DELAY INFORMATION for REDUCING ENERGY CONSUMPTION of NODES in MANET

    Directory of Open Access Journals (Sweden)

    K. Sasikala

    2013-10-01

    Full Text Available The MANET requires rate based transport protocol for node-to-node data transfer to be effective. The wellknown transport protocol processes the packets in sender, receiver and intermediate nodes and thus the energy consumption by the intermediate nodes are imperative. In this paper, a mechanism is proposed, which makes ATP as en-to-end protocol. The transmission and queuing delay is calculated and weight is assigned suitably to understand the effect of the delay in the network. The effect of recent delay is considered and more weight isassigned to the delay value and the same is stamped in the header of the packet. The header is processed in the most of the layers of sender and receiver nodes only. The intermediate node process the header only in minimized layers and thus the energy of the nodes are saved. The percentage of power consumption time is considered as evaluation parameter and NS2 simulator is considered as tool. The performance of the proposed approach is encouraging compared a recently proposed similar approach.

  9. PLEDGE: A POLICY-BASED SECURITY PROTOCOL FOR PROTECTING CONTENT ADDRESSABLE STORAGE ARCHITECTURES

    Directory of Open Access Journals (Sweden)

    Wassim Itani

    2010-01-01

    Full Text Available In this paper we present PLEDGE, an efficient and scalable security ProtocoL for protecting fixedcontent objects in contEnt aDdressable storaGe (CAS architEctures. PLEDGE follows an end-to-endpolicy-driven security approach to secure the confidentiality, integrity, and authenticity of fixed-content entities over the enterprise network links and in the nodes of the CAS device. It utilizes a customizable and configurable extensible mark-up language (XML security policy to provide flexible, multi-level, andfine-grained encryption and hashing methodologies to fixed content CAS entities. PLEDGE secures data objects based on their content and sensitivity and highly overcomes the performance of bulk and rawencryption protocols such as the Secure Socket Layer (SSL and the Transport Layer Security (TLS protocols. Moreover, PLEDGE transparently stores sensitive objects encrypted (partially or totally in the CAS storage nodes without affecting the CAS storage system operation or performance and takes into consideration the processing load, computing power, and memory capabilities of the client devices which may be constrained by limited processing power, memory resources, or network connectivity. PLEDGE complies with regulations such as the Health Insurance Portability and Accountability Act (HIPAArequirements and the SEC Rule 17a-4 financial standards. The protocol is implemented in a real CASnetwork using an EMC Centera backend storage device. The application secured by PLEDGE in the sample implementation is an X-Ray radiography scanning system in a healthcare network environment.The experimental test bed implementation conducted shows a speedup factor of three over raw encryption security mechanisms.

  10. Assessment of phosphopeptide enrichment/precipitation method for LC-MS/MS based phosphoproteomic analysis of plant tissue

    DEFF Research Database (Denmark)

    Ye, Juanying; Rudashevskaya, Elena; Hansen, Thomas Aarup;

    stardand sample preparation protocols. Here, we combine 3 phosphpeptide enrichment methods (IMAC, TiO2 and Calcium Phosphate Precipitation (CPP)), and apply them to phosphoproteomic analysis of Arabidopsis thaliana plasma membrane preparation. Method Plant plasma membranes were isolated from Arabidopsis...... thaliana (Col-0) leaves using a two-phase partitioning system. The concentration of plasma membrane protein was determined by Bradford assay. Protein was digested with Lys-C for 4 hours and then by trypsin overnight. The peptide mixture was purified with IMAC, TiO2, CPP, SIMAC (IMAC+TiO2), the combination...... of CPP and IMAC, and the combination of CPP and TiO2, respectively. Nano-LC-MS was performed using LTQ-Orbitrap XL and LTQ-Orbitrap-XL/ETD mass spectrometer (Thermo Electron, Bremen, Germany) connected to an EASY nano-LC system (Proxeon Biosystems, Odense, Denmark). In CID mode, multi...

  11. Impact of the Mobility Models, Route and Link connectivity on the performance of Position based routing protocols

    Directory of Open Access Journals (Sweden)

    Adam MACINTOSH

    2014-10-01

    Full Text Available This paper investigate the fundamental factors “mobility models, route and link connectivity” in Mobile Ad hoc networks (MANET which have a major impact on the performance of position based routing protocols. In addition, a new measurement method called probability of communication process is proposed. The method is used to measure the success rate of established path by a MANET routing protocol, which allow to stress test and inspect the stability, scalability and adaptability of MANET routing protocols. We analysed the effect of “route and link connectivity” on the performance of protocols under two different mobility models. Results show the evaluation and performance of the proposed protocol under a unified simulation environment for different scenarios.

  12. Integrating human impacts and ecological integrity into a risk-based protocol for conservation planning

    Science.gov (United States)

    Mattson, K.M.; Angermeier, P.L.

    2007-01-01

    Conservation planning aims to protect biodiversity by sustainng the natural physical, chemical, and biological processes within representative ecosystems. Often data to measure these components are inadequate or unavailable. The impact of human activities on ecosystem processes complicates integrity assessments and might alter ecosystem organization at multiple spatial scales. Freshwater conservation targets, such as populations and communities, are influenced by both intrinsic aquatic properties and the surrounding landscape, and locally collected data might not accurately reflect potential impacts. We suggest that changes in five major biotic drivers-energy sources, physical habitat, flow regime, water quality, and biotic interactions-might be used as surrogates to inform conservation planners of the ecological integrity of freshwater ecosystems. Threats to freshwater systems might be evaluated based on their impact to these drivers to provide an overview of potential risk to conservation targets. We developed a risk-based protocol, the Ecological Risk Index (ERI), to identify watersheds with least/most risk to conservation targets. Our protocol combines risk-based components, specifically the frequency and severity of human-induced stressors, with biotic drivers and mappable land- and water-use data to provide a summary of relative risk to watersheds. We illustrate application of our protocol with a case study of the upper Tennessee River basin, USA. Differences in risk patterns among the major drainages in the basin reflect dominant land uses, such as mining and agriculture. A principal components analysis showed that localized, moderately severe threats accounted for most of the threat composition differences among our watersheds. We also found that the relative importance of threats is sensitive to the spatial grain of the analysis. Our case study demonstrates that the ERI is useful for evaluating the frequency and severity of ecosystemwide risk, which can

  13. Treatment Protocols for Eating Disorders: Clinicians’ Attitudes, Concerns, Adherence and Difficulties Delivering Evidence-Based Psychological Interventions

    OpenAIRE

    Waller, G.

    2016-01-01

    There are several protocols in existence that guide clinicians in the implementation of effective, evidence-based psychological interventions for eating disorders. These have been made accessible in the form of treatment manuals. However, relatively few clinicians use those protocols, preferring to offer more eclectic or integrative approaches. Following a summary of the research that shows that these evidence-based approaches can be used successfully in routine clinical settings, this review...

  14. Laser and gas centrifuge enrichment

    Energy Technology Data Exchange (ETDEWEB)

    Heinonen, Olli [Senior Fellow, Belfer Center for Science and International Affairs, Harvard Kennedy School, Cambridge, Massachusetts (United States)

    2014-05-09

    Principles of uranium isotope enrichment using various laser and gas centrifuge techniques are briefly discussed. Examples on production of high enriched uranium are given. Concerns regarding the possibility of using low end technologies to produce weapons grade uranium are explained. Based on current assessments commercial enrichment services are able to cover the global needs of enriched uranium in the foreseeable future.

  15. Laser and gas centrifuge enrichment

    Science.gov (United States)

    Heinonen, Olli

    2014-05-01

    Principles of uranium isotope enrichment using various laser and gas centrifuge techniques are briefly discussed. Examples on production of high enriched uranium are given. Concerns regarding the possibility of using low end technologies to produce weapons grade uranium are explained. Based on current assessments commercial enrichment services are able to cover the global needs of enriched uranium in the foreseeable future.

  16. An ICT-Based Platform to Monitor Protocols in the Healthcare Environment.

    Science.gov (United States)

    Rorís, Víctor M Alonso; Gago, Juan M Santos; Sabucedo, Luis Álvarez; Merino, Mateo Ramos; Valero, Javier Sanz

    2016-10-01

    Procedures from the healthcare domain involve highly critical actions as they may pose a risk for patients' life. Therefore, a large effort is devoted to the standardization in clinical praxis and to the control of quality for these protocols in order to minimize hazards. In this line, this work is compelled to provide an ICT-based support to carry out these controls in a simple and effective manner. Using a methodology based on HACCP and taking advantage of Semantic tools, a holistic platform of services for traceability and control of processes has been designed and implemented. The applied paradigm is based on the use of Control Points as singular points to generate traces using observations and measures relevant for the processes considered. Based on those, it is possible to offer services for advanced querying and knowledge inference. The local deployment just requires regular mobile phones or tablets making this solution cost-effective and easily replicable. PMID:27624494

  17. Research on an E-mail Encryption Protocol Based on Quantum Teleportation

    Science.gov (United States)

    Shufen, Xiao; Yumin, Dong; Hongyang, Ma; Libo, Chen

    2016-07-01

    With the rapid development of information technology (IT), E-mail has become an important communication tool between human beings. Meanwhile, E-mail safety becomes increasingly important because of its universal applications. In order to overcome shortages of classical E-mail encryption, an E-mail encryption protocol based on quantum teleportation was proposed. It makes quantum encryption of E-mails during sending and receiving processes by taking advantages of entanglement and nonclonability of quantum, thus ensuring safety and reliability of E-mail transmission.

  18. Design and Simulation of Routing-switching Protocol Based on Optical Switch Array

    Institute of Scientific and Technical Information of China (English)

    HE Wei; MAO You-ju; LIU Jiang

    2004-01-01

    An optical routing- switching technology based on optical switch array is proposed. The characteristics of the blocking and nonblocking networks are analyzed and compared, odd- even sorting network is used to realize optical routing- switching, relative routing- switching protocol is designed.Simulation test under load shows that it can reduce a blocking effectively and enhance an efficiency of switching. Further, it can transfer the processing and switching within parallel computer from electric domain to optical domain. It can make parallel computer coordinating computing and processing at much more higher speed, storing and transmitting even more efficiently.

  19. A hybrid path-oriented code assignment CDMA-based MAC protocol for underwater acoustic sensor networks.

    Science.gov (United States)

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-01-01

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols. PMID:24193100

  20. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks.

    Science.gov (United States)

    Perumal, Madhumathy; Dhandapani, Sivakumar

    2015-01-01

    Data gathering and optimal path selection for wireless sensor networks (WSN) using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS). This protocol finds the rendezvous point for optimal transmission of data using a "splitting tree" technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the "Biased Random Walk" model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS) is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR) protocol to prove that there is increase in the network lifetime compared with other routing protocols. PMID:26495426

  1. Protein expression and isotopic enrichment based on induction of the Entner-Doudoroff pathway in Escherichia coli

    Energy Technology Data Exchange (ETDEWEB)

    Refaeli, Bosmat [School of Chemistry, Raymond and Beverly Sackler Faculty of Exact Sciences, Tel Aviv University, Ramat Aviv 69978, Tel Aviv (Israel); Goldbourt, Amir, E-mail: amirgo@post.tau.ac.il [School of Chemistry, Raymond and Beverly Sackler Faculty of Exact Sciences, Tel Aviv University, Ramat Aviv 69978, Tel Aviv (Israel)

    2012-10-12

    Highlights: Black-Right-Pointing-Pointer The Entner-Doudoroff pathway is induced during protein expression in E. coli. Black-Right-Pointing-Pointer 1-{sup 13}C-gluconate and {sup 15}NH{sub 4}Cl provide a carbonyl-amide protein backbone labeling scheme. Black-Right-Pointing-Pointer The enrichment pattern is determined by nuclear magnetic resonance. -- Abstract: The Entner-Doudoroff pathway is known to exist in many organisms including bacteria, archea and eukarya. Although the common route for carbon catabolism in Escherichia coli is the Embden-Meyerhof-Parnas pathway, it was shown that gluconate catabolism in E. coli occurs via the Entner-Doudoroff pathway. We demonstrate here that by supplying BL21(DE3) competent E.coli cells with gluconate in a minimal growth medium, protein expression can be induced. Nuclear magnetic resonance data of over-expressed ubiquitin show that by using [1-{sup 13}C]-gluconate as the only carbon source, and {sup 15}N-enriched ammonium chloride, sparse isotopic enrichment in the form of a spin-pair carbonyl-amide backbone enrichment is obtained. The specific amino acid labeling pattern is analyzed and is shown to be compatible with Entner-Doudoroff metabolism. Isotopic enrichment serves as a key factor in the biophysical characterization of proteins by various methods including nuclear magnetic resonance, mass spectrometry, infrared spectroscopy and more. Therefore, the method presented here can be applied to study proteins by obtaining sparse enrichment schemes that are not based on the regular glycolytic pathway, or to study the Entner-Doudoroff metabolism during protein expression.

  2. A game theory-based obstacle avoidance routing protocol for wireless sensor networks.

    Science.gov (United States)

    Guan, Xin; Wu, Huayang; Bi, Shujun

    2011-01-01

    The obstacle avoidance problem in geographic forwarding is an important issue for location-based routing in wireless sensor networks. The presence of an obstacle leads to several geographic routing problems such as excessive energy consumption and data congestion. Obstacles are hard to avoid in realistic environments. To bypass obstacles, most routing protocols tend to forward packets along the obstacle boundaries. This leads to a situation where the nodes at the boundaries exhaust their energy rapidly and the obstacle area is diffused. In this paper, we introduce a novel routing algorithm to solve the obstacle problem in wireless sensor networks based on a game-theory model. Our algorithm forms a concave region that cannot forward packets to achieve the aim of improving the transmission success rate and decreasing packet transmission delays. We consider the residual energy, out-degree and forwarding angle to determine the forwarding probability and payoff function of forwarding candidates. This achieves the aim of load balance and reduces network energy consumption. Simulation results show that based on the average delivery delay, energy consumption and packet delivery ratio performances our protocol is superior to other traditional schemes. PMID:22163698

  3. A Game Theory-Based Obstacle Avoidance Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shujun Bi

    2011-09-01

    Full Text Available The obstacle avoidance problem in geographic forwarding is an important issue for location-based routing in wireless sensor networks. The presence of an obstacle leads to several geographic routing problems such as excessive energy consumption and data congestion. Obstacles are hard to avoid in realistic environments. To bypass obstacles, most routing protocols tend to forward packets along the obstacle boundaries. This leads to a situation where the nodes at the boundaries exhaust their energy rapidly and the obstacle area is diffused. In this paper, we introduce a novel routing algorithm to solve the obstacle problem in wireless sensor networks based on a game-theory model. Our algorithm forms a concave region that cannot forward packets to achieve the aim of improving the transmission success rate and decreasing packet transmission delays. We consider the residual energy, out-degree and forwarding angle to determine the forwarding probability and payoff function of forwarding candidates. This achieves the aim of load balance and reduces network energy consumption. Simulation results show that based on the average delivery delay, energy consumption and packet delivery ratio performances our protocol is superior to other traditional schemes.

