WorldWideScience

Sample records for based enrichment protocols

  1. Evaluation of Enrichment Protocols for Bacterial Endosymbionts of Ciliates by Real-Time PCR.

    Science.gov (United States)

    Castelli, Michele; Lanzoni, Olivia; Rossi, Leonardo; Potekhin, Alexey; Schrallhammer, Martina; Petroni, Giulio

    2016-06-01

    Large-scale studies on obligate bacterial endosymbionts may frequently require preliminary purification and enrichment protocols, which are often elaborate to set up and to evaluate, especially if the host organism is a protist. The purpose of this study was to develop a real-time PCR-based strategy and employ it for assessing two of such enrichment protocols for Holospora caryophila, hosted by the ciliate Paramecium. Four SSU rRNA gene-targeted real-time PCR assays were designed, which allowed to compare the amount of H. caryophila to other organisms, namely the host, its food bacterium (Raoultella planticola), and free-living bacteria present in the culture medium. By the use of the real-time PCR assays in combination, it was possible to conclude that the "cell fractionation" protocol was quite successful in the enrichment of the symbiont, while the "Percoll gradient" protocol will need further refinements to be fully repeatable. The proposed approach has the potential to facilitate and encourage future studies on the yet underexplored field of bacterial endosymbionts of ciliates and other protists. It can also find valuable applications for experimental questions other than those tested, such as fast and precise assessment of symbiont abundance in natural populations and comparison among multiple coexisting symbionts.

  2. Protocol for Real-Time PCR Identification of Anthrax Spores from Nasal Swabs after Broth Enrichment

    Science.gov (United States)

    Oggioni, Marco R.; Meacci, Francesca; Carattoli, Alessandra; Ciervo, Alessandra; Orru, Germano; Cassone, Antonio; Pozzi, Gianni

    2002-01-01

    A mass-screening protocol for the diagnosis of anthrax from nasal swabs based on an enrichment step in liquid medium was devised. Incubation for growth was performed in autoclavable vials and racks which allow real-time PCR analysis of sterilized cultures. A dual-color PCR was set up with primers and probes for the chromosomal marker rpoB and the plasmid marker lef. Specific primer and probe sets were designed for the differentiation of Bacillus anthracis from B. cereus and for the differentiation of the Sterne vaccine strain from field isolates and the Ames strain, which was used in the recent anthrax bioterrorist attack. The present protocol thus combines the high specificity and sensitivity of real-time PCR with excellent biosafety and the low hands-on time necessary for the processing of large numbers of samples, which is extremely important during control programs involving the processing of large numbers of samples. PMID:12409358

  3. A protocol for isolation and enriched monolayer cultivation of neural precursor cells from mouse dentate gyrus

    Directory of Open Access Journals (Sweden)

    Harish eBabu

    2011-07-01

    Full Text Available In vitro assays are valuable tools to study the characteristics of adult neural precursor cells under controlled conditions with a defined set of parameters. We here present a detailed protocol based on our previous original publication (Babu et al., Enriched monolayer precursor cell cultures from micro-dissected adult mouse dentate gyrus yield functional granule cell-like neurons, PLoS One 2007, 2:e388 to isolate neural precursor cells from the hippocampus of adult mice and maintain and propagate them as adherent monolayer cultures. The strategy is based on the use of Percoll density gradient centrifugation to enrich precursor cells from the micro-dissected dentate gyrus. Based on the expression of Nestin and Sox2, a culture-purity of more than 98% can be achieved. The cultures are expanded under serum-free conditions in Neurobasal A medium with addition of the mitogens EGF and FGF2 as well as the supplements Glutamax-1 and B27. Under differentiation conditions, the precursor cells reliably generate approximately 30% neurons with appropriate morphological, molecular and electrophysiological characteristics that might reflect granule cell properties as their in vivo counterpart. We also highlight potential modifications to the protocol.

  4. Network-based functional enrichment

    Directory of Open Access Journals (Sweden)

    Poirel Christopher L

    2011-11-01

    Full Text Available Abstract Background Many methods have been developed to infer and reason about molecular interaction networks. These approaches often yield networks with hundreds or thousands of nodes and up to an order of magnitude more edges. It is often desirable to summarize the biological information in such networks. A very common approach is to use gene function enrichment analysis for this task. A major drawback of this method is that it ignores information about the edges in the network being analyzed, i.e., it treats the network simply as a set of genes. In this paper, we introduce a novel method for functional enrichment that explicitly takes network interactions into account. Results Our approach naturally generalizes Fisher’s exact test, a gene set-based technique. Given a function of interest, we compute the subgraph of the network induced by genes annotated to this function. We use the sequence of sizes of the connected components of this sub-network to estimate its connectivity. We estimate the statistical significance of the connectivity empirically by a permutation test. We present three applications of our method: i determine which functions are enriched in a given network, ii given a network and an interesting sub-network of genes within that network, determine which functions are enriched in the sub-network, and iii given two networks, determine the functions for which the connectivity improves when we merge the second network into the first. Through these applications, we show that our approach is a natural alternative to network clustering algorithms. Conclusions We presented a novel approach to functional enrichment that takes into account the pairwise relationships among genes annotated by a particular function. Each of the three applications discovers highly relevant functions. We used our methods to study biological data from three different organisms. Our results demonstrate the wide applicability of our methods. Our algorithms are

  5. Recommendations based on semantically enriched museum collections

    NARCIS (Netherlands)

    Wang, Y.; Stash, N.; Aroyo, L.; Gorgels, P.; Rutledge, L.; Schreiber, G.

    2008-01-01

    This article presents the CHIP demonstrator1 for providing personalized access to digital museum collections. It consists of three main components: Art Recommender, Tour Wizard, and Mobile Tour Guide. Based on the semantically enriched Rijksmuseum Amsterdam2 collection, we show how Semantic Web tech

  6. An Identity- Based Key- Exchange Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ya-juan; ZHU Yue-fei; HUANG Qiu-sheng

    2005-01-01

    An identity-based key-exchange protocol using a bilinear map is proposed and it is proved SK-secure(session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diffie-Hellmen) assumption is correct. Then we apply the signature-based authenticator to our protocol and obtain an identity-Based key-exchange protocol that is SK-secure in the UM (unauthenticated links adversarial model) provided the BDDH assumption is correct.

  7. The Braid-Based Bit Commitment Protocol

    Institute of Scientific and Technical Information of China (English)

    WANG Li-cheng; CAO Zhen-fu; CAO Feng; QIAN Hai-feng

    2006-01-01

    With recent advances of quantum computation, new threats have closed in upon to the classical public key cryptosystems. In order to build more secure bit commitment schemes, this paper gave a survey of the new coming braid-based cryptography and then brought forward the first braid-based bit commitment protocol. The security proof manifests that the proposed protocol is computationally binding and information-theoretically hiding.Furthermore, the proposed protocol is also invulnerable to currently known quantum attacks.