  4. Optimization of the scan protocols for CT-based material extraction in small animal PET/CT studies

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Ching-Ching [Department of Medical Imaging and Radiological Sciences, Tzu Chi College of Technology, 880, Sec 2, Chien-Kuo Rd., Hualien, Taiwan (China); Yu, Jhih-An [Department of Biomedical Imaging and Radiological Sciences, National Yang-Ming University, 155 Li-Nong St., Sec. 2, Taipei, Taiwan (China); Yang, Bang-Hung [Department of Biomedical Imaging and Radiological Sciences, National Yang-Ming University, 155 Li-Nong St., Sec. 2, Taipei, Taiwan (China); Department of Nuclear Medicine, Taipei Veterans General Hospital, Taipei, Taiwan (China); Wu, Tung-Hsin, E-mail: tung@ym.edu.tw [Department of Biomedical Imaging and Radiological Sciences, National Yang-Ming University, 155 Li-Nong St., Sec. 2, Taipei, Taiwan (China)

    2013-12-11

    We investigated the effects of scan protocols on CT-based material extraction to minimize radiation dose while maintaining sufficient image information in small animal studies. The phantom simulation experiments were performed with the high dose (HD), medium dose (MD) and low dose (LD) protocols at 50, 70 and 80 kV{sub p} with varying mA s. The reconstructed CT images were segmented based on Hounsfield unit (HU)-physical density (ρ) calibration curves and the dual-energy CT-based (DECT) method. Compared to the (HU;ρ) method performed on CT images acquired with the 80 kV{sub p} HD protocol, a 2-fold improvement in segmentation accuracy and a 7.5-fold reduction in radiation dose were observed when the DECT method was performed on CT images acquired with the 50/80 kV{sub p} LD protocol, showing the possibility to reduce radiation dose while achieving high segmentation accuracy.

  5. A Protocol for Retrospective Remote-Sensing-based Ecological Monitoring of Rangelands

    Science.gov (United States)

    Washington-Allen, R. A.; West, N. E.; Ramsey, R. D.; Efroymson, R. A.

    2009-12-01

    Because the condition and trend of drylands in the United States at sub-regional to national scales is unknown, this paper presents a protocol for the monitoring and assessment of dryland degradation using historical remote sensing. Traditional field-based monitoring has proven inadequate for capturing the changes in spatial and temporal heterogeneity that may adversely affect drylands at sub-regional to national spatial scales. Continuous monitoring data of 14 to 25 years is required to detect and separate the effects of climatic processes from those induced by land management practices. However, few field-based datasets exist that have measured the trend of appropriate ecological indicators at regional to national scales. Landsat data has been collected and archived at least once-a month since 1972, and includes complete coverage of US drylands. Five assessment endpoints that relate to land degradation can be retrospectively measured for the last 33 years using surrogate indicators derived from Landsat imagery: change in vegetation physiognomy, decline in vegetation productivity, accelerated soil erosion, decline in soil quality, and change in landscape composition and configuration. Consequently, this protocol considers (1) how land degradation is characterized, i.e., what indicators are assessed, (2) which indicators are measured, (3) what reference conditions are appropriate, (4) which temporal and spatial scales are of concern, and finally, (5) which statistics and/or analyses are appropriate for determining the significance of a change? Aspects of two retrospective studies are presented as examples of application of the protocol to considerations of the land use impacts from military training and testing, and commercial grazing activities on drylands.

  6. Towards a protocol for validating satellite-based Land Surface Temperature: Theoretical considerations

    Science.gov (United States)

    Schneider, Philipp; Ghent, Darren J.; Corlett, Gary C.; Prata, Fred; Remedios, John J.

    2013-04-01

    Land Surface Temperature (LST) and emissivity are important parameters for environmental monitoring and earth system modelling. LST has been observed from space for several decades using a wide variety of satellite instruments with different characteristics, including both platforms in low-earth orbit and in geostationary orbit. This includes for example the series of Advanced Very High Resolution Radiometers (AVHRR) delivering a continuous thermal infrared (TIR) data stream since the early 1980s, the series of Along-Track Scanning Radiometers (ATSR) providing TIR data since 1991, and the Moderate Resolution Imaging Spectroradiometer (MODIS) instruments onboard NASA's Terra and Aqua platforms, providing data since the year 2000. In addition, the Spinning Enhanced Visible and Infrared Imager (SEVIRI) onboard of the geostationary Meteosat satellites is now providing LST at unprecedented sub-hour frequency. The data record provided by such instruments is extremely valuable for a wide variety of applications, including climate change, land/atmosphere feedbacks, fire monitoring, modelling, land cover change, geology, crop- and water management. All of these applications, however, require a rigorous validation of the data in order to assess the product quality and the associated uncertainty. Here we report on recent work towards developing a protocol for validation of satellite-based Land Surface Temperature products. Four main validation categories are distinguished within the protocol: A) Comparison with in situ observations, B) Radiance-based validation, C) Inter-comparison with similar LST products, and D) Time-series analysis. Each category is further subdivided into several quality classes, which approximately reflect the validation accuracy that can be achieved by the different approaches, as well as the complexity involved with each method. Advice on best practices is given for methodology common to all categories. For each validation category, recommendations

  7. A Department-of-Anesthesiology-based management protocol for perioperative corneal abrasions

    Directory of Open Access Journals (Sweden)

    Lichter JR

    2015-09-01

    Full Text Available Jessica R Lichter,1 Lawrence B Marr,2 Dennis E Schilling,3 Mark E Hudson,4 Robert H Boretsky,5 Roxana F Barad,6 Jacques E Chelly1–3 1Division of Clinical Research, Department of Anesthesiology, University of Pittsburgh, 2University of Pittsburgh Physicians, Department of Anesthesiology, UPMC Shadyside Hospital, 3UPMC Shadyside Hospital, 4University of Pittsburgh Physicians, Department of Anesthesiolgy, University of Pittsburgh Medical Center, 5Department of Anesthesiology, UPMC Shadyside, 6Department of Ophthalmology, UPMC Shadyside, University of Pittsburgh Medical Center, Pittsburgh, PA, USA Introduction: Corneal abrasions (CAs are the most prevalent ocular injuries in the perioperative period. Previously, patients at our community hospital would wait for an ophthalmologist to be available to manage these minor injuries. To decrease this waiting period – and thereby increase patient satisfaction – we developed an anesthesiology-based protocol to manage minor CAs arising in the recovery room. The current study sought to assess this protocol’s efficacy as well as further establish the incidence and some risk factors of CA. Methods: This was a hospital-based, observational study. As per protocol, anesthesiologists saw and diagnosed any patient exhibiting symptoms of CA, after which they initiated a preestablished treatment regimen. To examine the efficacy of this protocol between March 2007 and December 2011, the number of CAs anesthesiologists managed and time to treatment were recorded. Additionally, the frequency of CAs was established along with some of their risk factors. Results: Throughout the study period, there were 91,064 surgical cases, with 118 CAs (0.13% incidence. Anesthesiology alone managed 110 (93.22% of these cases. The median time between the end of anesthesia to the time of prescribed ophthalmic medication was 156 minutes (first–third interquartile range: 108–219. All patients experienced resolution of symptoms by

  8. Recent advances in enrichment and separation strategies for mass spectrometry-based phosphoproteomics

    Science.gov (United States)

    Yang, Chenxi; Zhong, Xuefei; Li, Lingjun

    2016-01-01

    Due to the significance of protein phosphorylation in various biological processes and signaling events, new analytical techniques for enhanced phosphoproteomics have been rapidly introduced in recent years. The combinatorial use of the phospho-specific enrichment techniques and prefractionation methods prior to MS analysis enables comprehensive profiling of the phosphoproteome and facilitates deciphering the critical roles that phosphorylation plays in signaling pathways in various biological systems. This review places special emphasis on the recent five-year (2009–2013) advances for enrichment and separation techniques that have been utilized for phosphopeptides prior to MS analysis. PMID:24687451

  9. A Hybrid Routing Algorithm Based on Ant Colony and ZHLS Routing Protocol for MANET

    Science.gov (United States)

    Rafsanjani, Marjan Kuchaki; Asadinia, Sanaz; Pakzad, Farzaneh

    Mobile Ad hoc networks (MANETs) require dynamic routing schemes for adequate performance. This paper, presents a new routing algorithm for MANETs, which combines the idea of ant colony optimization with Zone-based Hierarchical Link State (ZHLS) protocol. Ant colony optimization (ACO) is a class of Swarm Intelligence (SI) algorithms. SI is the local interaction of many simple agents to achieve a global goal. SI is based on social insect for solving different types of problems. ACO algorithm uses mobile agents called ants to explore network. Ants help to find paths between two nodes in the network. Our algorithm is based on ants jump from one zone to the next zones which contains of the proactive routing within a zone and reactive routing between the zones. Our proposed algorithm improves the performance of the network such as delay, packet delivery ratio and overhead than traditional routing algorithms.

  10. Analysis and Proposal of Position-Based Routing Protocols for Vehicular Ad Hoc Networks

    Science.gov (United States)

    Okada, Hiraku; Takano, Akira; Mase, Kenichi

    One of the most promising applications of a mobile ad hoc network is a vehicular ad hoc network (VANET). Each vehicle is aware of its position information by GPS or other methods, so position-based routing is a useful approach in VANET. The position-based routing protocol can be classified roughly into a next-hop forwarding method and a directed flooding method. We evaluate performance of both methods by analytic approach and compare them in this paper. From the evaluation results, we conclude that it is effective for the position-based routing to choose either the next-hop forwarding method or the directed flooding method according to the environment. Then we propose the hybrid transmission method which can select one of them according to the environment, and clarify that the proposed method can keep the packet delivery ratio at a high level and reduce the delay time.

  11. A high-speed multi-protocol quantum key distribution transmitter based on a dual-drive modulator

    CERN Document Server

    Korzh, Boris; Houlmann, Raphael; Zbinden, Hugo

    2013-01-01

    We propose a novel source based on a dual-drive modulator that is adaptable and allows Alice to choose between various practical quantum key distribution (QKD) protocols depending on what receiver she is communicating with. Experimental results show that the proposed transmitter is suitable for implementation of the Bennett and Brassard 1984 (BB84), coherent one-way (COW) and differential phase shift (DPS) protocols with stable and low quantum bit error rate. This could become a useful component in network QKD, where multi-protocol capability is highly desirable.

  12. ERROR COUNTER-BASED NEGATIVE ACKNOWLEDGEMENT MODE IN CCSDS FILE DELIVERY PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    Xiao Shijie; Yang Mingchuan; Guo Qing

    2011-01-01

    Deep space communication has its own features such as long propagation delays,heavy noise,asymmetric link rates,and intermittent connectivity in space,therefore TCP/IP protocol cannot perform as well as it does in terrestrial communications.Accordingly,the Consultative Committee for Space Data Systems (CCSDS) developed CCSDS File Delivery Protocol (CFDP),which sets standards of efficient file delivery service capable of transferring files to and from mass memory located in the space segment.In CFDP,four optional acknowledge modes are supported to make the communication more reliable.In this paper,we gave a general introduction of typical communication process in CFDP and analysis of its four Negative Acknowledgement (NAK) modes on the respect of file delivery delay and times of retransmission.We found out that despite the shortest file delivery delay,immediate NAK mode suffers from the problem that frequent retransmission may probably lead to network congestion.Thus,we proposed a new mode,the error counter-based NAK mode.By simulation of the case focused on the link between a deep space probe on Mars and a terrestrial station on Earth,we concluded that error counter-based NAK mode has successfully reduced the retransmission times at negligible cost of certain amount of file delivery delay.

  13. Assessment of High and Low Rate Protocol-based Attacks on Ethernet Networks

    Directory of Open Access Journals (Sweden)

    Mina Malekzadeh

    2015-07-01

    Full Text Available The Internet and Web have significantly transformed the world’s communication system. The capability of the Internet to instantly access information at anytime from anywhere has brought benefit for a wide variety of areas including business, government, education, institutions, medical, and entertainment services. However, the Internet has also opened up the possibilities for hackers to exploit flaws and limitations in the target networks to attack and break in without gaining physical access to the target systems. The OSI layer protocol-based attacks are among them. In this work we investigate feasibility as well as severity of the attacks against three common layering protocols including TCP, UDP, and ICMP on Ethernet-based networks in the real world through a testbed. Then a simulation environment is designed to implement the exact same attacks under similar conditions using NS2 network simulator. The testbed results and simulation results are compared with each other to explore the accuracy of the findings and measure the damages the attacks caused to the network.

  14. A Semantics-Based Approachfor Achieving Self Fault-Tolerance of Protocols

    Institute of Scientific and Technical Information of China (English)

    李腊元; 李春林

    2000-01-01

    The cooperation of different processes may be lost by mistake when a protocol is executed. The protocol cannot be normally operated under this condition. In this paper, the self fault-tolerance of protocols is discussed, and a semanticsbased approach for achieving self fault-tolerance of protocols is presented. Some main characteristics of self fault-tolerance of protocols concerning liveness, nontermination and infinity are also presented. Meanwhile, the sufficient and necessary conditions for achieving self fault-tolerance of protocols are given. Finally, a typical protocol that does not satisfy the self fault-tolerance is investigated, and a new redesign version of this existing protocol using the proposed approach is given.

  15. 一种基于RSL的协议形式化描述技术的研究%Research on Formal Description Techniques of Protocols Based on RSL

    Institute of Scientific and Technical Information of China (English)

    赵静; 屈玉贵; 赵保华

    2003-01-01

    This paper presents a formal technique of protocols based on RSL,which can efficiently connect the formaldescription ,validation,implementation and testing of protocols. It mainly discusses the formal description of protocolsbased on RSL,and also provides an algorithm about this. Finally,taking the protocol AB as an example,a formal de-scription based on RSL is given.

  16. An Energy-Aware Routing Protocol for Query-Based Applications in Wireless Sensor Networks

    OpenAIRE

    Ehsan Ahvar; Shohreh Ahvar; Gyu Myoung Lee; Noel Crespi

    2014-01-01

    Wireless sensor network (WSN) typically has energy consumption restriction. Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers. Energy saving protocols are used to minimize the overall energy consumed by a WSN, while energy balancing protocols attempt to efficiently distribute the consumption of energy throughout the network. In general terms, e...

  17. A Survey of RFID Authentication Protocols Based on Hash-Chain Method

    CERN Document Server

    Syamsuddin, Irfan; Chang, Elizabeth; Han, Song; 10.1109/ICCIT.2008.314

    2010-01-01

    Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article is a survey to closely observe those protocols in terms of its focus and limitations.

  18. Design and Evaluation of a New Fair Exchange Protocol Based on an Online TTP

    OpenAIRE

    Abdullah AlOtaibi; Hamza Aldabbas

    2012-01-01

    Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and secured; they should protect both parties from fraudulent users and subsequently promote the growth of e-commerce. There are some protocols, known as fair exchange protocols, in e-commerce that are designed to guarantee fairness between the customer and the merchant so that neither party gains any advanta...