  8. Solution-based targeted genomic enrichment for precious DNA samples

    Directory of Open Access Journals (Sweden)

    Shearer Aiden

    2012-05-01

    Full Text Available Abstract Background Solution-based targeted genomic enrichment (TGE protocols permit selective sequencing of genomic regions of interest on a massively parallel scale. These protocols could be improved by: 1 modifying or eliminating time consuming steps; 2 increasing yield to reduce input DNA and excessive PCR cycling; and 3 enhancing reproducible. Results We developed a solution-based TGE method for downstream Illumina sequencing in a non-automated workflow, adding standard Illumina barcode indexes during the post-hybridization amplification to allow for sample pooling prior to sequencing. The method utilizes Agilent SureSelect baits, primers and hybridization reagents for the capture, off-the-shelf reagents for the library preparation steps, and adaptor oligonucleotides for Illumina paired-end sequencing purchased directly from an oligonucleotide manufacturing company. Conclusions This solution-based TGE method for Illumina sequencing is optimized for small- or medium-sized laboratories and addresses the weaknesses of standard protocols by reducing the amount of input DNA required, increasing capture yield, optimizing efficiency, and improving reproducibility.

  9. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  10. SLAM-enriched hematopoietic stem cells maintain long-term repopulating capacity after lentiviral transduction using an abbreviated protocol.

    Science.gov (United States)

    Laje, P; Zoltick, P W; Flake, A W

    2010-03-01

    Gene transfer to long-term repopulating hematopoietic stem cells (HSCs) using integrating viral vectors is an important goal in gene therapy. The SLAM (signaling lymphocyte activation molecule)-family receptors have recently been used for the isolation of highly enriched murine HSCs. This HSC enrichment protocol is relatively simple, and results in an HSC population with comparable repopulating capacity to c-kit(+)lin(-)Sca-1(+) (KSL) HSCs. The capacity to withstand genetic manipulation and, most importantly, to maintain long-term repopulating capacity of SLAM-enriched HSC populations has not been reported. In this study, SLAM-enriched HSCs were assessed for transduction efficiency and in vivo long-term repopulating capacity after lentiviral transduction using an abbreviated transduction protocol and KSL-enriched HSCs as a reference population. SLAM- and KSL-enriched HSCs were efficiently transduced by lentiviral vector using a simple protocol that involves minimal in vitro manipulation and no pre-stimulation. SLAM-HSCs are at least equal to KSL-HSCs with respect to efficiency of transduction and maintenance of long-term repopulating capacity. Although there was a reduction in repopulating capacity related to enrichment and culture manipulations relative to freshly isolated bone marrow (BM) cells, no detrimental effects were identified on long-term competitive capacity related to transduction, as transduced cells maintained stable levels of chimerism in competition with non-transduced cells and freshly isolated BM cells. These results support the SLAM-HSC enrichment protocol as a simple and efficient method for HSC enrichment for gene transfer studies.

  11. Analysis of Enhanced Associativity Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Said A. Shaar

    2006-01-01

    Full Text Available This study introduces an analysis to the performance of the Enhanced Associativity Based Routing protocol (EABR based on two factors; Operation complexity (OC and Communication Complexity (CC. OC can be defined as the number of steps required in performing a protocol operation, while CC can be defined as the number of messages exchanged in performing a protocol operation[1]. The values represent the worst-case analysis. The EABR has been analyzed based on CC and OC and the results have been compared with another routing technique called ABR. The results have shown that EABR can perform better than ABR in many circumstances during the route reconstruction.

  12. Identity-based authentication protocol for grid

    Institute of Scientific and Technical Information of China (English)

    Li Hon; Sun Shixin; Yang Homiao

    2008-01-01

    Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol(SAP).The authentication process is very complicated,and therefore,the grid user is in a heavily loaded point both in computation and in communication.Based on identity-based architecture for grid(IBAG)and corre-sponding encryption and signature schemes,an identity-based authentication protocol for grid is proposed.Being certificate-free,the authentication protocol aligns well with the demands of grid computing.Through simulation testing,it is seen that the authentication protocol is more lightweight and efficient than SAP,especially the more lightweight user side.This contributes to the larger grid scalability.

  13. 77 FR 13367 - General Electric-Hitachi Global Laser Enrichment, LLC, Proposed Laser-Based Uranium Enrichment...

    Science.gov (United States)

    2012-03-06

    ... COMMISSION General Electric-Hitachi Global Laser Enrichment, LLC, Proposed Laser-Based Uranium Enrichment...- Hitachi Global Laser Enrichment, LLC (GLE) Uranium Enrichment Facility. On June 26, 2009, GLE submitted a... uranium enrichment facility (the ``proposed action''). The GLE proposes to locate the facility on...

  14. 77 FR 14838 - General Electric-Hitachi Global Laser Enrichment LLC, Commercial Laser-Based Uranium Enrichment...

    Science.gov (United States)

    2012-03-13

    ... COMMISSION General Electric-Hitachi Global Laser Enrichment LLC, Commercial Laser-Based Uranium Enrichment... applicant) to authorize construction of a laser-based uranium enrichment facility and possession and use of...-based uranium enrichment facility. Revisions to the application were submitted on March 23, 2010;...

  15. GOMA: functional enrichment analysis tool based on GO modules

    Institute of Scientific and Technical Information of China (English)

    Qiang Huang; Ling-Yun Wu; Yong Wang; Xiang-Sun Zhang

    2013-01-01

    Analyzing the function of gene sets is a critical step in interpreting the results of high-throughput experiments in systems biology.A variety of enrichment analysis tools have been developed in recent years,but most output a long list of significantly enriched terms that are often redundant,making it difficult to extract the most meaningful functions.In this paper,we present GOMA,a novel enrichment analysis method based on the new concept of enriched functional Gene Ontology (GO) modules.With this method,we systematically revealed functional GO modules,i.e.,groups of functionally similar GO terms,via an optimization model and then ranked them by enrichment scores.Our new method simplifies enrichment analysis results by reducing redundancy,thereby preventing inconsistent enrichment results among functionally similar terms and providing more biologically meaningful results.

  16. Comment on "flexible protocol for quantum private query based on B92 protocol"

    Science.gov (United States)

    Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min

    2017-03-01

    In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.

  17. Cryptographic Protocols Based on Root Extracting

    DEFF Research Database (Denmark)

    Koprowski, Maciej

    In this thesis we design new cryptographic protocols, whose security is based on the hardness of root extracting or more speci cally the RSA problem. First we study the problem of root extraction in nite Abelian groups, where the group order is unknown. This is a natural generalization of the...... construction based on root extracting. As an example of this, we modify Cramer-Shoup signature scheme such that it becomes a genericm algorithm. We discuss then implementing it in RSA groups without the original restriction that the modulus must be a product of safe primes. It can also be implemented in class......,  providing a currently acceptable level of security. This allows us to propose the rst practical blind signature scheme provably secure, without relying on heuristics called random oracle model (ROM). We obtain the protocol for issuing blind signatures by implementing our modi ed Fischlin's signing algorithm...