  19. A combined enrichment/polymerase chain reaction based method for the routine screening of Streptococcus agalactiae in pregnant women

    Directory of Open Access Journals (Sweden)

    F.M. Munari

    2012-03-01

    Full Text Available Group B Streptococcus (GBS is the most common cause of life-threatening infection in neonates. Guidelines from CDC recommend universal screening of pregnant women for rectovaginal GBS colonization. The objective of this study was to compare the performance of a combined enrichment/PCR based method targeting the atr gene in relation to culture using enrichment with selective broth medium (standard method to identify the presence of GBS in pregnant women. Rectovaginal GBS samples from women at ≥36 weeks of pregnancy were obtained with a swab and analyzed by the two methods. A total of 89 samples were evaluated. The prevalence of positive results for GBS detection was considerable higher when assessed by the combined enrichment/PCR method than with the standard method (35.9% versus 22.5%, respectively. The results demonstrated that the use of selective enrichment broth followed by PCR targeting the atr gene is a highly sensitive, specific and accurate test for GBS screening in pregnant women, allowing the detection of the bacteria even in lightly colonized patients. This PCR methodology may provide a useful diagnostic tool for GBS detection and contributes for a more accurate and effective intrapartum antibiotic and lower newborn mortality and morbidity.

  20. A design pattern for event-based processing of security-enriched SOAP messages

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko; Lo Iacono, Luigi

    2010-01-01

    For Web Services in Cloud Computing contexts, the efficient processing of XML documents is a major topic of interest. Especially for WS-Security-enriched messages, processing performance nowadays tends to become a major issue. Streaming XML processing approaches lead to valuable optimization due...

  1. Oxidative stability of fish oil-enriched mayonnaise-based salads

    DEFF Research Database (Denmark)

    Sørensen, Ann-Dorit Moltke; Nielsen, Nina Skall; Jacobsen, Charlotte

    2010-01-01

    significantly different from the standard mayonnaise in the volatile concentration during the end of storage. In fish oil-enriched shrimp salad, asparagus had an anti-oxidative effect and shrimp a pro-oxidative effect, where the anti-oxidative effect of asparagus was strong enough to prevent the pro...

  2. Poster — Thur Eve — 20: CTDI Measurements using a Radiochromic Film-based clinical protocol

    International Nuclear Information System (INIS)

    The purpose of the study was evaluating accuracy and reproducibility of a radiochromic film-based protocol to measure computer tomography dose index (CTDI) as a part of annual QA on CT scanners and kV-CBCT systems attached to linear accelerators. Energy dependence of Gafchromic XR-QA2 ® film model was tested over imaging beam qualities (50 – 140 kVp). Film pieces were irradiated in air to known values of air-kerma (up to 10 cGy). Calibration curves for each beam quality were created (Film reflectance change Vs. Air-kerma in air). Film responses for same air-kerma values were compared. Film strips were placed into holes of a CTDI phantom and irradiated for several clinical scanning protocols. Film reflectance change was converted into dose to water and used to calculate CTDIvol values. Measured and tabulated CTDIvol values were compared. Average variations of ±5.2% in the mean film reflectance change were observed in the energy range of 80 to 140 keV, and 11.1% between 50 and 140 keV. Measured CTDI values were in average 10% lower than tabulated CTDI values for CT-simulators, and 44% higher for CBCT systems. Results presented a mean variation for the same machine and protocol of 2.6%. Variation of film response is within ±5% resulting in ±15% systematic error in dose estimation if a single calibration curve is used. Relatively large discrepancy between measured and tabulated CTDI values strongly support the trend towards replacing CTDI value with equilibrium dose measurement in the center of cylindrical phantom, as suggested by TG- 111

  3. Poster — Thur Eve — 20: CTDI Measurements using a Radiochromic Film-based clinical protocol

    Energy Technology Data Exchange (ETDEWEB)

    Quintero, C.; Bekerat, H.; DeBlois, F. [Medical Physics Unit, McGill University. Montreal, Quebec (Canada); Department of Radiation Oncology, SMBD Jewish General Hospital, McGill University. Montreal, Quebec (Canada); Tomic, N.; Devic, S. [Department of Radiation Oncology, SMBD Jewish General Hospital, McGill University. Montreal, Quebec (Canada); Seuntjens, J. [Medical Physics Unit, McGill University. Montreal, Quebec (Canada)

    2014-08-15

    The purpose of the study was evaluating accuracy and reproducibility of a radiochromic film-based protocol to measure computer tomography dose index (CTDI) as a part of annual QA on CT scanners and kV-CBCT systems attached to linear accelerators. Energy dependence of Gafchromic XR-QA2 ® film model was tested over imaging beam qualities (50 – 140 kVp). Film pieces were irradiated in air to known values of air-kerma (up to 10 cGy). Calibration curves for each beam quality were created (Film reflectance change Vs. Air-kerma in air). Film responses for same air-kerma values were compared. Film strips were placed into holes of a CTDI phantom and irradiated for several clinical scanning protocols. Film reflectance change was converted into dose to water and used to calculate CTDIvol values. Measured and tabulated CTDIvol values were compared. Average variations of ±5.2% in the mean film reflectance change were observed in the energy range of 80 to 140 keV, and 11.1% between 50 and 140 keV. Measured CTDI values were in average 10% lower than tabulated CTDI values for CT-simulators, and 44% higher for CBCT systems. Results presented a mean variation for the same machine and protocol of 2.6%. Variation of film response is within ±5% resulting in ±15% systematic error in dose estimation if a single calibration curve is used. Relatively large discrepancy between measured and tabulated CTDI values strongly support the trend towards replacing CTDI value with equilibrium dose measurement in the center of cylindrical phantom, as suggested by TG- 111.

  4. Library design and screening protocol for artificial metalloenzymes based on the biotin-streptavidin technology.

    Science.gov (United States)

    Mallin, Hendrik; Hestericová, Martina; Reuter, Raphael; Ward, Thomas R

    2016-05-01

    Artificial metalloenzymes (ArMs) based on the incorporation of a biotinylated metal cofactor within streptavidin (Sav) combine attractive features of both homogeneous and enzymatic catalysts. To speed up their optimization, we present a streamlined protocol for the design, expression, partial purification and screening of Sav libraries. Twenty-eight positions have been subjected to mutagenesis to yield 335 Sav isoforms, which can be expressed in 24-deep-well plates using autoinduction medium. The resulting cell-free extracts (CFEs) typically contain >1 mg of soluble Sav. Two straightforward alternatives are presented, which allow the screening of ArMs using CFEs containing Sav. To produce an artificial transfer hydrogenase, Sav is coupled to a biotinylated three-legged iridium pianostool complex Cp*Ir(Biot-p-L)Cl (the cofactor). To screen Sav variants for this application, you would determine the number of free binding sites, treat them with diamide, incubate them with the cofactor and then perform the reaction with your test compound (the example used in this protocol is 1-phenyl-3,4-dihydroisoquinoline). This process takes 20 d. If you want to perform metathesis reactions, Sav is coupled to a biotinylated second-generation Grubbs-Hoveyda catalyst. In this application, it is best to first immobilize Sav on Sepharose-iminobiotin beads and then perform washing steps. Elution from the beads is achieved in an acidic reaction buffer before incubation with the cofactor. Catalysis using your test compound (in this protocol, 2-(4-(N,N-diallylsulfamoyl)phenyl)-N,N,N-trimethylethan-1-aminium iodide) is performed using the formed metalloenzyme. Screening using this approach takes 19 d. PMID:27031496

  5. Impact of the Mobility Models, Route and Link connectivity on the performance of Position based routing protocols

    OpenAIRE

    Adam MACINTOSH; Ming FEISIYAU; Mohammed GHAVAMI

    2014-01-01

    This paper investigate the fundamental factors “mobility models, route and link connectivity” in Mobile Ad hoc networks (MANET) which have a major impact on the performance of position based routing protocols. In addition, a new measurement method called probability of communication process is proposed. The method is used to measure the success rate of established path by a MANET routing protocol, which allow to stress test and inspect the stability, scalability and adaptability of MANET rout...

  6. Development and Testing of a Literature Search Protocol for Evidence Based Nursing: An Applied Student Learning Experience

    OpenAIRE

    Andy Hickner; Friese, Christopher R.; Margaret Irwin

    2011-01-01

    Objective – The study aimed to develop a search protocol and evaluate reviewers' satisfaction with an evidence-based practice (EBP) review by embedding a library science student in the process.Methods – The student was embedded in one of four review teams overseen by a professional organization for oncology nurses (ONS). A literature search protocol was developed by the student following discussion and feedback from the review team. Organization staff provided process feedback. Reviewers from...

  7. Time-Based CSMA Protocol for Alleviating Collision Problem in RFID System

    Directory of Open Access Journals (Sweden)

    Poornima.R

    2013-04-01

    Full Text Available Radio Frequency Identification (RFID System admits rapid identification of entities by itself in the discipline of pervasive computing. RFID system comprises readers and tags. Readers arecommunicating with the tag by broadcasting RF signals. In existing RFID system channel assignment, tag identification and collision is a vital issue. Henceforth efforts are requisite to minimize these issues. This work evaluating the throughput of the RFID system by incorporating time into Carrier Sense Multiple Access (CSMA protocol. Time based CSMA (TCSMA depends on CSMA below low contention and TDMA below high contention in RFID system. The performance can be measured by Mat lab simulator. Time Based CSMA improves the tag read rate and also reduces the collision problem when compared to the conventional algorithm.

  8. Improving the efficiency of single and multiple teleportation protocols based on the direct use of partially entangled states

    Energy Technology Data Exchange (ETDEWEB)

    Fortes, Raphael; Rigolin, Gustavo, E-mail: rigolin@ifi.unicamp.br

    2013-09-15

    We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The three techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols.

  9. Improving the efficiency of single and multiple teleportation protocols based on the direct use of partially entangled states

    International Nuclear Information System (INIS)

    We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The three techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols

  10. A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation

    International Nuclear Information System (INIS)

    In order to transmit secure messages, a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented. The five-particle cluster state is used to detect eavesdroppers, and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol. In the security analysis, the entropy theory method is introduced, and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all the information, the detection rate of the original ping-pong protocol is 50%; the second protocol, using two particles of the Einstein-Podolsky-Rosen pair as detection particles, is also 50%; while the presented protocol is 89%. Finally, the security of the proposed protocol is discussed, and the analysis results indicate that the protocol in this paper is more secure than the other two. (authors)

  11. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Institute of Scientific and Technical Information of China (English)

    谢琪; 胡斌; 陈克非; 刘文浩; 谭肖

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency.

  12. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  13. A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States

    International Nuclear Information System (INIS)

    It is established that a single quantum cryptography protocol usually cooperates with other cryptographic systems, such as an authentication system, in the real world. However, few protocols have been proposed on how to combine two or more quantum protocols. To fill this gap, we propose a composed quantum protocol, containing both quantum identity authentication and quantum key distribution, using squeezed states. Hence, not only the identity can be verified, but also a new private key can be generated by our new protocol. We also analyze the security under an optimal attack, and the efficiency, which is defined by the threshold of the tolerant error rate, using Gaussian error function. (general)

  14. A study on the vibration-based self-monitoring capabilities of nano-enriched composite laminated beams

    Science.gov (United States)

    García, David; Trendafilova, Irina; Inman, Daniel J.

    2016-04-01

    This is an exploratory investigation on the self-sensing capabilities of nano-enriched glass/fibre laminates for damage detection purposes through changes in the dynamic responses, which are estimated by measuring the changes in voltage due to a dynamic strain. The deformation of the nano-enriched structure introduces changes in the resistance/voltage of the nanocomposites. The measured voltage signals contain information of the vibratory response of the laminated beam. This research uses a vibration-based data driven methodology for damage detection applied for the estimated vibratory signals using the conductivity properties of the embedded nano-particles. The structure considered in this study is a glass/fibre laminated beam enriched with carbon black nanoparticles (CB). The structure is subjected to a direct electric current and the voltage signal is measured. The vibration based monitoring method used is generally based on singular spectrum analysis applied on the estimated vibratory response. The voltage response signal is divided into a certain number of principal components which contain the oscillatory components distributed by their content of variance in the voltage signal. The components with more variance are used to define a reference state based on the status of the healthy structure. Consequently, the estimated vibratory signals from beams with a simulated damage are compared to the healthy state which eventually results in the damage detection procedure. The damage was simulated firstly by adding an additional mass on the beam tip and secondly by drilling a hole on the beam tip. The results demonstrate the potential for using the voltage estimated vibratory signals for self-sensing damage detection purposes in carbon nano-enriched glass/fibre structures.

  15. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    Directory of Open Access Journals (Sweden)

    Antonio A. F. Loureiro

    2013-02-01

    Full Text Available The Internet of Things (IoT is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  16. A routing protocol based on energy and link quality for Internet of Things applications.

    Science.gov (United States)

    Machado, Kássio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A F; Neto, Augusto; Souza, José Neuman de

    2013-01-01

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols. PMID:23385410

  17. Simulation Based Performance Comparison Of Various Routing Protocols In MANET Using Network Simulation Tool

    Directory of Open Access Journals (Sweden)

    Dr.K.Thangadurai

    2013-03-01

    Full Text Available A Mobile Ad hoc Network (MANET is a collection of wireless mobile nodes forming a network temporarily without any centralized administration of the mobile networks. Each node in MANET moves arbitrarily making the multi-hop network topology to change randomly at unpredictable times. Two nodes in such a network can communicate in a bidirectional manner if and only if the distance between them is at most the minimum of their transmission ranges. When a node wants to communicate with a node outside its transmission range, a multi-hop routing strategy is used which involves some intermediate nodes? Because of the movements of nodes, there is a constant possibility of topology change in MANET. There are several familiar routing protocols like DSDV, AODV, DSR, etc., Which have been proposed for providing communication among all the nodes in the network? This paper presents a performance comparison of proactive and reactive protocols AODV, DSDV and DSR based on metrics such as throughput, packet delivery ratio and average end-to-end delay by using the NS-2 simulator.

  18. Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

    Directory of Open Access Journals (Sweden)

    Ettefagh Azadeh

    2011-01-01

    Full Text Available Abstract It is known that multiuser multiple-input multiple-output (MIMO communication can enhance the performance of wireless networks. It can substantially increase the spectral efficiency of wireless networks by utilising multiuser interference rather than avoiding it. This paradigm shift has most impact on the medium access control (MAC protocol because most existing MAC protocols are designed to reduce the interference. In this article, we propose a novel cluster-based carrier sense multiple access with collision avoidance (CB-CSMA/CA scheme. The proposed scheme enables multiuser MIMO transmissions in wireless local area networks (WLANs by utilising the multiuser interference cancellation capability of the physical layer. In this article we focus on the performance analysis of CB-CSMA/CA. We investigate saturation throughput applying optimum backoff parameters and in the presence of synchronisation errors. Furthermore, we study the impact of different clustering methods on non-saturation throughput. We show that CB-CSMA/CA improves throughput significantly compared to the CSMA/CA scheme used in the IEEE 802.11 system. It is a promising approach for a variety of network configurations including typical infrastructure WLANs as well as many other wireless cooperative networks.