  18. Performance Evaluation of MANET Routing Protocols Based on Internet Protocols

    Directory of Open Access Journals (Sweden)

    Hilal Bello Said,

    2015-11-01

    Full Text Available The topology of mobile ad hoc network (MANET changes rapidly and unpredictably due to nodes mobility. This makes routing protocols very important to analyze so as to communicate efficiently between the wireless nodes. Another important issue in the MANET is the internet protocols IPv4 and IPV6. The former which have been conventionally in use for long and the latter which is seen as the future standard for network architecture is studied due to its improved protection and huge address space support. In this paper, performance of AODV, DYMO, OLSRv2 and OLSR are analyzed under the IPv4 and IPv6 standards using the Qualnet simulator. Distinct performance metrics viz. Packet delivery ratio, Throughput, Average End-to-End Delay, and Average jitter are selected for the experiment. The results are then analyzed and scrutinized to provide qualitative assessment of their performances.

  19. Recovery of the Decorin-Enriched Fraction, Extract (D, From Human Skin: An Accelerated Protocol

    Directory of Open Access Journals (Sweden)

    Denys N. Wheatley

    2004-01-01

    Full Text Available The original extraction procedure of Engel and Catchpole [1] has often been used to recover decorin-enriched material from the skin. This material has a strong inhibitory effect on fibroblast proliferation, and clearly suppresses it in skin except after the first 5–6 days of wounding when new scaffold material is required. The aim of our present study has been to find and evaluate the product of a faster recovery method, and to check its consistency as a more reliable means of regularly obtaining sufficient material for topical application in wounds that might become hypertrophic. Modifications of the original Toole and Lowther [2] extraction procedure have been carefully evaluated in an attempt to cut preparation time without compromising biological activity of the inhibitory extract. We have devised a faster recovery procedure without compromising biological activity, even if initial recovery has been somewhat reduced. The latter problem could be offset by repeated cycles of the final extraction step. The main inhibitory activity is shown to be within the decorin-enriched “extract D,” as the core protein and DSPG II. Adjustment of the extract towards neutrality after dialysis against water keeps most of the extracted protein in solution and yielded a decorin-enriched preparation that had a specific activity equivalent to that of the old method. It also yielded a fraction that was readily lyophilised to give a small amount of material that could be stored indefinitely without loss of activity and readily redissolved in aqueous solution. A reliable and relatively quick method is presented for the production, from human skin, of a decorin-enriched preparation that has strong fibroblast inhibitory action. The value of the procedure is that it is inexpensive and can produce the quantities that might be used topically in reducing hypertrophic scarring of wounds.

  20. Comparison of CSMA based MAC protocols of wireless sensor networks

    CERN Document Server

    singh, Himanshu

    2012-01-01

    Energy conservation has been an important area of interest in Wireless Sensor networks (WSNs). Medium Access Control (MAC) protocols play an important role in energy conservation. In this paper, we describe CSMA based MAC protocols for WSN and analyze the simulation results of these protocols. We implemented S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, DMAC and Wise-MAC in TOSSIM, a simulator which unlike other simulators simulates the same code running on real hardware. Previous surveys mainly focused on the classification of MAC protocols according to the techniques being used or problem dealt with and presented a theoretical evaluation of protocols. This paper presents the comparative study of CSMA based protocols for WSNs, showing which MAC protocol is suitable in a particular environment and supports the arguments with the simulation results. The comparative study can be used to find the best suited MAC protocol for wireless sensor networks in different environments.

  1. An improved AODV routing protocol based on tower structure

    Directory of Open Access Journals (Sweden)

    Li Yong Qiang

    2016-01-01

    Full Text Available The paper proposed a new routing protocol(IAODV based on tower structure in the Ad Hoc network for the problem which Location Routing Protocol need hardware and Complex algorithm. By the simulation, The complexity of the new routing protocol is reduced without reducing the performance of the network.

  2. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco;

    2015-01-01

    a protocol language based on a dependent type system for message-passing parallel programs, which includes various communication operators, such as point-to-point messages, broadcast, reduce, array scatter and gather. For the verification of a program against a given protocol, the protocol is first...

  3. A Model Based Security Testing Method for Protocol Implementation

    Directory of Open Access Journals (Sweden)

    Yu Long Fu

    2014-01-01

    Full Text Available The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  4. Q-ESP: a QoS-compliant Security Protocol to enrich IPSec Framework

    CERN Document Server

    Mostafa, Mahmoud; Fraboul, Christian

    2009-01-01

    IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one aspect of this improvement is to take Quality of Service (QoS) requirements into account. QoS is the ability of the network to provide a service at an assured service level while optimizing the global usage of network resources. The QoS level that a flow receives depends on a six-bit identifier in the IP header; the so-called Differentiated Services code point (DSCP). Basically, Multi-Field classifiers classify a packet by inspecting IP/TCP headers, to decide how the packet should be processed. The current IPSec standard does hardly offer any guidance to do this, because the existing IPSec ESP security protocol hides much of this information in its encrypted payloads, preventing network control devices such as routers and switches from utilizing this information in performing classification appropriately. To solve this problem, we prop...

  5. Similarity based mixed transaction concurrency control protocol

    Institute of Scientific and Technical Information of China (English)

    PAN Yi; LU Yan-sheng

    2005-01-01

    Due to the various performance requirements and data access restrictions of different types of real-time transactions, concurrency control protocols which had been designed for the systems with single type of transactions are not sufficient for mixed real-time database systems (MRTDBS), where different types of real-time transactions coexist in the systems concurrently. In this paper, a new concurrency control protocol MRTT_CC for mixed real-time transactions is proposed. The new strategy integrates with different concurrency control protocols to meet the deadline requirements of different types of real-time transactions. The data similarity concept is also explored in the new protocol to reduce the blocking time of soft real-time transactions, which increases their chances to meet the deadlines. Simulation experiments show that the new protocol has gained good performance.