  19. A new Energy-Efficient TDMA-based MAC Protocol for Periodic Sensing Applications in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shams Ur Rahman

    2012-07-01

    Full Text Available Energy efficiency is a major requirement in wireless sensor networks. Media Access Control is one of the key areas where energy efficiency can be achieved by designing such MAC protocol that is tuned to the requirements of the sensor networks. Different applications have different requirements and a single MAC protocol cannot be optimal for all types of applications. In this paper we present a TDMA-based MAC (TDMAC protocol which is specially designed for such applications that require periodic sensing of the sensor field. TDMAC organizes nodes into clusters. Nodes send their data to their cluster head (CH and CHs forward it to the base station. CHs away from the base station use multi-hop communication by forwarding their data to CHs nearer than themselves to the base station. Both inter-cluster and intra-cluster communication is purely TDMA-based which effectively eliminates both inter-cluster as well as intra-cluster interference.

  20. Design and Evaluation of a New Fair Exchange Protocol Based on an Online TTP

    Directory of Open Access Journals (Sweden)

    Abdullah AlOtaibi

    2012-08-01

    Full Text Available Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and secured; they should protect both parties from fraudulent users and subsequently promote the growth of e-commerce. There are some protocols, known as fair exchange protocols, in e-commerce that are designed to guarantee fairness between the customer and the merchant so that neither party gains any advantage over the other. Therefore, in this paper, we introduce a new fair exchange protocol for trading products online between a buyer and a seller. The items to be exchanged in this protocol are a digital product and a payment. The following are the characteristics of this new protocol: (1 Dependency on a trusted third party is greatly reduced; further, the protocol also overcomes increased communication overheads and risks, hence leading to substantial improvement in the efficiency and practicality of the protocol. (2 The protocol ensures fairness for all parties and provides an internal dispute resolution mechanism, thereby guaranteeing that none of the parties involved in the transaction suffer unfairly in case one of the entities disappears before the transaction is formalized. (3 The protocol consists of three messages exchanged between the buyer (customer and the seller (merchant.

  1. Kernel-Based Semantic Relation Detection and Classification via Enriched Parse Tree Structure

    Institute of Scientific and Technical Information of China (English)

    Guo-Dong Zhou; Qiao-Ming Zhu

    2011-01-01

    This paper proposes a tree kernel method of semantic relation detection and classification (RDC) between named entities. It resolves two critical problems in previous tree kernel methods of RDC. First, a new tree kernel is presented to better capture the inherent structural information in a parse tree by enabling the standard convolution tree kernel with context-sensitiveness and approximate matching of sub-trees. Second, an enriched parse tree structure is proposed to well derive necessary structural information, e.g., proper latent annotations, from a parse tree. Evaluation on the ACE RDC corpora shows that both the new tree kernel and the enriched parse tree structure contribute significantly to RDC and our tree kernel method much outperforms the state-of-the-art ones.

  2. Recent developments of nanoparticle-based enrichment methods for mass spectrometric analysis in proteomics

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    In proteome research, rapid and effective separation strategies are essential for successful protein identification due to the broad dynamic range of proteins in biological samples. Some important proteins are often expressed in ultra low abundance, thus making the pre-concentration procedure before mass spectrometric analysis prerequisite. The main purpose of enrichment is to isolate target molecules from complex mixtures to reduce sample complexity and facilitate the subsequent analyzing steps. The introduction of nanoparticles into this field has accelerated the development of enrichment methods. In this review, we mainly focus on recent developments of using different nanomaterials for pre-concentration of low-abundance peptides/ proteins, including those containing post-translational modifications, such as phosphorylation and glycosylation, prior to mass spectrometric analysis.

  3. Is Job Enrichment Really Enriching?

    OpenAIRE

    Robert D. Mohr; Cindy Zoghi

    2006-01-01

    This study uses a survey of Canadian workers with rich, matched data on job characteristics to examine whether “enriched” job design, with features like quality circles, feedback, suggestion programs, and task teams, affects job satisfaction. We identify two competing hypotheses on the relationship between enriched jobs and job satisfaction. The “motivation hypothesis,” implies that enrichment will generally increase satisfaction and the “intensification hypothesis,” implies that enrichment m...

  4. Deterministic Secure Quantum Communication and Authentication Protocol based on Extended GHZ-W State and Quantum One-time Pad

    Science.gov (United States)

    Li, Na; Li, Jian; Li, Lei-Lei; Wang, Zheng; Wang, Tao

    2016-04-01

    A deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. In the protocol, state |φ -> is used as the carrier. One photon of |φ -> state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. Extended GHZ-W states are used as decoy photons, the positions of which in information sequence are encoded with identity string ID of the legal user, and the eavesdropping detection rate reaches 81%. The eavesdropping detection based on extended GHZ-W state combines with authentication and the secret ID ensures the security of the protocol.

  5. Deterministic Secure Quantum Communication and Authentication Protocol based on Extended GHZ-W State and Quantum One-time Pad

    Science.gov (United States)

    Li, Na; Li, Jian; Li, Lei-Lei; Wang, Zheng; Wang, Tao

    2016-08-01

    A deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. In the protocol, state | φ -> is used as the carrier. One photon of | φ -> state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. Extended GHZ-W states are used as decoy photons, the positions of which in information sequence are encoded with identity string ID of the legal user, and the eavesdropping detection rate reaches 81%. The eavesdropping detection based on extended GHZ-W state combines with authentication and the secret ID ensures the security of the protocol.

  6. Gene-Based Analysis of Regionally Enriched Cortical Genes in GWAS Data Sets of Cognitive Traits and Psychiatric Disorders

    DEFF Research Database (Denmark)

    Ersland, Kari M; Christoforou, Andrea; Stansberg, Christine;

    2012-01-01

    Despite its estimated high heritability, the genetic architecture leading to differences in cognitive performance remains poorly understood. Different cortical regions play important roles in normal cognitive functioning and impairment. Recently, we reported on sets of regionally enriched genes in...... three different cortical areas (frontomedial, temporal and occipital cortices) of the adult rat brain. It has been suggested that genes preferentially, or specifically, expressed in one region or organ reflect functional specialisation. Employing a gene-based approach to the analysis, we used the...... regionally enriched cortical genes to mine a genome-wide association study (GWAS) of the Norwegian Cognitive NeuroGenetics (NCNG) sample of healthy adults for association to nine psychometric tests measures. In addition, we explored GWAS data sets for the serious psychiatric disorders schizophrenia (SCZ) (n...

  7. Finite element solution of multi-scale transport problems using the least squares based bubble function enrichment

    CERN Document Server

    Yazdani, A

    2011-01-01

    This paper presents an optimum technique based on the least squares method for the derivation of the bubble functions to enrich the standard linear finite elements employed in the formulation of Galerkin weighted-residual statements. The element-level linear shape functions are enhanced with supplementary polynomial bubble functions with undetermined coefficients. The best least squares minimization of the residual functional obtained from the insertion of these trial functions into model equations results in an algebraic system of equations whose solution provides the unknown coefficients in terms of element-level nodal values. The normal finite element procedures for the construction of stiffness matrices may then be followed with no extra degree of freedom incurred as a result of such enrichment. The performance of the proposed method has been tested on a number of benchmark linear transport equations with the results compared against the exact and standard linear element solutions. It has been observed th...

  8. Uranium enrichment

    International Nuclear Information System (INIS)

    GAO was asked to address several questions concerning a number of proposed uranium enrichment bills introduced during the 100th Congress. The bill would have restructured the Department of Energy's uranium enrichment program as a government corporation to allow it to compete more effectively in the domestic and international markets. Some of GAO's findings discussed are: uranium market experts believe and existing market models show that the proposed DOE purchase of a $750 million of uranium from domestic producers may not significantly increase production because of large producer-held inventories; excess uranium enrichment production capacity exists throughout the world; therefore, foreign producers are expected to compete heavily in the United States throughout the 1990s as utilities' contracts with DOE expire; and according to a 1988 agreement between DOE's Offices of Nuclear Energy and Defense Programs, enrichment decommissioning costs, estimated to total $3.6 billion for planning purposes, will be shared by the commercial enrichment program and the government

  9. A Secure Time-Stamp Based Concurrency Control Protocol For Distributed Databases

    Directory of Open Access Journals (Sweden)

    Shashi Bhushan

    2007-01-01

    Full Text Available In distributed database systems the global database is partitioned into a collection of local databases stored at different sites. In this era of growing technology and fast communication media, security has an important role to play. In this paper we presented a secure concurrency control protocol (SCCP based on the timestamp ordering, which provides concurrency control and maintains security. We also implemented SCCP and a comparison of SCCP is presented in three cases (High, Medium and Low security levels. In this experiment, It is observed that throughput of the system decreases as the security level of the transaction increases, i.e., there is tradeoff between the security level and the throughput of the system.

  10. Evaluation of imaging protocol for ECT based on CS image reconstruction algorithm

    CERN Document Server

    Zhou, Xiaolin; Cao, Xuexiang; Liu, Shuangquan; Wang, Lu; Huang, Xianchao; Wei, Long

    2013-01-01

    SPECT (Single-photon Emission Computerized Tomography) and PET (Positron Emission Tomography) are essential medical imaging tools, for which the sampling angle number, scan time should be chosen carefully to compromise between image quality and the radiopharmaceutical dose. In this study, the image quality of different acquisition protocol was evaluated via varied angle number and count number per angle with Monte Carlo simulation data. It was shown that when similar imaging counts were used, the factor of acquisition counts was more important than that of the sampling number in ECT (Emission Computerized Tomography). To further reduce the activity requirement and the scan duration, an iterative image reconstruction algorithm for limited-view and low-dose tomography based on compressed sensing theory has been developed. The total variation regulation was added in the reconstruction process to improve SNR (Signal to Noise Ratio) and reduce the artifacts caused by the limited angle sampling. Maximization of max...

  11. Strong Password Based EAP-TLS Authentication Protocol for WiMAX

    Directory of Open Access Journals (Sweden)

    Anjani K.Rai,

    2010-11-01

    Full Text Available Security becomes more important in wireless network due to lack of physical boundary. Worldwide interoperability for microwave access (WiMAX is a wireless communications technology, also known as IEEE802.16 that is intended for wireless “metropolitan area network”. IEEE802.16e (WiMAX amendment is a standard for mobile application in WiMAX. IEEE 802.16e supports EAP (Extensible authentication protocolfor authentication. EAP-TLS which is a recommendation of IEEE802.16e provides strongest security but is inefficient and costly due to use of PKI to handle the certificate. This paper proposed a strong password based EAP-TLS authentication protocol which uses simple common password for mutual authentication in place of certificate and hence reduces the problem associated with EAP-TLS and satisfy the entire requirement for IEEE 802.16e authentication.

  12. A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWORD BASED AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    Velumadhava Rao R

    2013-02-01

    Full Text Available Providing security in group communication is more essential in this new network environment. Authentication and Confidentiality are the major concerns in secure group communication. Our proposed approach uses an authenticated group key transfer protocol that relies on trusted key generation center (KGC. KGC computes group pair for each individual and transport the pair of values to all group members in a secured manner. Password based authentication mechanism is used to avoid the illegal member access in a group Also, the proposed approach facilitates efficient key computation technique such that only authorized group members will be able to computer and retrieve the secret key and unauthorized members cannot retrieve the key. The proposed algorithm is more efficient and relies on NP class. In addition, the distribution of key is also safe and secure. Moreover, the pair generated for the computation of key is also very strong since the cryptographic techniques are used which provides efficient computation.

  13. The first protocol of stable isotope ratio assessment in tumor tissues based on original research.

    Science.gov (United States)

    Taran, Katarzyna; Frączek, Toma; Kamiński, Rafal; Sitkiewicz, Anna; Kobos, Jozef; Paneth, Piotr

    2015-09-01

    Thanks to proteomics and metabolomics, for the past several years there has been a real explosion of information on the biology of cancer, which has been achieved by spectroscopic methods, including mass spectrometry. These modern techniques can provide answers to key questions about tissue structure and mechanisms of its pathological changes. However, despite the thousands of spectroscopic studies in medicine, there is no consensus on issues ranging from the choice of research tools, acquisition and preparation of test material to the interpretation and validation of the results, which greatly reduces the possibility of transforming the achieved knowledge to progress in the treatment of individual patients. The aim of this study was to verify the utility of isotope ratio mass spectrometry in the evaluation of tumor tissues. Based on experimentation on animal tissues and human neoplasms, the first protocol of stable isotope ratio assessment of carbon and nitrogen isotopes in tumor tissues was established. PMID:26619108

  14. Artificial Bee Colony based Energy Aware and Energy Efficient Routing Protocol

    Directory of Open Access Journals (Sweden)

    J. Janet

    2012-01-01

    Full Text Available Problem statement: Network becomes very important technology in the day to day life style of modern computer era, in which the wireless communication become very popular for the last few years. In the same manner, the other wireless network, i.e., ado network is very popular among the researchers in the past few decades. Approach: The Ad hoc networks are defined as a multi-hop radio relaying and are capable of operating without the support of any fixed infrastructure. Identification of optimal route for data communication, efficient utilization of energy, clustering, providing congestion free communication, offering scalability, maintaining the Quality of Service (QoS are few research issues in the Adhoc Network. Results: This study is focusing the review of current research and the requirements, characteristics and design of wireless ado routing protocol. Conclusion: The results of the proposed work show that the proposed swarm intelligence based algorithm will provide optimality than existing systems.

  15. VANET Broadcast Protocol Based on Fuzzy Logic and Lightweight Retransmission Mechanism

    Science.gov (United States)

    Wu, Celimuge; Ohzahata, Satoshi; Kato, Toshihiko

    Vehicular ad hoc networks have been attracting the interest of both academic and industrial communities on account of their potential role in Intelligent Transportation Systems (ITS). However, due to vehicle movement and fading in wireless communications, providing a reliable and efficient multi-hop broadcast service in vehicular ad hoc networks is still an open research topic. In this paper, we propose FUZZBR (FUZZy BRoadcast), a fuzzy logic based multi-hop broadcast protocol for information dissemination in vehicular ad hoc networks. FUZZBR has low message overhead since it uses only a subset of neighbor nodes to relay data messages. In the relay node selection, FUZZBR jointly considers multiple metrics of inter-vehicle distance, node mobility and signal strength by employing the fuzzy logic. FUZZBR also uses a lightweight retransmission mechanism to retransmit a packet when a relay fails. We use computer simulations to evaluate the performance of FUZZBR.

  16. Architecture Design and Experimental Platform Demonstration of Optical Network based on OpenFlow Protocol

    Science.gov (United States)

    Xing, Fangyuan; Wang, Honghuan; Yin, Hongxi; Li, Ming; Luo, Shenzi; Wu, Chenguang

    2016-02-01

    With the extensive application of cloud computing and data centres, as well as the constantly emerging services, the big data with the burst characteristic has brought huge challenges to optical networks. Consequently, the software defined optical network (SDON) that combines optical networks with software defined network (SDN), has attracted much attention. In this paper, an OpenFlow-enabled optical node employed in optical cross-connect (OXC) and reconfigurable optical add/drop multiplexer (ROADM), is proposed. An open source OpenFlow controller is extended on routing strategies. In addition, the experiment platform based on OpenFlow protocol for software defined optical network, is designed. The feasibility and availability of the OpenFlow-enabled optical nodes and the extended OpenFlow controller are validated by the connectivity test, protection switching and load balancing experiments in this test platform.

  17. Protocol for the prevention and management of complications related to ADM implant-based breast reconstructions.

    Science.gov (United States)

    Citron, Isabelle; Dower, Rory; Ho-Asjoe, Mark

    2016-01-01

    Acellular dermal matrix (ADM) implant-based reconstructions have transformed direct-to-implant breast reconstruction (DTI). But like all surgery, it is not deplete of complications such as seroma, infections and wound healing problems. These are cited with varying frequencies in the literature. With increased experience and through a series of measures instituted to minimize complications, we have been able to improve outcomes for our patients. We report our technical refinements for prevention of ADM reconstruction associated complications including patient selection, implant selection, drains, dressing and our post operative antibiotic regime. We also outline our protocol for the management of ADM associated complications including seroma, simple and complex infection and red breast syndrome, such that the sequelae of complications are minimized and patients achieve a better long-term outcome. PMID:26816672

  18. Protocol for the prevention and management of complications related to ADM implant-based breast reconstructions

    Directory of Open Access Journals (Sweden)

    Citron, Isabelle

    2016-01-01

    Full Text Available Acellular dermal matrix (ADM implant-based reconstructions have transformed direct-to-implant breast reconstruction (DTI. But like all surgery, it is not deplete of complications such as seroma, infections and wound healing problems. These are cited with varying frequencies in the literature. With increased experience and through a series of measures instituted to minimize complications, we have been able to improve outcomes for our patients. We report our technical refinements for prevention of ADM reconstruction associated complications including patient selection, implant selection, drains, dressing and our post operative antibiotic regime. We also outline our protocol for the management of ADM associated complications including seroma, simple and complex infection and red breast syndrome, such that the sequelae of complications are minimized and patients achieve a better long-term outcome.

  19. Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues

    CERN Document Server

    Headayetullah, Md

    2010-01-01

    Improved interoperability between public and private organizations is of key significance to make digital government newest triumphant. Digital Government interoperability, information sharing protocol and security are measured the key issue for achieving a refined stage of digital government. Flawless interoperability is essential to share the information between diverse and merely dispersed organisations in several network environments by using computer based tools. Digital government must ensure security for its information systems, including computers and networks for providing better service to the citizens. Governments around the world are increasingly revolving to information sharing and integration for solving problems in programs and policy areas. Evils of global worry such as syndrome discovery and manage, terror campaign, immigration and border control, prohibited drug trafficking, and more demand information sharing, harmonization and cooperation amid government agencies within a country and acros...

  20. Reliable beacon transmission based MAC protocol for LR-WPANs over WLAN interferences

    Institute of Scientific and Technical Information of China (English)

    Ji-Hoon PARK; Byung-Seo KIM

    2014-01-01

    The use of IEEE 802.15.4 standard based application systems has been rapidly increasing, for example, in medical services, sensor networks, public safety systems, and home automation systems. However, issues arise from the fact that IEEE 802.15.4 standard based low rate wireless personal area networks (LR-WPANs) use the same frequency bands as wireless local area networks (WLANs), and they interfere with each other. Based on past research on this issue, the interference has a more serious impact on LR-WPANs’ performance than on WLANs’ performance. In this paper we propose a method to improve LR-WPANs’ performance while coexisting with WLANs, which is called the reliable beacon transmission based medium access control (MAC) protocol. Since the reliability of a beacon frame is important, in this method, only the beacon frame is transmitted in interference-free channels, and the data packets are transmitted in interfered channels instead of abandoning the channels altogether. This method increases the reliability of beacon frames as well as overall channel utilizations. The effectiveness of the proposed method was evaluated through extensive simulations, and this paper proves that this method improves the performance of IEEE 802.15.4 based wireless sensor networks (WSNs) over WLANs’ interferences.

  1. L-Lactate-selective microbial sensor based on flavocytochrome b2-enriched yeast cells using recombinant and nanotechnology approaches.

    Science.gov (United States)

    Karkovska, Maria; Smutok, Oleh; Stasyuk, Nataliya; Gonchar, Mykhailo

    2015-11-01

    In the recent years, nanotechnology is the most developing branch due to a wide variety of potential applications in biomedical, biotechnological and agriculture fields. The binding nanoparticles with various biological molecules makes them attractive candidates for using in sensor technologies. The particularly actual is obtaining the bionanomembranes based on biocatalytic elements with improved sensing characteristics. The aim of this investigation is to study the properties of microbial L-lactate-selective sensor based on using the recombinant Hansenula polymorpha yeast cells overproducing flavocytochrome b2 (FC b2), as well as additionally enriched by the enzyme bound with gold nanoparticles (FC b2-nAu). Although, the high permeability of the living cells to nanoparticles is being intensively studied (mostly for delivery of drugs), the idea of using both recombinant technology and nanotechnology to increase the amount of the target enzyme in the biosensing layer is really novel. The FC b2-nAu-enriched living and permeabilized yeast cells were used for construction of a bioselective membrane of microbial L-lactate-selective amperometric biosensor. Phenazine methosulphate was served as a free defusing electron transfer mediator which provides effective electron transfer from the reduced enzyme to the electrode surface. It was shown that the output to L-lactate of FC b2-nAu-enriched permeabilized yeast cells is 2.5-fold higher when compared to the control cells. The obtained results confirm that additional enrichment of the recombinant yeast cell by the enzyme bound with nanoparticles improves the analytical parameters of microbial sensor. PMID:26452947

  2. Validation of a novel cognitive bias task based on difference in quantity of reinforcement for assessing environmental enrichment.

    Science.gov (United States)

    Keen, Heidi A; Nelson, O Lynne; Robbins, Charles T; Evans, Marc; Shepherdson, David J; Newberry, Ruth C

    2014-05-01

    Cognitive bias tasks purport to assess affective states via responses to ambiguous stimuli. We hypothesized that a novel cognitive bias task based on positive reinforcement using quantity differences would detect changes in affect in captive grizzly bears (Ursus arctos horribilis). We trained bears (n = 8) to respond differently (nose or paw touch) to two stimuli (light or dark gray cue cards), with responses counterbalanced across bears. The two cues signaled a small or large food reward, respectively. Responses to ambiguous probe stimuli (i.e., shades of gray) intermediate to the trained stimuli were classified as either 'optimistic,' appropriate for the larger reward, or 'pessimistic,' appropriate for the smaller reward. In Experiment 1, we explored the contrast in reward size necessary to detect a change in response across probe stimuli (large reward, 3 or 6 apple slices: small reward, 1 slice). We observed a change in response across probe stimuli, with no difference in response between reward-value groups, indicating that a contrast of 3:1 apple slices was sufficient to affect responses. In Experiment 2, we investigated cognitive bias after 2.1 h of exposure to enrichment items varying in attractiveness. Results were unaffected by enrichment type or time spent interacting with enrichments, indicating that the task failed to demonstrate criterion validity for comparing mood following exposure to different enrichment items. However, greater time spent pacing prior to testing was associated with 'optimistic' judgments. The data provide some support for use of cognitive bias tasks based on quantity differences in animal welfare assessments involving captive wildlife. PMID:24045850

  3. A Reliable Data Collection Protocol Based on Erasure-Resilient Code in Asymmetric Wireless Sensor Networks

    OpenAIRE

    Jian-Jun Lei; Taehyun Park; Gu-In Kwon

    2013-01-01

    This paper presents RECPE, a reliable collection protocol for aggregating data packets from all the sensor nodes to the sink in a large-scale WSN (wireless sensor network). Unlike some well-known reliable data collection protocols such as CTP (Collection Tree Protocol) that uses ETX (expected transmission count) as the routing metric, RECPE exploits ETF (expected transmission count over forward links) to construct a one-way collection tree, which avoids missing some good routes and reduces th...

  4. Assessment of the clinical outcome of a symptom-based outpatient hyperglycemia protocol

    OpenAIRE

    Armor, Becky; Harrison, Don; Lawler, Frank

    2011-01-01

    Introduction Acute hyperglycemia (blood glucose [BG] ≥400 mg/dL) is common in primary care. An outpatient protocol was developed to streamline the treatment of acute hyperglycemia. The objective was to determine if an outpatient hyperglycemia protocol could achieve a BG level of 400 mg/dL) without acute illness were recruited. Enrolled patients were managed with a protocol that included administration of 0.15 units/kg rapid-acting insulin given subcutaneously, hydration, hourly fingerstick bl...

  5. Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael

    2014-01-01

    pragmatic annotations for automated code generation of protocol software. The contribution of this paper is an application of the approach as implemented in the PetriCode tool to obtain protocol software implementing the IETF WebSocket protocol. This demonstrates the scalability of our approach to real...... protocols. Furthermore, we perform formal verification of the CPN model prior to code generation, and test the implementation for interoperability against the Autobahn WebSocket test-suite resulting in 97% and 99% success rate for the client and server implementation, respectively. The tests show that the...

  6. A Dynamic CFP Allocation and Opportunity Contention-Based WBAN MAC Protocol

    Science.gov (United States)

    Seo, Young-Sun; Kim, Dae-Young; Cho, Jinsung

    WBANs provide communication services in the vicinity of the human body. Since WBANs utilize both MICS frequency band for implant medical applications and ISM frequency band for medical and consumer electronics (CE) applications, MAC protocols in WBAN should be designed considering flexibility between medical and CE applications. In this letter, we identify the requirements of WBAN MAC protocols and propose a WBAN MAC protocol which satisfies the requirements. In order to provide transmission flexibility for various applications, we present the dynamic CFP allocation and opportunity period. Extensive simulation results show that the proposed protocol achieves improved throughput and latency in WBAN environment compared with IEEE 802.15.4.

  7. A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme

    Institute of Scientific and Technical Information of China (English)

    XU Shu-Jiang; CHEN Xiu-Bo; NIU Xin-Xin; YANG Yi-Xian

    2013-01-01

    By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol,we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information.On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent,a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security.The performance,including the imperceptibility,capacity and security of the proposed protocol are analyzed in detail.

  8. Centrifuge enrichment plants. January 1970-October 1988 (Citations from the NTIS data base). Report for January 1970-October 1988

    International Nuclear Information System (INIS)

    This bibliography contains citations concerning the design, control, monitoring, and safety of centrifuge enrichment plants. Power supplies, enrichment plant safeguards, facility design, cascade heater test loops to monitor the enrichment process, inspection strategies, and the socio-economic effects of centrifuge enrichment plants are examined. Radioactive waste disposal problems are briefly considered. (Contains 151 citations fully indexed and including a title list.)

  9. Uranium enrichment

    International Nuclear Information System (INIS)

    Canada is the world's largest producer and exporter of uranium, most of which is enriched elsewhere for use as fuel in LWRs. The feasibility of a Canadian uranium-enrichment enterprise is therefore a perennial question. Recent developments in uranium-enrichment technology, and their likely impacts on separative work supply and demand, suggest an opportunity window for Canadian entry into this international market. The Canadian opportunity results from three particular impacts of the new technologies: 1) the bulk of the world's uranium-enrichment capacity is in gaseous diffusion plants which, because of their large requirements for electricity (more than 2000 kW·h per SWU), are vulnerable to competition from the new processes; 2) the decline in enrichment costs increases the economic incentive for the use of slightly-enriched uranium (SEU) fuel in CANDU reactors, thus creating a potential Canadian market; and 3) the new processes allow economic operation on a much smaller scale, which drastically reduces the investment required for market entry and is comparable with the potential Canadian SEU requirement. The opportunity is not open-ended. By the end of the century the enrichment supply industry will have adapted to the new processes and long-term customer/supplier relationships will have been established. In order to seize the opportunity, Canada must become a credible supplier during this century

  10. Safety Issues Related to Production of Fission-based Mo-99 by Using Low Enriched Uranium (LEU)

    International Nuclear Information System (INIS)

    Technetium-99m (Tc-99m) is the daughter element of Molybdenum-99 (Mo-99) and is work horse of modern nuclear diagnostic. More than 80% (.30 million patients with a growth rate of 1% to 2%) of the world-wide nuclear diagnostic imaging procedures are being carried out by using Tc-99m. Mo-99 can be produced either by reactor-based technology or by accelerator-based technology. Cross sections for reactor and accelerator based technologies are shown in Table 1. Keeping in view the above results, the fission-based option remains an appropriate option for production of Mo-99 on commercial scale. In order to produce fission-based Mo-99 from research reactors two types of targets are being developed and irradiated: HEU with U-235 enrichments more than 90 wt% of U-235 and LEU with U-235 enrichments less than 20wt% of U-235. It is worth noting that medium enriched uranium i.e. 36wt% of U-235 as being used in South Africa is also regarded as non-LEU from the nuclear security point of view. The purpose of this review was to look into the comparative studies of the LEU and HEU targets as well as to discuss and compile the safety issues related to irradiation and processing of LEU targets. Mo-99 production from LEU targets comparable to HEU targets will need more targets, more irradiation facilities, appropriate transportation for large number of irradiated targets and processing facilities capable of holding more liquid and solid waste in comparison to HEU process facilities. The production of radioactive waste is inadvertent however; its impact can be lessened by adopting effective waste storage, monitoring and disposal strategies

  11. Iron oxide nanoparticle coating of organic polymer-based monolithic columns for phosphopeptide enrichment

    Czech Academy of Sciences Publication Activity Database

    Křenková, Jana; Foret, František

    2011-01-01

    Roč. 34, 16-17 (2011), s. 2106-2112. ISSN 1615-9306 R&D Projects: GA ČR(CZ) GAP301/11/2055; GA ČR(CZ) GPP206/11/P004 Grant ostatní: Jihomoravský kraj(CZ) 2SGA2721 Institutional research plan: CEZ:AV0Z40310501 Keywords : iron oxide nanoparticles * monolithic column * phosphopeptide enrichment Subject RIV: CB - Analytical Chemistry, Separation Impact factor: 2.733, year: 2011

  12. Potential seaweed-based food ingredients to inhibit lipid oxidation in fish-oil-enriched mayonnaise

    DEFF Research Database (Denmark)

    Honold, Philipp; Jacobsen, Charlotte; Jónsdóttir, Rósa;

    2016-01-01

    partitioning between water and octanol. Additionally, the antioxidant activity of the extracts was evaluated in a fish-oil-enriched mayonnaise. Acetone and ethanol were found to extract the highest amount of phenolic compounds and carotenoids. Water used as extraction solvent, extracted some phenolic compounds...... but also higher amount of metals and chlorophyll derivates. It was proposed that extracts with high phenolic content and low iron content, such as the acetone and ethanol extract, would have the highest potential as antioxidants in foods. This was confirmed in the storage trial, where these extracts...

  13. An Improved Location aided Cluster Based Routing Protocol with Intrusion Detection System in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S. Mangai

    2011-01-01

    Full Text Available Problem statement: Routing and security are the main challenges for ad hoc networks due to dynamic topology as well as resource constraints. A designed protocol must provide scalable routing with better security. Lack of any central coordination and shared wireless medium makes them more vulnerable to attacks than wired networks. And also resource constraints such as limited energy and size also play an important role in the protocols designed for security. Approach: In this study, Improved Location aided Cluster based Routing Protocol (ILCRP for GPS enabled MANETs was analysed in MANETs with malicious nodes and an Intrusion Detection System was used to increase the packet delivery ratio. ILCRP makes use of location aided routing in the presence of cluster based routing Protocol. Results: Use of location information with security against attacks results in high packet delivery ratio for the cluster based routing protocol. Simulations are performed using NS2 by varying the number of nodes. Conclusion: The results illustrate ILCRP provides higher delivery ratio with IDS.