  6. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  7. Protocol Independent Multicast Based States Allocation

    Directory of Open Access Journals (Sweden)

    G Hemalatha

    2012-02-01

    Full Text Available In this paper the Protocol Independent Multicast (PIM protocol is being used. The PIM protocol avoids the packet drop and diverting problem. The PIM protocol is not dependent on any specific unicast routing protocol. It is IP routing independent protocol. The PIM uses the unicast and multicast information to create a distribution tree along the reverse path from the receivers towards the source. The PIM protocol consists of three modes such as sparse mode, dense mode and bidirectional mode. The sparse mode is used to sends the file from router to a receiver. The dense mode is used to sends the file from router to multiple receivers. The bidirectional mode is used to sends the message from router to sender and then continue the other process depending on the sender requirements. The client sends the file from sender to destination via the router. First the sender selects the file name and receiver name for transmission. Then the state is assigned automatically depend upon the user selection. The state can be defined by the number of destination selected to transmit the file from the source. If the sender selects single destination, it will assign “Without forwarding state router” for transmission. Otherwise it will assign “Forwarding state router” for transmission. If the receiver is not available, the router sends a message to sender such that “the requested receiver is not available”. Then the client will decide the file is transfer or not, it will reply with transfer the file, then the file will be transferred until the file will be discarded at client side. If the sender tries the same process after two times, the router will display the warning message as “the requested receiver is not available, this file will be discarded at client side”. Then it continues the other process.

  8. Atomic Electronic Contract Protocol Based on Convertible Signature

    Institute of Scientific and Technical Information of China (English)

    LIU Yi-chun; WANG Li-na; ZHANG Huan-guo

    2005-01-01

    A new class of atomicity, namely contract atomicity is presented. A new technical strategy based on convertible signature and two-phase commitment is proposed for implementing atomicity of electronic contract protocol. A new atomic contract signing protocol is given out by using ElGamal-like convertible undeniable signature and commitment of conversion key, and another new atomic contract signing protocol is brought forward by using RSA-based convertible undeniable signature scheme and commitment of conversion key.These two new protocols are proved to be of atomicity, fairness, privacy, non-repudiation.

  9. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  10. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco

    2015-01-01

    We present ParTypes, a type-based methodology for the verification of Message Passing Interface (MPI) programs written in the C programming language. The aim is to statically verify programs against protocol specifications, enforcing properties such as fidelity and absence of deadlocks. We develop...... a protocol language based on a dependent type system for message-passing parallel programs, which includes various communication operators, such as point-to-point messages, broadcast, reduce, array scatter and gather. For the verification of a program against a given protocol, the protocol is first...

  11. DSR-Based Selective Repeat ARQ Protocol in MANET

    Institute of Scientific and Technical Information of China (English)

    张全新; 宋瀚涛

    2003-01-01

    The efficient route algorithms involved in mobile ad hoc network(MANET) are studied. An arrangement of a combination of the traditional dynamic source routing(DSR) protocol is put forward and the selective repeat ARQ protocol is put forward by analyzing and studying them in detail and providing the scheme. In networks, especially in wireless networks, the nodes are capable to process data much faster than transmission, the DSR-based selective repeat ARQ protocol has real meanings in MANET.

  12. Quantum Private Comparison Protocol Based on Bell Entangled States

    Institute of Scientific and Technical Information of China (English)

    刘文; 王永滨; 崔巍

    2012-01-01

    In this paper,a quantum private comparison protocol is proposed based on bell entangled states.In our protocol,two parties can compare the equality of their information with the help of a semi-honest third party.The correctness and security of our protocol are discussed.One party cannot learn the other's private information and the third party also cannot learn any information about the private information.

  13. An evidence based blunt trauma protocol

    NARCIS (Netherlands)

    Vugt, R. van; Kool, D.R.; Lubeek, S.F.; Dekker, H.M.; Brink, M.; Deunk, J.; Edwards, M.J.R.

    2013-01-01

    OBJECTIVE: Currently CT is rapidly implemented in the evaluation of trauma patients. In anticipation of a large international multicentre trial, this study's aim was to evaluate the clinical feasibility of a new diagnostic protocol, used for the primary radiological evaluation in adult blunt high-en

  14. CCPA: Component-based communication protocol architecture for embedded systems

    Institute of Scientific and Technical Information of China (English)

    DAI Hong-jun; CHEN Tian-zhou; CHEN Chun

    2005-01-01

    For increased and various communication requirements of modem applications on embedded systems, general purpose protocol stacks and protocol models are not efficient because they are fixed to execute in the static mode. We present the Component-Based Communication Protocol Architecture (CCPA) to make communication dynamic and configurable. It can develop, test and store the customized components for flexible reuse. The protocols are implemented by component assembly and support by configurable environments. This leads to smaller memory, more flexibility, more reconfiguration ability, better concurrency, and multiple data channel support.

  15. Model Checking Electronic Commerce Security Protocols Based on CTL

    Institute of Scientific and Technical Information of China (English)

    XIAO De-qin; ZHANG Huan-guo

    2005-01-01

    We present a model based on Computational Temporal Logic (CTL) methods for verifying security requirements of electronic commerce protocols. The model describes formally the authentication, confidentiality integrity,non-repudiation, denial of service and access control of the electronic commerce protocols. We illustrate as case study a variant of the Lu-Smolka protocol proposed by Lu-Smolka.Moreover, we have discovered two attacks that allow a dishonest user to purchase a good debiting the amount to another user. And also, we compared our work with relative research works and found that the formal way of this paper is more general to specify security protocols for E-Commerce.

  16. An Internet Key Exchange Protocol Based on Public Key Infrastructure

    Institute of Scientific and Technical Information of China (English)

    朱建明; 马建峰

    2004-01-01

    Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs). Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services. In this paper, we concentrate on the properties of the protocol of Phase 1 IKE. After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI. Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol. The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.

  17. Network Management Temporal Database System Based on XTACACS Protocol

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    This paper first analyzes the basic concepts of Cisco router user certification, XTACACS certification protocol and describes the data architecture of user data protocol, then defines a kind of doubly temporal databases and log-in transaction processing based on network management property, at last, introduces implementation technology and method.

  18. Experimental Eavesdropping Attack against Ekert's Protocol based on Wigner's Inequality

    CERN Document Server

    Bovino, F A; Castagnoli, G C; Degiovanni, I P; Berchera, I R; Castelletto, S; Rastello, M L

    2003-01-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.