  14. Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment

    OpenAIRE

    Byunggil Lee; Namje Park

    2014-01-01

    International Association of Lighthouse Authorities (IALA) is developing the standard intersystem VTS exchange format (IVEF) protocol for exchange of navigation and vessel information between VTS systems and between VTS and vessels. VTS (vessel traffic system) is an important marine traffic monitoring system which is designed to improve the safety and efficiency of navigation and the protection of the marine environment. And the demand of Inter-VTS networking has been increased for realizatio...

  15. Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations

    Science.gov (United States)

    Chamberlain, jim; Bradford, Bob; Best, Susan; Nichols, Kelvin

    2002-01-01

    Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to per orm scientific experiments on-board ISS. The deployment of reliable high-speed Internet Protocol (IP)-based networks promises to greatly enhance telescience capabilities. These networks are now being used to cost-effectively extend the reach of remote mission support systems. They reduce the need for dedicated leased lines and travel while improving distributed workgroup collaboration capabilities. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing mission voice communications system used by researchers at their remote sites. The Internet Voice Distribution System (IVoDS) connects remote researchers to mission support "loopsll or conferences via NASA networks and Internet 2. Researchers use NODS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the ;capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors & Technology, First Virtual Communications, Lockheed-Martin, and VoIP Group. NODS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is being performed in parallel with IVoDS deployment for a next-generation system to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data/application-sharing capabilities are being investigated. IVoDS technology is also being considered for mission support systems for programs such as Space Launch Initiative and Homeland Defense.

  16. Hybrid CDN structure with a P2P based streaming protocol

    CERN Document Server

    Pushp, Saumay

    2010-01-01

    Over the last decade, internet has seen an exponential increase in its growth.With more and more people using it, efficient data delivery over the internet has become a key issue. Peer-to-peer (P2P)/seed sharing based networks have several desirable features for content distribution, such as low costs, scalability, and fault tolerance. While the invention of each of such specialized systems has improved the user experience, some fundamental shortcomings of these systems have often been neglected. These shortcomings of content distribution systems have become severe bottlenecks in scalability of the internet.In order to combine the desired features of classical Content Distribution Networks (CDNs) and P2P/seed sharing based networks, we propose a hybrid CDN structure with a P2P/seed sharing based streaming protocol in the access network . In this work, we focus on the problem of data redundancy (at each node) and show how severely it impacts the network economics and the experience of end-user and hence leads ...

  17. A Joint Beamforming based SDMA Protocol for IEEE 802.11n Downlink

    Directory of Open Access Journals (Sweden)

    Cheng Guo

    2015-09-01

    Full Text Available To support space division multiple access (SDMA in the IEEE 802.11n downlink, a joint beamforming based MAC protocol, J-MAC is presented in this paper. An access point (AP follows J-MAC, which employs multiple array antennas, and user equipments (UEs follow the IEEE 802.11x standard which employ omni-directional MIMO antennas. J-MAC maintains full compatibility with 802.11x, and UEs do not change any more. In J-MAC, firstly, the AP achieves the weight vector for the array antenna-based beamforming, and updates it periodically. Secondly, before transmitting any data-frame, the AP achieves the weight vector for the MIMO-based beamforming, which should be updated in each transmission. Finally, after getting the joint beamforming, the AP transmits its data-frames to multiple UEs simultaneously. Simulation results show that J-MAC can support the joint beamforming effectively and provide much higher network throughput, lower delay, jitter and packet-loss-rate than DCF does.

  18. Enantiomorphous Periodic Mesoporous Organosilica-Based Nanocomposite Hydrogel Scaffolds for Cell Adhesion and Cell Enrichment.

    Science.gov (United States)

    Kehr, Nermin Seda

    2016-03-14

    The chemical functionalization of nanomaterials with bioactive molecules has been used as an effective tool to mimic extracellular matrix (ECM) and to study the cell-material interaction in tissue engineering applications. In this respect, this study demonstrates the use of enantiomerically functionalized periodic mesoporous organosilicas (PMO) for the generation of new multifunctional 3D nanocomposite (NC) hydrogels to control the affinity of cells to the hydrogel surfaces and so to control the enrichment of cells and simultaneous drug delivery in 3D network. The functionalization of PMO with enantiomers of bioactive molecules, preparation of their nanocomposite hydrogels, and the stereoselective interaction of them with selected cell types are described. The results show that the affinity of cells to the respective NC hydrogel scaffolds is affected by the nature of the biomolecule and its enantiomers, which is more pronounced in serum containing media. The differentiation of enantiomorphous NC hydrogels by cells is used to enrich one cell type from a mixture of two cells. Finally, PMO are utilized as nanocontainers to release two different dye molecules as a proof of principle for multidrug delivery in 3D NC hydrogel scaffolds. PMID:26811946

  19. ExtraPEG: A Polyethylene Glycol-Based Method for Enrichment of Extracellular Vesicles

    Science.gov (United States)

    Rider, Mark A.; Hurwitz, Stephanie N.; Meckes, David G.

    2016-01-01

    Initially thought to be a means for cells to eliminate waste, secreted extracellular vesicles, known as exosomes, are now understood to mediate numerous healthy and pathological processes. Though abundant in biological fluids, purifying exosomes has been challenging because their biophysical properties overlap with other secreted cell products. Easy-to-use commercial kits for harvesting exosomes are now widely used, but the relative low-purity and high-cost of the preparations restricts their utility. Here we describe a method for purifying exosomes and other extracellular vesicles by adapting methods for isolating viruses using polyethylene glycol. This technique, called ExtraPEG, enriches exosomes from large volumes of media rapidly and inexpensively using low-speed centrifugation, followed by a single small-volume ultracentrifugation purification step. Total protein and RNA harvested from vesicles is sufficient in quantity and quality for proteomics and sequencing analyses, demonstrating the utility of this method for biomarker discovery and diagnostics. Additionally, confocal microscopy studies suggest that the biological activity of vesicles is not impaired. The ExtraPEG method can be easily adapted to enrich for different vesicle populations, or as an efficient precursor to subsequent purification techniques, providing a means to harvest exosomes from many different biological fluids and for a wide variety of purposes. PMID:27068479

  20. Energy-Efficient Reservation-Based Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kohvakka Mikko

    2010-01-01

    Full Text Available In Wireless Sensor Networks (WSNs, a robust and energy-efficient Medium Access Control (MAC protocol is required for high energy efficiency in harsh operating conditions, where node and link failures are common. This paper presents the design of a novel MAC protocol for low-power WSNs. The developed MAC protocol minimizes the energy overhead of idle time and collisions by strict frame synchronization and slot reservation. It combines a dynamic bandwidth adjustment mechanism, multi-cluster-tree network topology, and a network channel allowing rapid and low-energy neighbor discoveries. The protocol achieves high scalability by employing frequency and time division between clusters. Performance analysis shows that the MAC protocol outperforms current state-of-the-art protocols in energy efficiency, and the energy overhead compared to an ideal MAC protocol is only 2.85% to 27.1%. The high energy efficiency is achieved in both leaf and router nodes. The models and the feasibility of the protocol were verified by simulations and with a full-scale prototype implementation.

  1. Validating Knowledge-Based Framework through Mission-Oriented Sensors Array and Smart Sensor Protocol

    Science.gov (United States)

    Rodrigues, Douglas; Pires, Rayner M.; Branco, Kalinka R. L. J. C.

    2015-09-01

    This paper addresses the problem of using Service-Oriented Architecture (SOA) in critical embedded systems, mainly in Unmanned Aerial Vehicles (UAVs). We present the use of a SOA approach to provide the integration of the payload in the UAV. The integration is provided by a plug and play protocol named Smart Sensor Protocol (SSP) that validates the SOA approach.

  2. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten; Kobayashi, Naoki; Sun, Yunde;

    2011-01-01

    Gordon and Jeffrey developed a type system for verification of asymmetric and symmetric cryptographic protocols. We propose a modified version of Gordon and Jeffrey's type system and develop a type inference algorithm for it, so that protocols can be verified automatically as they are, without an...

  3. Modified calibration protocol evaluated in a model-based testing of SBR flexibility

    DEFF Research Database (Denmark)

    Corominas, Lluís; Sin, Gürkan; Puig, Sebastià; Balaguer, Maria Dolors; Vanrolleghem, Peter A.; Colprim, Jesús

    2011-01-01

    The purpose of this paper is to refine the BIOMATH calibration protocol for SBR systems, in particular to develop a pragmatic calibration protocol that takes advantage of SBR information-rich data, defines a simulation strategy to obtain proper initial conditions for model calibration and provide...

  4. HybridDock: A Hybrid Protein-Ligand Docking Protocol Integrating Protein- and Ligand-Based Approaches.

    Science.gov (United States)

    Huang, Sheng-You; Li, Min; Wang, Jianxin; Pan, Yi

    2016-06-27

    Structure-based molecular docking and ligand-based similarity search are two commonly used computational methods in computer-aided drug design. Structure-based docking tries to utilize the structural information on a drug target like protein, and ligand-based screening takes advantage of the information on known ligands for a target. Given their different advantages, it would be desirable to use both protein- and ligand-based approaches in drug discovery when information for both the protein and known ligands is available. Here, we have presented a general hybrid docking protocol, referred to as HybridDock, to utilize both the protein structures and known ligands by combining the molecular docking program MDock and the ligand-based similarity search method SHAFTS, and evaluated our hybrid docking protocol on the CSAR 2013 and 2014 exercises. The results showed that overall our hybrid docking protocol significantly improved the performance in both binding affinity and binding mode predictions, compared to the sole MDock program. The efficacy of the hybrid docking protocol was further confirmed using the combination of DOCK and SHAFTS, suggesting an alternative docking approach for modern drug design/discovery. PMID:26317502

  5. Base station MAC with APRMA protocol for broadband multimedia ATM in micro/pico-cellular mobile networks

    DEFF Research Database (Denmark)

    Le, Khanh Hoang; Nielsen, Søren Nørskov; Dittmann, Lars;

    1998-01-01

    principles and the performance of this protocol are discussed. A channel efficiency of more than 70% and a mean cell transfer delay of less than 17 cells are obtained in the range of 1-50 simultaneously connected users even with bursty traffic. For this, the cell dropping rate is kept below 10-9 when the......The concept for a wireless ATM access system that enables seamless mobile connectivity to the B-ISDN is presented. It is based on small, low cost and intelligent base stations running a medium access control (MAC) protocol using adaptive packet reservation multiple access (APRMA). Both the...... mobile terminals use buffer lengths of only 200-300 cells. The different components of this access system are currently under implementation and the MAC unit has been successfully implemented for a 32 Mbit/s wireless channel supporting 25 Mbit/s ATM introducing only 22% of protocol overhead...

  6. Development and Verification of Simulation Model Based on Real MANET Experiments for Transport Layer Protocols (UDP and TCP)

    Institute of Scientific and Technical Information of China (English)

    Joarder Mohammad Mustafa Kamal; Mohammad Shahidul Hasan; Alison L.Griffiths; Hongnian Yu

    2013-01-01

    There is a lack of appropriate guidelines for realistic user traces,mobility models,routing protocols,considerations of real-life challenges,etc.for general-purpose mobile ad hoc networks (MANET).In this paper,four laptops are used in an open field environment in four scenarios to evaluate the performances of Internet control message protocol (ICMP) based ping and transmission control protocol (TCP) based streaming video applications using optimised link state routing (OLSR) implementation in an IEEE 802.11g wireless network.Corresponding simulations are developed in Network Simulator ns-2 by setting simulation parameters according to the real experiments.Difficulties faced to regenerate real-life scenarios have been discussed and the gaps between reality and simulation are identified.A setup guideline to produce realistic simulation results has been established.

  7. Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael

    2014-01-01

    protocols. Furthermore, we perform formal verification of the CPN model prior to code generation, and test the implementation for interoperability against the Autobahn WebSocket test-suite resulting in 97% and 99% success rate for the client and server implementation, respectively. The tests show that the...... pragmatic annotations for automated code generation of protocol software. The contribution of this paper is an application of the approach as implemented in the PetriCode tool to obtain protocol software implementing the IETF WebSocket protocol. This demonstrates the scalability of our approach to real...... cause of test failures were mostly due to local and trivial errors in newly written code-generation templates, and not related to the overall logical operation of the protocol as specified by the CPN model....

  8. Energy efficient TDMA-based MAC protocol associated with GAF for wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    XIAO Xiao; ZHENG Bao-yu; YAN Zhen-ya; CHEN Chao

    2007-01-01

    The design of media access control (MAC) protocol for wireless sensor networks (WSNs) with the idea of cross layer attracts more and more attention. People can improve the MAC protocol by obtaining certain information regarding the network layer and physical layer. This article synthesizes and optimizes certain cross-layer protocols which have existed. On the basis of the routing, topology information in the network layer, and transmission power information in the physical layer, the time slot assignment algorithm has been improved in the MAC layer.By using geographical adaptive fidelity algorithm (GAF) to divide the grids, controlling of transmission power and scheduling the work/sleep duty cycle for sensor nodes, a new MAC protocol has been proposed to decrease energy consumption and enlarge the lifetime of WSNs. Simulation results show that the MAC protocol functions well.

  9. Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach

    CERN Document Server

    Kuesters, Ralf

    2008-01-01

    In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils down to solving the derivation problem for Horn theories. This approach and the tools based on this approach, including ProVerif, have been very successful in the automatic analysis of cryptographic protocols w.r.t. an unbounded number of sessions. However, dealing with the algebraic properties of operators such as the exclusive OR (XOR) has been problematic. In particular, ProVerif cannot deal with XOR. In this paper, we show how to reduce the derivation problem for Horn theories with XOR to the XOR-free case. Our reduction works for an expressive class of Horn theories. A large class of intruder capabilities and protocols that employ the XOR operator can be modeled by these theories. Our reduction allows us to carry out protocol analysis by tools, such as ProVerif, that cannot deal with XOR, but are very efficient in the XOR-free ca...

  10. Evaluation of a RF-Based Approach for Tracking UF6 Cylinders at a Uranium Enrichment Plant

    International Nuclear Information System (INIS)

    Approved industry-standard cylinders are used globally to handle and store uranium hexafluoride (UF6) feed, product, tails, and samples at uranium enrichment plants. The International Atomic Energy Agency (IAEA) relies on time-consuming physical inspections to verify operator declarations and detect possible diversion of UF6. Development of a reliable, automated, and tamper-resistant system for near real-time tracking and monitoring UF6 cylinders (as they move within an enrichment facility) would greatly improve the inspector function. This type of system can reduce the risk of false or misreported cylinder tare weights, diversion of nuclear material, concealment of excess production, utilization of undeclared cylinders, and misrepresentation of the cylinders contents. This paper will describe a proof-of-concept approach that was designed to evaluate the feasibility of using radio frequency (RF)-based technologies to track individual UF6 cylinders throughout a portion of their life cycle, and thus demonstrate the potential for improved domestic accountability of materials, and a more effective and efficient method for application of site-level IAEA safeguards. The evaluation system incorporates RF-based identification devices (RFID) which provide a foundation for establishing a reliable, automated, and near real-time tracking system that can be set up to utilize site-specific, rules-based detection algorithms. This paper will report results from a proof-of-concept demonstration at a real enrichment facility that is specifically designed to evaluate both the feasibility of using RF to track cylinders and the durability of the RF equipment to survive the rigors of operational processing and handling. The paper also discusses methods for securely attaching RF devices and describes how the technology can effectively be layered with other safeguard systems and approaches to build a robust system for detecting cylinder diversion. Additionally, concepts for off

  11. Cross-Layer Cluster-Based Energy-Efficient Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Mammu, Aboobeker Sidhik Koyamparambil; Hernandez-Jayo, Unai; Sainz, Nekane; de la Iglesia, Idoia

    2015-01-01

    Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs). One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE) can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs) and a cluster head (CH). The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH) and hybrid energy-efficient distributed clustering (HEED). PMID:25860073

  12. Cross-Layer Cluster-Based Energy-Efficient Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Aboobeker Sidhik Koyamparambil Mammu

    2015-04-01

    Full Text Available Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs. One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs and a cluster head (CH. The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH and hybrid energy-efficient distributed clustering (HEED.

  13. The 9-day CIDR-PG protocol: Incorporation of PGF2α pretreatment into a long-term progestin-based estrus synchronization protocol for postpartum beef cows.

    Science.gov (United States)

    Thomas, Jordan M; Bishop, Brianne E; Abel, Jillian M; Ellersieck, Mark R; Smith, Michael F; Patterson, David J

    2016-06-01

    A pilot experiment was designed to test the hypothesis that administration of PGF2α before progestin treatment would allow for a reduced duration of progestin treatment in a long-term progestin-based estrus synchronization protocol. A modified presynchronization treatment was compared with a standard long-term controlled internal drug release (CIDR) treatment, and treatments were compared on the basis of ovarian follicular dynamics, estrous response rate, synchrony of estrus expression, and pregnancy rates resulting from timed artificial insemination (TAI) in postpartum beef cows. Estrous was synchronized for 85 cows, with cows assigned to one of two treatments based on age, days postpartum, and body condition score. Cows assigned to the 14-day CIDR-PG protocol received a CIDR insert (1.38 g progesterone) on Day 0, CIDR removal on Day 14, and administration of PGF2α (25 mg im) on Day 30. Cows assigned to the 9-day CIDR-PG protocol received PGF2α concurrent with CIDR insertion on Day 5, PGF2α concurrent with CIDR removal on Day 14, and administration of PGF2α on Day 30. In both treatments, split-time AI was performed based on estrous response. At 72 hours after PGF2α (Day 33), cows having expressed estrus received TAI; cows that failed to express estrus by 72 hours received TAI 24 hours later (96 hours after PGF2α on Day 34), with GnRH (100 μg im) administered to nonestrous cows. Estrus-detection transmitters were used from CIDR removal until AI to determine onset time of estrus expression both after CIDR removal and after PGF2α. Ovarian ultrasonography was performed at CIDR removal on Day 14, PGF2α on Day 30, and AI on Days 33 or 34. At CIDR removal on Day 14, diameter of the largest follicle present on the ovary was similar between treatments. The proportion of cows expressing estrus after CIDR removal tended to be higher (P = 0.09) among cows assigned to the 9-day CIDR-PG treatment (93%; 40 of 43) than among cows assigned to the 14-day CIDR

  14. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  15. A CROSS-LAYERED PATH STABILITY BASED ROUTING PROTOCOL FOR WiMAX NETWORKS

    Directory of Open Access Journals (Sweden)

    M. Deva Priya

    2013-01-01

    Full Text Available In IEEE 802.16, a Subscriber Station (SS is battery powered with limited capacity. A SS can be made to operate for longer durations by deploying power saving features or by using relay stations. Multi-hop communication conserves power, but finding an optimal path to the destination is monotonous. Path stability indicates how stable a path is and how long it can support communication. Identifying stable paths helps in reducing the control traffic, number of connection disruptions and also in conserving power. In this study, Greedy Perimeter Stateless Routing (GPSR and Link-St Ability and Energy aware Routing (LAER designed for Mobile Ad hoc NET works (MANETs are implemented for WiMAX networks and their performance is evaluated. Further, a novel Cross-layered Path Stability based Routing protocol (CPSR is proposed to find a stable path based on Residual Energy (RE, Received Signal Strength Indicator (RSSI and Signal-to-Noise Ratio (SNR. The total energy consumed is minimized, thus maximizing the network lifetime.

  16. Adaptive Search Protocol Based on Optimized Ant Colony Algorithm in Peer-to-Peer Network

    Directory of Open Access Journals (Sweden)

    Chun-Ying Liu

    2013-04-01

    Full Text Available In order to solve the low searching efficiency in the peer-to-peer (P2P network, introduce the ant colony algorithm with the particle swarm optimization in searching procedure. Present a new adaptive search protocol (SACASP based on the ant colony algorithm with the particle swarm optimization in the Peer-to-Peer Network. The approach simulates the process of the ants’ searching food, and can direct the query routing efficiently according to the adaptive strategy and the positive feedback principle of the pheromone. Decrease the blindness of the messages transmitting in early searching stage by adding the particle swarm optimization to the ant colony algorithm. Give the adaptive P2P search model based on the fusion algorithm, and design the data structure and steps of the model. The simulation experiment shows, PSACASP can effectively shorten the time and reduce the search query packets comparing with the other search algorithms, and it can achieve better search performance and decrease the network loads.

  17. Size-exclusion chromatography-based enrichment of extracellular vesicles from urine samples

    Directory of Open Access Journals (Sweden)

    Inés Lozano-Ramos

    2015-05-01

    Full Text Available Renal biopsy is the gold-standard procedure to diagnose most of renal pathologies. However, this invasive method is of limited repeatability and often describes an irreversible renal damage. Urine is an easily accessible fluid and urinary extracellular vesicles (EVs may be ideal to describe new biomarkers associated with renal pathologies. Several methods to enrich EVs have been described. Most of them contain a mixture of proteins, lipoproteins and cell debris that may be masking relevant biomarkers. Here, we evaluated size-exclusion chromatography (SEC as a suitable method to isolate urinary EVs. Following a conventional centrifugation to eliminate cell debris and apoptotic bodies, urine samples were concentrated using ultrafiltration and loaded on a SEC column. Collected fractions were analysed by protein content and flow cytometry to determine the presence of tetraspanin markers (CD63 and CD9. The highest tetraspanin content was routinely detected in fractions well before the bulk of proteins eluted. These tetraspanin-peak fractions were analysed by cryo-electron microscopy (cryo-EM and nanoparticle tracking analysis revealing the presence of EVs.When analysed by sodium dodecyl sulphate–polyacrylamide gel electrophoresis, tetraspanin-peak fractions from urine concentrated samples contained multiple bands but the main urine proteins (such as Tamm–Horsfall protein were absent. Furthermore, a preliminary proteomic study of these fractions revealed the presence of EV-related proteins, suggesting their enrichment in concentrated samples. In addition, RNA profiling also showed the presence of vesicular small RNA species.To summarize, our results demonstrated that concentrated urine followed by SEC is a suitable option to isolate EVs with low presence of soluble contaminants. This methodology could permit more accurate analyses of EV-related biomarkers when further characterized by -omics technologies compared with other approaches.

  18. Reverse Query Tree approach to cope with Id distribution problem in Tree-based tag anti-collision protocols of RFID

    Directory of Open Access Journals (Sweden)

    Milad HajMirzaei

    2013-09-01

    Full Text Available Tag collision is one of the most important issues in RFID systems and many tag anti-collision protocols were proposed in literature. But some kind of these protocols like Tree-based protocols (specifically Query tree which its performance depends on tag id length and construction, have some issues like id distribution. In this paper we discuss about Query tree protocol which may influenced by id distribution. Then we propose a novel type of this protocol called Reverse Query tree to solve it.

  19. Reverse Query Tree approach to cope with Id distribution problem in Tree-based tag anti-collision protocols of RFID

    OpenAIRE

    Milad HajMirzaei

    2013-01-01

    Tag collision is one of the most important issues in RFID systems and many tag anti-collision protocols were proposed in literature. But some kind of these protocols like Tree-based protocols (specifically Query tree) which its performance depends on tag id length and construction, have some issues like id distribution. In this paper we discuss about Query tree protocol which may influenced by id distribution. Then we propose a novel type of this protocol called Reverse Query tree to solve it.

  20. Bioremediation of oil sludge contaminated soil using bulking agent mixture enriched consortia of microbial inoculants based by irradiated compost

    International Nuclear Information System (INIS)

    Bulking agent mixture enriched consortia of microbial inoculants based by irradiated compost was used on bioremediation of microcosm scale contaminated by hydrocarbon soil. Bioremediation composting was carried out for 42 days. Composting was done with a mixture of bulking agent (sawdust, residual sludge biogas and compost) by 30%, mud petroleum (oil sludge) by 20% and 50% of soil. Mixture of 80% soil and 20% oil sludge was used as a control. Irradiated compost was used as a carrier for consortia of microbial inoculants (F + B) which biodegradable hydrocarbons. Treatment variations include A1, A2, B1, B2, C1, C2, D1 and D2. Process parameters were observed to determine the optimal conditions include: temperature, pH, water content, TPC (Total Plate Count) and degradation of % TPH (Total Petroleum Hydrocarbon). Optimal conditions were achieved in the remediation of oil sludge contamination of 20% using the B2 treatment with the addition consortia of microbial inoculants based by irradiated compost of sawdust (bulking agentby 30% at concentrations of soil by 50% with TPH degradation optimal efficiency of 81.32%. The result of GC-MS analysis showed that bioremediation for 42 days by using a sawdust as a mixture of bulking agents which enriched consortia of microbial inoculants based by irradiated compost is biodegradeable, so initial hydrocarbons with the distribution of the carbon chain C-7 to C-54 into final hydrocarbons with the distribution of carbon chain C-6 to C-8. (author)

  1. Recommended protocols based on a survey of current practice in genotoxicity testing laboratories: study evaluation.

    Science.gov (United States)

    Brillinger, R L; Nestmann, E R; Sigal, E A; Swierenga, S H

    1991-02-01

    The approach used in the survey of current methodologies used in mammalian cell genotoxicity testing (unscheduled DNA synthesis, mutation, cell transformation and cytogenetics testing) is discussed. The recommended protocols, described in the preceding papers, were developed using responses to detailed questionnaires. This summary outlines general observations related to the survey methodology and to the protocols themselves. Also discussed are the qualities of an effective survey; the evolution of a survey and of a protocol; and the contributions and limitations of this study. PMID:1996127

  2. Prophylactic aortic root surgery in patients with Marfan syndrome : 10 years' experience with a protocol based on body surface area

    NARCIS (Netherlands)

    Aalberts, Jan J. J.; van Tintelen, J. Peter; Hillege, Hans L.; Boonstra, Piet W.; van den Berg, Maarten P.; Waterbolk, T

    2008-01-01

    Background: Current guidelines recommending prophylactic aortic root replacement in Marfan syndrome are based on absolute diameters of the aortic root. However, aortic root diameter is a function of body surface area (BSA). Here, we report our experience with a protocol for prophylactic aortic root

  3. Detecting child abuse based on parental characteristics: Does The Hague Protocol cause parents to avoid the Emergency Department?

    NARCIS (Netherlands)

    Diderich, H.M.; Fekkes, M.; Dechesne, M.; Buitendijk, S.E.; Oudesluys-Murphy, A.M.

    2015-01-01

    Objectives: The Hague Protocol is used by professionals at the adult Emergency Departments (ED) in The Netherlands to detect child abuse based on three parental characteristics: (1) domestic violence, (2) substance abuse or (3) suicide attempt or self-harm. After detection, a referral is made to the

  4. PMT Dark Noise Monitoring System for Neutrino Detector Borexino Based on the Devicenet Protocol and WEB-Access

    International Nuclear Information System (INIS)

    Monitoring of PMT dark noise in a neutrino detector BOREXINO is a procedure that indicates condition of the detector. Based on CAN industrial network, top level DeviceNet protocol and WEB visualization, the dark noise monitoring system having 256 channels for the internal detector and for the external muon veto was created. The system is composed as a set of controllers, converting the PMT signals to frequency and transmitting them over Can network. The software is the stack of the DeviceNet protocols, providing the data collecting and transporting. Server-side scripts build web pages of user interface and graphical visualization of data

  5. Assessing the Fecal Microbiota: An Optimized Ion Torrent 16S rRNA Gene-Based Analysis Protocol

    Science.gov (United States)

    Foroni, Elena; Duranti, Sabrina; Turroni, Francesca; Lugli, Gabriele Andrea; Sanchez, Borja; Martín, Rebeca; Gueimonde, Miguel; van Sinderen, Douwe; Margolles, Abelardo; Ventura, Marco

    2013-01-01

    Assessing the distribution of 16S rRNA gene sequences within a biological sample represents the current state-of-the-art for determination of human gut microbiota composition. Advances in dissecting the microbial biodiversity of this ecosystem have very much been dependent on the development of novel high-throughput DNA sequencing technologies, like the Ion Torrent. However, the precise representation of this bacterial community may be affected by the protocols used for DNA extraction as well as by the PCR primers employed in the amplification reaction. Here, we describe an optimized protocol for 16S rRNA gene-based profiling of the fecal microbiota. PMID:23869230

  6. NONH:A New Cache—Based Coherence Protocol for Linked List Structure DSM System and Its Performance Evaluation

    Institute of Scientific and Technical Information of China (English)

    房至一; 鞠九滨

    1996-01-01

    The management of memory coherence is an important problem in distributed shared memory(DSM)system.In a cache-based coherence DSM system using linked list structure,the key to maintaining the coherence and improving system performance is how to manage the owner in the linked list.This paper presents the design of a new management protocol-NONH(New-Owner New-Head)and its performance evaluation.The analysis results show that this protocol can improve the scalability and performence of a coherent DSM system using linked list.It is also suitable for managing the cache coherency in tree-like hierarchical architecture.