  19. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  20. A simplified and cost-effective enrichment protocol for the isolation of Campylobacter spp. from retail broiler meat without microaerobic incubation

    LENUS (Irish Health Repository)

    Zhou, Ping

    2011-08-03

    Abstract Background To simplify the methodology for the isolation of Campylobacter spp. from retail broiler meat, we evaluated 108 samples (breasts and thighs) using an unpaired sample design. The enrichment broths were incubated under aerobic conditions (subsamples A) and for comparison under microaerobic conditions (subsamples M) as recommended by current reference protocols. Sensors were used to measure the dissolved oxygen (DO) in the broth and the percentage of oxygen (O2) in the head space of the bags used for enrichment. Campylobacter isolates were identified with multiplex PCR assays and typed using pulsed-field gel electrophoresis (PFGE). Ribosomal intergenic spacer analyses (RISA) and denaturing gradient gel electrophoresis (DGGE) were used to study the bacterial communities of subsamples M and A after 48 h enrichment. Results The number of Campylobacter positive subsamples were similar for A and M when all samples were combined (P = 0.81) and when samples were analyzed by product (breast: P = 0.75; thigh: P = 1.00). Oxygen sensors showed that DO values in the broth were around 6 ppm and O2 values in the head space were 14-16% throughout incubation. PFGE demonstrated high genomic similarity of isolates in the majority of the samples in which isolates were obtained from subsamples A and M. RISA and DGGE results showed a large variability in the bacterial populations that could be attributed to sample-to-sample variations and not enrichment conditions (aerobic or microaerobic). These data also suggested that current sampling protocols are not optimized to determine the true number of Campylobacter positive samples in retail boiler meat. Conclusions Decreased DO in enrichment broths is naturally achieved. This simplified, cost-effective enrichment protocol with aerobic incubation could be incorporated into reference methods for the isolation of Campylobacter spp. from retail broiler meat.

  1. Quantum multi-signature protocol based on teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiao-jun; Liu Yun; Sun Yu [Beijing Jiaotong Univ., Beijing (China). School of Electronic Information Engineering

    2007-03-15

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  2. ADAPTIVE GOSSIP BASED PROTOCOL FOR ENERGY EFFICIENT MOBILE ADHOC NETWORK

    OpenAIRE

    S. Rajeswari; Venkataramani, Y.

    2012-01-01

    In Gossip Sleep Protocol, network performance is enhanced based on energy resource. But energy conservation is achieved with the reduced throughput. In this paper, it has been proposed a new Protocol for Mobile Ad hoc Network to achieve reliability with energy conservation. Based on the probability (p) values, the value of sleep nodes is fixed initially. The probability value can be adaptively adjusted by Remote Activated Switch during the transmission process. The adaptiveness of gossiping p...

  3. Sonication-based isolation and enrichment of Chlorella protothecoides chloroplasts for illumina genome sequencing

    Energy Technology Data Exchange (ETDEWEB)

    Angelova, Angelina [University of Arizona; Park, Sang-Hycuk [University of Arizona; Kyndt, John [Bellevue University; Fitzsimmons, Kevin [University of Arizona; Brown, Judith K [University of Arizona

    2013-09-01

    With the increasing world demand for biofuel, a number of oleaginous algal species are being considered as renewable sources of oil. Chlorella protothecoides Krüger synthesizes triacylglycerols (TAGs) as storage compounds that can be converted into renewable fuel utilizing an anabolic pathway that is poorly understood. The paucity of algal chloroplast genome sequences has been an important constraint to chloroplast transformation and for studying gene expression in TAGs pathways. In this study, the intact chloroplasts were released from algal cells using sonication followed by sucrose gradient centrifugation, resulting in a 2.36-fold enrichment of chloroplasts from C. protothecoides, based on qPCR analysis. The C. protothecoides chloroplast genome (cpDNA) was determined using the Illumina HiSeq 2000 sequencing platform and found to be 84,576 Kb in size (8.57 Kb) in size, with a GC content of 30.8 %. This is the first report of an optimized protocol that uses a sonication step, followed by sucrose gradient centrifugation, to release and enrich intact chloroplasts from a microalga (C. prototheocoides) of sufficient quality to permit chloroplast genome sequencing with high coverage, while minimizing nuclear genome contamination. The approach is expected to guide chloroplast isolation from other oleaginous algal species for a variety of uses that benefit from enrichment of chloroplasts, ranging from biochemical analysis to genomics studies.

  4. Characterization of gene mutations and copy number changes in acute myeloid leukemia using a rapid target enrichment protocol.

    Science.gov (United States)

    Bolli, Niccolò; Manes, Nicla; McKerrell, Thomas; Chi, Jianxiang; Park, Naomi; Gundem, Gunes; Quail, Michael A; Sathiaseelan, Vijitha; Herman, Bram; Crawley, Charles; Craig, Jenny I O; Conte, Natalie; Grove, Carolyn; Papaemmanuil, Elli; Campbell, Peter J; Varela, Ignacio; Costeas, Paul; Vassiliou, George S

    2015-02-01

    Prognostic stratification is critical for making therapeutic decisions and maximizing survival of patients with acute myeloid leukemia. Advances in the genomics of acute myeloid leukemia have identified several recurrent gene mutations whose prognostic impact is being deciphered. We used HaloPlex target enrichment and Illumina-based next generation sequencing to study 24 recurrently mutated genes in 42 samples of acute myeloid leukemia with a normal karyotype. Read depth varied between and within genes for the same sample, but was predictable and highly consistent across samples. Consequently, we were able to detect copy number changes, such as an interstitial deletion of BCOR, three MLL partial tandem duplications, and a novel KRAS amplification. With regards to coding mutations, we identified likely oncogenic variants in 41 of 42 samples. NPM1 mutations were the most frequent, followed by FLT3, DNMT3A and TET2. NPM1 and FLT3 indels were reported with good efficiency. We also showed that DNMT3A mutations can persist post-chemotherapy and in 2 cases studied at diagnosis and relapse, we were able to delineate the dynamics of tumor evolution and give insights into order of acquisition of variants. HaloPlex is a quick and reliable target enrichment method that can aid diagnosis and prognostic stratification of acute myeloid leukemia patients.

  5. A Secure Elliptic Curve-Based RFID Protocol

    Institute of Scientific and Technical Information of China (English)

    Santi Martínez; Magda Valls; Concepcó Roig; Josep M. Miret; Francesc Giné

    2009-01-01

    Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased.Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence, high confidence and efficient privacy protocols are urgently needed. Previous studies in the literature proposed schemes that are proven to be secure, but they have scalability problems. A feasible and scalable protocol to guarantee privacy is presented in this paper.The proposed protocol uses elliptic curve cryptography combined with a zero knowledge-based authentication scheme. An analysis to prove the system secure, and even forward secure is also provided.

  6. Protect the Secrecy in Password-Based Key Exchange Protocols

    Institute of Scientific and Technical Information of China (English)

    LILi; SUNHaibo; XUERui; ZHANGHuanguo

    2005-01-01

    This paper proposes a new model called term-node graph, which is a formal method based on Dolev-Yao model[15], to analyze this problem. In this framework, each node is a term of message exchang ingin the protocol and each edge denotes a relation between terms. Essentially, properties of security protocols are all relative to secrets. Based on this thought, term-node graph model emphasizes the relation between terms and then secrecy can come down to the problem of reachability of terms through some reachable paths. We conclude a generic form of three party password-only key exchange protocols. Applying this model to analyze the secrecy of the generic protoco4 a general necessary condition is deduced on the security of the three party password-only key exchange protocols: To resist the guessing attack on pass-words, the number of message-exchange steps among the three parties should be more than five.

  7. A native Bayesian classifier based routing protocol for VANETS

    Science.gov (United States)

    Bao, Zhenshan; Zhou, Keqin; Zhang, Wenbo; Gong, Xiaolei

    2016-12-01

    Geographic routing protocols are one of the most hot research areas in VANET (Vehicular Ad-hoc Network). However, there are few routing protocols can take both the transmission efficient and the usage of ratio into account. As we have noticed, different messages in VANET may ask different quality of service. So we raised a Native Bayesian Classifier based routing protocol (Naive Bayesian Classifier-Greedy, NBC-Greedy), which can classify and transmit different messages by its emergency degree. As a result, we can balance the transmission efficient and the usage of ratio with this protocol. Based on Matlab simulation, we can draw a conclusion that NBC-Greedy is more efficient and stable than LR-Greedy and GPSR.

  8. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  9. Electronic Voting Protocol Using Identity-Based Cryptography

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps. PMID:26090515

  10. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  11. Analysis and design of a smart card based authentication protocol

    Institute of Scientific and Technical Information of China (English)

    Kuo-Hui YEH; Kuo-Yu TSAI; Jia-Li HOU

    2013-01-01

    Numerous smart card based authentication protocols have been proposed to provide strong system security and robust individual privacy for communication between parties these days. Nevertheless, most of them do not provide formal analysis proof, and the security robustness is doubtful. Chang and Cheng (2011) proposed an efficient remote authentication protocol with smart cards and claimed that their proposed protocol could support secure communication in a multi-server environment. Unfortunately, there are opportunities for security enhancement in current schemes. In this paper, we identify the major weakness, i.e., session key disclosure, of a recently published protocol. We consequently propose a novel authentication scheme for a multi-server envi-ronment and give formal analysis proofs for security guarantees.

  12. ADAPTIVE GOSSIP BASED PROTOCOL FOR ENERGY EFFICIENT MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. Rajeswari

    2012-03-01

    Full Text Available In Gossip Sleep Protocol, network performance is enhanced based on energy resource. But energy conservation is achieved with the reduced throughput. In this paper, it has been proposed a new Protocol for Mobile Ad hoc Network to achieve reliability with energy conservation. Based on the probability (p values, the value of sleep nodes is fixed initially. The probability value can be adaptively adjusted by Remote Activated Switch during the transmission process. The adaptiveness of gossiping probability is determined by the Packet Delivery Ratio. For performance comparison, we have taken Routing overhead, Packet Delivery Ratio, Number of dropped packets and Energy consumption with the increasing number of forwarding nodes. We used UDP based traffic models to analyze the performance of this protocol. We analyzed TCP based traffic models for average end to end delay. We have used the NS-2 simulator.

  13. Survey of Performance based Transmission Control Protocol in MANET

    Directory of Open Access Journals (Sweden)

    Sapna Bagde

    2013-01-01

    Full Text Available Transmission Control Protocol (TCP is a connection-oriented transport service that ensures the reliability of message delivery. It verifies that messages and data were received. TCP provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer. TCP provides a communication service at an intermediate level between an application programs. TCP is the protocol used by major Internet applications such as the World Wide Web, email, remote administration and file transfer. TCP is a reliable transport protocol that is well tuned to perform well in traditional networks. However, several experiments and analysis have shown that this protocol is not suitable for bulk data transfer in high bandwidth, large round trip time networks because of its slow start and conservative congestion control mechanism. In this paper we discussed a survey of Performance Based Transmission Control Protocol in Mobile Ad-hoc Network environment. The performance based techniques are categorized based upon different approaches like throughput, end-to-end delay, congestion control etc. We also analysis the major improvement in recent methods for performance based TCP in MANET.

  14. Internet protocol-based emergency services

    CERN Document Server

    Schulzrinne, Henning

    2013-01-01

    Written by international experts in the field, this book covers the standards, architecture and deployment issues related to IP-based emergency services This book brings together contributions from experts on technical and operational aspects within the international standardisation and regulatory processes relating to routing and handling of IP-based emergency calls.  Readers will learn how these standards work, how various standardization organizations contributed to them and about pilot projects, early deployment and current regulatory situation. Key Featur

  15. A Signcryption based Light Weight Key Exchange Protocol

    Science.gov (United States)

    Feng, Yong; Wei, Qian; Zhang, Xing

    Traditional cryptography based authenticated Diffie-Hellman key exchange protocols expose the problems of efficiency and privacy since signature-then-encryption is heavy to wireless communication special for flexible dynamic deployment, i.e., wireless mesh networks, wireless sensor networks, mobile ad hoc networks, etc., in computational cost and communicational overhead and traditional digital signature allows anyone to verify its validity using the corresponding public key. In this paper, we propose a signcryption based light weight key exchange protocol named SLWKE which can provide resistance to traditional attacks, i.e., eavesdropping, deducing, replaying, interleaving, forging and repudiating, and unknown key-share attack and save computational cost by three modular calculations, i.e., one modular inversion, one modular addition and one modular multiplicative, included in a signature s and communicational overhead by secure length of IqI in comparison to signcryption based direct key exchange using a time-stamp protocol termed Dkeuts.

  16. Some Attacks On Quantum-based Cryptographic Protocols

    CERN Document Server

    Lo, H K; Lo, Hoi-Kwong; Ko, Tsz-Mei

    2003-01-01

    Quantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental laws of physics. However, subtle attacks that are outside the original design of the protocols may allow eavesdroppers to break those protocols. As an example, we will give a peeking attack against a quantum key distribution scheme based on quantum memory. Moreover, if technological assumptions are made in the design of a quantum-based cryptographic protocol, then the actual security of the protocol may fall short of expectations. This is because it is often hard to quantify those technological assumptions in a precise manner. Here, we give an attack against a recently proposed ``secure communication using coherent state scheme''. Our attack requires only beamsplitters and the replacement of a lossy channel by a lossless one. It is successful provided that the original loss in the channel is so big that Eve can obtain 2^k copies of what Bob receives, where k is the length of the seed key pre-shared by Alice an...

  17. A Lock—Based Cache Coherence Protocol for Scope Consistency

    Institute of Scientific and Technical Information of China (English)

    胡伟武; 施巍松; 等

    1998-01-01

    Directory protocols are widely adopted to maintain cache coherence of distributed shared memory multiprocessors.Although scalable to a certain extent,directory protocols are complex enough to prevent it from being used in very large scale multiprocessors with tens of thousands of nodes.his paper proposes a lock-based cache coherence protocol for scope consistency.In does not rely on directory information to maintain cache coherence.Instead,cache coherence is maintained through requiring the releasing processor of a lock to stroe all write-notices generated in the associated critical section to the lock and the acquiring processor invalidates or updates its locally cached data copies according to the write notices of the lock.To evaluate the performance of the lock-based cache coherence protocol,a software SDM system named JIAJIA is built on network of workstations.Besides the lock-based cache coherence protocol,JIAJIA also characterizes itself with its shared memory organization scheme which combines the physical memories of multiple workstations to form a large shared space.Performance measurements with SPLASH2 program suite and NAS benchmarks indicate that,compared to recent SVM systems such as CVM,higher speedup is achieved by JIAJIA.Besides,JIAJIA can solve large scale problems that cannot be solved by other SVM systems due to memory size limitation.