  7. 基于分布式网络的SOAP协议%SOAP Protocol Based on the Distributed Network

    Institute of Scientific and Technical Information of China (English)

    沈苗箭; 范剑波; 张森

    2001-01-01

    The article discusses the base concept of SOAP protocol and the way it overcomes the limitation of current technology (CORBA and DCOM). Then it narrates some rules of SOAP protocol and focuses on connecting SOAP to ORPC concept.%讨论了SOAP协议的基础,以及它克服现存技术(如CORBA和DCOM)的许多缺陷的方法。随后讲述一些SOAP编码规则,并把焦点放在SOAP是怎样映射到存在的ORPC概念上的。

  8. Evaluation of surface roughness of resin-based composites submitted to different light-activation protocols and bleaching agents

    Directory of Open Access Journals (Sweden)

    Renata Pereira

    2013-12-01

    Full Text Available This study evaluated the surface roughness (Ra of methacrylate and silorane-based composites submitted to different light-activation protocols and bleaching agents. The samples were divided into 12 groups (n=10 according to the composite (Filtek Z250 - 3M Espe, Filtek P90 - 3M Espe and Opallis - FGM; to the light-activation protocol (1000 mW/cm2 X 18 s (S and 3200 mW/cm2 X 6 seconds (PE; and bleaching agent (hydrogen peroxide at 6% and hydrogen peroxide at 35%. Roughness test were carried out at the following set times: initial (R1, after polishing (R2 and 24 hours after bleaching (R3. Data obtained were submitted to the statistical analysis. The results showed that higher values of Ra in R1 were obtained by Filtek P90 composite, differing significantly of the other samples, which showed similar results among them. There was significant decrease of Ra in R2 under all the conditions, except by the Opallis composite, independently on the light-activation protocol, and Filtek Z250 light-activated by PE protocol. There were no difference between R2 and R3 for all the composites and any light-activation protocol. It was possible conclude that bleaching agents did not interfere in significant way on surface roughness of the composite evaluated.

  9. On-demand QoS routing protocol based on energy and bandwidth requirement in Ad Hoc networks

    Institute of Scientific and Technical Information of China (English)

    Shi Weiren; Huang Chao; Lei Luning; Huang Jian

    2008-01-01

    Along with the emergence of real-time muhi-media, interactive service, real-time voice and other services calling for high quality of service, there should be a good network to support those services. Most present route algo-rithms with computational complexity hardly consider the restriction of node energy, so it degrades the whole capabil-ity of network. Bandwidth guarantee is one of the most crucial factors in real-time application, and this paper brings forward a distributed on-demand QoS routing protocol based on energy and bandwidth requirement. This QoS routing protocol makes use of bandwidth calculation algorithm and analyzes its route mechanism. The simulation results veri-fy its validity. The QoS routing protocol improves the packet delivery fraction and average end-to-end delay, prolongs the network lifetime, enhances the network performance and satisfies the route requirement for ad hoc networks.

  10. Registration accuracy for MR images of the prostate using a subvolume based registration protocol

    Directory of Open Access Journals (Sweden)

    Söderström Karin

    2011-06-01

    Full Text Available Abstract Background In recent years, there has been a considerable research effort concerning the integration of magnetic resonance imaging (MRI into the external radiotherapy workflow motivated by the superior soft tissue contrast as compared to computed tomography. Image registration is a necessary step in many applications, e.g. in patient positioning and therapy response assessment with repeated imaging. In this study, we investigate the dependence between the registration accuracy and the size of the registration volume for a subvolume based rigid registration protocol for MR images of the prostate. Methods Ten patients were imaged four times each over the course of radiotherapy treatment using a T2 weighted sequence. The images were registered to each other using a mean square distance metric and a step gradient optimizer for registration volumes of different sizes. The precision of the registrations was evaluated using the center of mass distance between the manually defined prostates in the registered images. The optimal size of the registration volume was determined by minimizing the standard deviation of these distances. Results We found that prostate position was most uncertain in the anterior-posterior (AP direction using traditional full volume registration. The improvement in standard deviation of the mean center of mass distance between the prostate volumes using a registration volume optimized to the prostate was 3.9 mm (p Conclusions Repeated MR imaging of the prostate for therapy set-up or therapy assessment will both require high precision tissue registration. With a subvolume based registration the prostate registration uncertainty can be reduced down to the order of 1 mm (1 SD compared to several millimeters for registration based on the whole pelvis.

  11. Synthesis and evaluation of carboxymethyl chitosan for glycopeptide enrichment.

    Science.gov (United States)

    Bodnar, Edward D; Perreault, Hélène

    2015-09-01

    Glycans are known to be involved in a variety of biological processes throughout human physiology. Mass spectrometry has demonstrated itself as powerful analytical tool for quantitative and structural characterization of glycans. Studying these molecules at the glycopeptide level however, offers distinct advantages, namely the ability to characterize both the glycan and peptide fragments simultaneously, and moreover the ability to assign site specific heterogeneity. In light of this, peptides often dominate the spectrum and hinder the ionization efficiency of glycopeptides. For this reason, enrichment protocols prior to downstream MS analysis need to be developed. Here, we discuss the synthesis and use of carboxymethyl chitosan (CMCH) to enrich glycopeptides from a 12 protein mixture for MS analysis. This protocol was compared to a commercially available glycopeptide enrichment kit offered by EMD Millipore through the use of tandem mass tags (TMT) for relative quantification. Using this approach, we identified 98 unique N-linked glycopeptides and observed, that CMCH was able to enrich more sialylation than the commercial kit. In addition, we observed a trend based on TMT reporter ratios with respect to increasing sialylation. This corroborated that this stationary phase was exhibiting a mixed-mode enrichment through both hydrophilic interaction liquid chromatography (HILIC) and weak anion exchange (WAX) principles. PMID:26388377

  12. A multipath routing protocol based on clustering and ant colony optimization for wireless sensor networks.

    Science.gov (United States)

    Yang, Jing; Xu, Mai; Zhao, Wei; Xu, Baoguo

    2010-01-01

    For monitoring burst events in a kind of reactive wireless sensor networks (WSNs), a multipath routing protocol (MRP) based on dynamic clustering and ant colony optimization (ACO) is proposed. Such an approach can maximize the network lifetime and reduce the energy consumption. An important attribute of WSNs is their limited power supply, and therefore some metrics (such as energy consumption of communication among nodes, residual energy, path length) were considered as very important criteria while designing routing in the MRP. Firstly, a cluster head (CH) is selected among nodes located in the event area according to some parameters, such as residual energy. Secondly, an improved ACO algorithm is applied in the search for multiple paths between the CH and sink node. Finally, the CH dynamically chooses a route to transmit data with a probability that depends on many path metrics, such as energy consumption. The simulation results show that MRP can prolong the network lifetime, as well as balance of energy consumption among nodes and reduce the average energy consumption effectively. PMID:22399890

  13. Three sample preparation protocols for polymerase chain reaction based detection of Cryptosporidium parvum in environmental samples.

    Science.gov (United States)

    Kostrzynska, M; Sankey, M; Haack, E; Power, C; Aldom, J E; Chagla, A H; Unger, S; Palmateer, G; Lee, H; Trevors, J T; De Grandis, S A

    1999-02-01

    Cryptosporidium parvum is a protozoan parasite responsible for an increasing number of outbreaks of gastrointestinal illness worldwide. In this report, we describe development of sample preparation protocols for polymerase chain reaction (PCR)-based detection of C. parvum in fecal material and environmental water samples. Two of these methods were found adequate for isolation of Cryptosporidium DNA from filtered water pellet suspensions. The first involved several filtration steps, immunomagnetic separation and freeze-thaw cycles. The second method involved filtration, addition of EnviroAmp lysis reagent, freeze-thaw cycles and precipitation of the DNA with isopropanol. Using nested PCR, we detected 100 oocysts/ml of filtered water pellet suspension, with either of the above sample preparation procedures. Nested PCR increased sensitivity of the assay by two to three orders of magnitude as compared to the primary PCR. The detection limit for seeded fecal samples was 10-fold higher than for filtered environmental water pellet suspension. Nested PCR results showed 62.4 and 91.1% correlation with immunofluorescence assay (IFA) for fecal samples and filtered environmental water pellet suspensions, respectively. This correlation decreased to 47.2% and 44.4%, respectively, when only IFA positive samples were analyzed. However, in fecal samples contaminated with a high number (> 10(5)/g) of C. parvum oocysts, this correlation was 100%. PMID:10076632

  14. Protocol for a population-based Ankylosing Spondylitis (PAS cohort in Wales

    Directory of Open Access Journals (Sweden)

    Atkinson Mark D

    2010-09-01

    Full Text Available Abstract Background To develop a population-based cohort of people with ankylosing spondylitis (AS in Wales using (1 secondary care clinical datasets, (2 patient-derived questionnaire data and (3 routinely-collected information in order to examine disease history and the health economic cost of AS. Methods This data model will include and link (1 secondary care clinician datasets (i.e. electronic patient notes from the rheumatologist (2 patient completed questionnaires (giving information on disease activity, medication, function, quality of life, work limitations and health service utilisation and (3 a broad range of routinely collected data (including; GP records, in-patient hospital admission data, emergency department data, laboratory/pathology data and social services databases. The protocol involves the use of a unique and powerful data linkage system which allows datasets to be interlinked and to complement each other. Discussion This cohort can integrate patient supplied, primary and secondary care data into a unified data model. This can be used to study a range of issues such as; the true economic costs to the health care system and the patient, factors associated with the development of severe disease, long term adverse events of new and existing medication and to understand the disease history of this condition. It will benefit patients, clinicians and health care managers. This study forms a pilot project for the use of routine data/patient data linked cohorts for other chronic conditions.

  15. Maintaining communication link based on AODV routing protocol in mobile robot networks

    Science.gov (United States)

    Hu, Hui; Jiang, Hong

    2007-12-01

    Wired computer networks are vital in modern life. However, these networks are extremely vulnerable to disaster or attack in emergency situations. Therefore, how to maintain communication link under emergency situations is very important. In this paper, we utilize a series of autonomous mobile slave robots which follow behind the lead robot and automatically stop where needed to maintain an ad hoc network for guaranteeing a link between the lead robot and its remote monitor/control station. To accomplish this target, an efficient communication protocol limitation mobile robots broadcast based on AODV (LMRB-AODV) is proposed for deployment in multi-robot system. After then the lead robot could carry service traffics to the monitor station under emergency situations through the communication link. At any instance, the lead robot has the ability to reclaim the relay robot(s) which are unneeded in the network to rejoin the convoy behind the lead robot and use it to extend the range of wireless communication when the radio frequency (RF) shortcuts are detected by the lead robot. All relay deployment and reclaiming strategy functions occur without the operator's involvement. Finally, we provide a comparative study of their performance in a number of different simulation environments. The results show that the proposed scheme is very efficient in maintaining communication link in wireless network.

  16. A Multipath Routing Protocol Based on Clustering and Ant Colony Optimization for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jing Yang

    2010-05-01

    Full Text Available For monitoring burst events in a kind of reactive wireless sensor networks (WSNs, a multipath routing protocol (MRP based on dynamic clustering and ant colony optimization (ACO is proposed.. Such an approach can maximize the network lifetime and reduce the energy consumption. An important attribute of WSNs is their limited power supply, and therefore some metrics (such as energy consumption of communication among nodes, residual energy, path length were considered as very important criteria while designing routing in the MRP. Firstly, a cluster head (CH is selected among nodes located in the event area according to some parameters, such as residual energy. Secondly, an improved ACO algorithm is applied in the search for multiple paths between the CH and sink node. Finally, the CH dynamically chooses a route to transmit data with a probability that depends on many path metrics, such as energy consumption. The simulation results show that MRP can prolong the network lifetime, as well as balance of energy consumption among nodes and reduce the average energy consumption effectively.

  17. MESSAGE AUTHENTICATION CODE BASED SECURE GROUP KEY MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    T. Peer Meera Labbai

    2013-01-01

    Full Text Available A mobile ad hoc network is a group of nodes which are communicating with each other with the use of radio frequencies. When there is high movement of mobile nodes, the nodes find difficult to reach other nodes. If the data are exchanged between nodes when there is high mobility, the data may be lost in transit. Therefore the security of data is needed for the transmission of data. Since the high dense of mobile nodes we cannot give better security, the mobile nodes must be formed as groups. For providing security, there are pre-requirements like key establishment, key agreement and key management and so on. Then these keys are used in the encryption/decryption algorithms such as symmetric key algorithms and asymmetric key algorithms. For this study, we have taken VBOR as the base protocol. VBOR consists of two phases namely, Route discovery and Route maintenance with the use of variable bit rate. In this study, the message authentication code is generated during route discovery phase then these data are exchanged between the nodes. In this proposed work, the performance analysis is done using some performance parameters like energy consumption, packet delivery ratio, overhead and delay.

  18. An Efficient Paging Scheme for IP-Based Cellular Networks Using Mobility Management Protocol

    Directory of Open Access Journals (Sweden)

    Chaitanya Busa

    2012-01-01

    Full Text Available In interworked fixed and mobile networks, both terminal mobility (TM and personal mobility (PM should be supported and interworked to provide seamless universal mobility to mobile users. TM supports movement between different locations with the same mobile terminal (MT. In TM management, an MT updates its location when it changes location area (LA and an incoming call is delivered to the MT by paging all cells within a registered LA. PM supports user mobility between different terminals by using personal identifier (PID. Mobile IP is an IETF RFC that supports transparent host migration on the Internet. In the transition to IP-based cellular networks, it is widely agreed that Mobile IP provides an elegant solution for inter-domain, or macro mobility management, but lacks critical aspects of mobility management needed within cellular networks. The shortcomings have led to the recent emergence of micro mobility management protocols. In the proposed paging scheme, paging is firstly performed only to the cells containing terminals with which a user is registered for PM, instead of all cells within a registered LA. If the called user is not found in the first paging step, remaining cells within the registered LA are paged.

  19. A Multipath Routing Protocol Based on Clustering and Ant Colony Optimization for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jing Yang

    2009-10-01

    Full Text Available For monitoring burst events in a kind of reactive wireless sensor networks (WSNs, a multipath routing protocol (MRP based on dynamic clustering and ant colony optimization (ACO is proposed.. Such an approach can maximize the network lifetime and reduce the energy consumption. An important attribute of WSNs is its limited power supply, and therefore in MRP, some metrics (such as energy consumption of communication among nodes, residual energy, path length are considered as very important criteria while designing routing. Firstly, a cluster head (CH is selected among nodes located in the event area according to some parameters, such as residual energy. Secondly, an improved ACO algorithm is applied in search for multiple paths between the CH and sink node. Finally, the CH dynamically chooses a route to transmit data with a probability that depends on many path metrics, such as energy consumption. The simulation results show that MRP can prolong the network lifetime, as well as balance energy consumption among nodes and reduce the average energy consumption effectively.

  20. Evaluation of imaging protocol for ECT based on CS image reconstruction algorithm

    International Nuclear Information System (INIS)

    Single-photon emission computerized tomography and positron emission tomography are essential medical imaging tools, for which the sampling angle number and scan time should be carefully chosen to give a good compromise between image quality and radiopharmaceutical dose. In this study, the image quality of different acquisition protocols was evaluated via varied angle number and count number per angle with Monte Carlo simulation data. It was shown that, when similar imaging counts were used, the factor of acquisition counts was more important than that of the sampling number in emission computerized tomography. To further reduce the activity requirement and the scan duration, an iterative image reconstruction algorithm for limited-view and low-dose tomography based on compressed sensing theory has been developed. The total variation regulation was added to the reconstruction process to improve the signal to noise Ratio and reduce artifacts caused by the limited angle sampling. Maximization of the maximum likelihood of the estimated image and the measured data and minimization of the total variation of the image are alternatively implemented. By using this advanced algorithm, the reconstruction process is able to achieve image quality matching or exceed that of normal scans with only half of the injection radiopharmaceutical dose. (authors)