  18. A Knowledge—Based Specification Technique for Protocol Development

    Institute of Scientific and Technical Information of China (English)

    张尧学; 史美林; 等

    1993-01-01

    is paper proposes a knowledge-based specification technique(KST)for protocol development.This technique semi-automatically translates a protocol described in an informal description(natural languages or graphs)into one described in forml specifications(Estells and SDL).The translation processes are suported by knowledge stored in the knowledge base.This paper discusses the concept,the specification control mechanism of KST and the rules and algorithms for production of FSM's which is the basis of Estelle and SDL.

  19. Growth differences and competition between Listeria monocytogenes strains determine their predominance on ham slices and lead to bias during selective enrichment with the ISO protocol.

    Science.gov (United States)

    Zilelidou, Evangelia; Manthou, Evanthia; Skandamis, Panagiotis

    2016-10-17

    Listeria monocytogenes strains are widespread in the environment where they live well mixed, often resulting in multiple strains contaminating a single food sample. The occurrence of different strains in the same food might trigger strain competition, contributing to uneven growth of strains in food and to bias during selective procedures. We tested the growth of seven L. monocytogenes strains (C5, 6179, ScottA, PL24, PL25, PL26, PL27) on ham slices and on nutrient-rich agar at 10°C, singly and in combinations. Strains were made resistant to different antibiotics for their selective enumeration. In addition, growth of single strains (axenic culture) and competition between strains in xenic cultures of two strains was evaluated in enrichment broth and on selective agar. According to ISO 11290-1:1996/Amd 1:2004 standard protocol for detection of L. monocytogenes, two enrichment steps both followed by streaking on ALOA were performed. Strain cultures were directly added in the enrichment broth or used to inoculate minced beef and sliced hams which were then mixed with enrichment broth. 180-360 colonies were used to determine the relative percentage of each strain recovered on plates per enrichment step. The data showed a significant impact of co-cultivation on the growth of six out of seven strains on ham and a bias towards certain strains during selective enrichment. Competition was manifested by: (i) cessation of growth for the outcompeted strain when the dominant strain reached stationary phase, (ii) reduction of growth rates or (iii) total suppression of growth (both on ham and in enrichment broth or ALOA). Outgrowth of strains by their competitors on ALOA resulted in limited to no recovery, with the outcompeting strain accounting for up to 100% of the total recovered colonies. The observed bias was associated with the enrichment conditions (i.e. food type added to the enrichment broth) and the strain-combination. The outcome of growth competition on food or

  20. GROUP: A gossip based building community protocol

    OpenAIRE

    Baraglia R.; Dazzi P.; Mordacchini M.; Ricci L; Alessi L.

    2011-01-01

    The detection of communities of peers characterized by similar interests is currently a challenging research area. To ease the diffusion of relevant data to interested peers, similarity based overlays define links between similar peers by exploiting a similarity function. However, existing solutions neither give a clear definition of peer communities nor define a clear strategy to partition the peers into communities. As a consequence, the spread of the information cannot be confined within a...

  1. CRPCG—Clustering Routing Protocol based on Connected Graph

    Directory of Open Access Journals (Sweden)

    Feng Li

    2011-05-01

    Full Text Available In order to balance the load between cluster head, save the energy consumption of the inter-cluster routing, enhance reliability and flexibility of data transmission, the paper proposes a new clustering routing protocol based on connected graph (CRPCG. The protocol optimizes and innovates in three aspects: cluster head election, clusters formation and clusters routing. Eventually, a connected graph is constituted by the based station and all cluster heads, using the excellent algorithm of the graph theory, to guarantee the network connectivity and reliability, improve the link quality, balance node energy and prolong the network life cycle. The results of simulation show that, the protocol significantly prolong the network life cycle, balance the energy of network nodes, especially in the phase of inter-cluster data transmission, improving the reliability and efficiency of data transmission.

  2. A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols

    Science.gov (United States)

    Sharma, Vishal; Thapliyal, Kishore; Pathak, Anirban; Banerjee, Subhashish

    2016-11-01

    The effect of noise on various protocols of secure quantum communication has been studied. Specifically, we have investigated the effect of amplitude damping, phase damping, squeezed generalized amplitude damping, Pauli type as well as various collective noise models on the protocols of quantum key distribution, quantum key agreement, quantum secure direct quantum communication and quantum dialogue. From each type of protocol of secure quantum communication, we have chosen two protocols for our comparative study: one based on single-qubit states and the other one on entangled states. The comparative study reported here has revealed that single-qubit-based schemes are generally found to perform better in the presence of amplitude damping, phase damping, squeezed generalized amplitude damping noises, while entanglement-based protocols turn out to be preferable in the presence of collective noises. It is also observed that the effect of noise depends upon the number of rounds of quantum communication involved in a scheme of quantum communication. Further, it is observed that squeezing, a completely quantum mechanical resource present in the squeezed generalized amplitude channel, can be used in a beneficial way as it may yield higher fidelity compared to the corresponding zero squeezing case.

  3. MULTIPLE ELECTRONIC CONTROL UNITS CALIBRATION SYSTEM BASED ON EXPLICIT CALIBRATION PROTOCOL AND J1939 PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    YANG Shiwei; ZHU Keqing; XU Quankui; YANG Lin; ZHUO Bin

    2008-01-01

    The rising number of electronic control units (ECUs) in vehicles and the decreasing time to market have led to the need for advanced methods of calibration. A multi-ECU calibration system was developed based on the explicit calibration protocol (XCP) and J1939 communication protocol to satisfy the need of calibrating multiple ECUs simultaneously. The messages in the controller area network (CAN) are defined in the J1939 protocol. Each CAN node can get its own calibration messages and information from other ECUs, and block other messages by qualifying the CAN messages with priority, source or destination address. The data field of the calibration message is designed with the XCP , with CAN acting as the transport layer. The calibration sessions are setup with the event-triggered XCP driver in the master node and the responding XCP driver in the slave nodes. Mirroring calibration variables from ROM to RAM enables the user to calibrate ECUs online. The application example shows that the multi-ECU calibration system can calibrate multiple ECUs simultaneously, and the main program can also accomplish its calculation and send commands to the actuators in time. By the multi-ECU calibration system, the calibration effort and time can be reduced and the variables in ECU can get a better match with the variables of other ECUs.

  4. Quantum Encryption Protocol Based on Continuous Variable EPR Correlations

    Institute of Scientific and Technical Information of China (English)

    HE Guang-Qiang; ZENG Gui-Hua

    2006-01-01

    A quantum encryption protocol based on Gaussian-modulated continuous variable EPR correlations is proposed. The security is guaranteed by continuous variable EPR entanglement correlations produced by nondegenerate optical parametric amplifier (NOPA). For general beam splitter eavesdropping strategy, the mutual information Ⅰ(α, ε)between Alice and Eve is calculated by employing Shannon information theory. Finally the security analysis is presented.

  5. Security of a key agreement protocol based on chaotic maps

    Energy Technology Data Exchange (ETDEWEB)

    Han Song [Curtin University of Technology, G.P.O. Box U1987 Perth, WA 6845 (Australia)], E-mail: s.han@curtin.edu.au

    2008-11-15

    Kacorev et al. proposed new public key encryption scheme using chaotic maps. Subsequently, Bergamo et al. has broken Kacorev and Tasev's encryption scheme and then applied the attack on a key agreement protocol based on Kacorev et al.'s system. In order to address Bergamo et al.' attack, Xiao et al. proposed a novel key agreement protocol. In this paper, we will present two attacks on Xiao et al.'s key agreement protocol using chaotic maps. Our new attack method is different from the one that Bergamo et al. developed. The proposed attacks work in a way that an adversary can prevent the user and the server from establishing a shared session key even though the adversary cannot get any private information from the user and the server's communications.

  6. Reformative multicast routing protocol based on Ad Hoc

    Institute of Scientific and Technical Information of China (English)

    杨喜旺; 王华; 焦国太

    2008-01-01

    Mobile Ad Hoc networks has been widely applied to military field, emergency management, public service and so on. Because it is uncertain on network and communication, a great deal of energy will be consumed with nodes increasing and creating routing each other. The reformative on-demand multicast routing protocol was putted forward by researching the energy consuming of multicast routing protocol in Ad Hoc. It will decrease consumption in a big multicast flooding through studying the relaying group net structure based on map or wormhole. The energy consumption is reduced 30% by creating the two kinds of routing principles: minimization of energy consumption and minimization of maximum nodes energy consumption. The simulation result indicates that the reformative RODMRP is effective to reduce the energy consuming while routing protocol built.

  7. FFT-DMAC:a tone based DMAC protocol

    Institute of Scientific and Technical Information of China (English)

    Li Ying; Li Minglu; Shu Wei; Wu Minyou

    2009-01-01

    This paper presents the flip-flop tone (FFT) DMAC protocol, a tone based MAC protocol using directional antennas to solve the deafness problem, hidden terminal and exposed terminal problems simultaneously. It uses two pairs of flip-flop tones. The first pair of tone is to send omni-directionally to reach every neighboring node to announce the start and the end of communication, and therefore to alleviate the deafness problem. The second pair of tone is to send directionally towards the sender. It is used to solve the hidden terminal problem as well as the exposed terminal problem. Evaluation shows that FFT-DMAC can achieve better performance compared to the 802.11 and ToneDMAC protocol.

  8. Resin-assisted enrichment of thiols as a general strategy for proteomic profiling of cysteine-based reversible modifications

    Energy Technology Data Exchange (ETDEWEB)

    Guo, Jia [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gaffrey, Matthew J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Su, Dian [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Genentech Inc., South San Francisco, CA (United States); Liu, Tao [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Camp, David G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Smith, Richard D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Qian, Weijun [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2013-12-12

    Reversible modifications on cysteine thiols play a significant role in redox signaling and regulation. A number of reversible redox modifications, including disulfide formation, S-nitrosylation, and S-glutathionylation, have been recognized for their significance in various physiological and pathological processes. Here we describe in detail a resin-assisted thiol-affinity enrichment protocol for both biochemical and proteomics applications. This protocol serves as a general approach for specific isolation of thiol-containing proteins or peptides derived from reversible redox-modified proteins. This approach utilizes thiol-affinity resins to directly capture thiol-containing proteins or peptides through a disulfide exchange reaction followed by on-resin protein digestion and on-resin multiplexed isobaric labeling to facilitate LC-MS/MS based quantitative site-specific analysis of redox modifications. The overall approach requires a much simpler workflow with increased specificity compared to the commonly used biotin switch technique. By coupling different selective reduction strategies, the resin-assisted approach provides the researcher with a useful tool capable of enriching different types of reversible modifications on protein thiols. Procedures for selective enrichment and analyses of S-nitrosylation and total reversible cysteine oxidation are presented to demonstrate the utility of this general strategy.

  9. ID-based Key-insulated Authenticated Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHOU Yuan; CHENG Xiao-ming; CHAI Zhen-chuan

    2007-01-01

    The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information. Comparing with the traditional certificate-based cryptography, identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate. However, exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost. In this paper, an ID-based authenticated key agreement protocol was presented. For solving the problem of key exposure of the basic scheme, the technique of key insulation was applied and a key insulated version is developed.

  10. Addition of novobiocin in pre-enrichment step can improve Salmonella culture protocol of modified semisolid Rappaport-Vassiliadis

    DEFF Research Database (Denmark)

    Jensen, Annette Nygaard; Sørensen, Gitte; Baggesen, Dorte Lau

    2003-01-01

    The aim was to investigate the effect of addition of Novobiocin to the non-selective buffered peptone water (BPW) for pre-enrichment of Salmonella in connection with plating on modified semisolid Rappaport-Vassiliadis (MSRV). In a semi-quantitative study, the level of Salmonella following pre-enr...

  11. Location Based Opportunistic Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jubin Sebastian E

    2012-01-01

    Full Text Available : Most existing ad hoc routing protocols are susceptible to node mobility, especially for large-scale networks. This paper proposes a Location Based Opportunistic Routing Protocol (LOR to addresses the problem of delivering data packets for highly dynamic mobile ad hoc networks in a reliable and timely manner.This protocol takes advantage of the stateless property of geographic routing and the broadcast nature of wireless medium. When a data packet is sent out, some of the neighbor nodes that have overheard the transmission will serve as forwarding candidates, and take turn to forward the packet if it is not relayed by the specific best forwarder within a certain period of time. By utilizing such in-the-air backup, communication is maintained without being interrupted. The additional latency incurred by local route recovery is greatly reduced and the duplicate relaying caused by packet reroute is also decreased. Simulation results on NS2 verified the effectiveness of the proposed protocol with improvement in throughput by 28%.

  12. A network monitor for HTTPS protocol based on proxy

    Science.gov (United States)

    Liu, Yangxin; Zhang, Lingcui; Zhou, Shuguang; Li, Fenghua

    2016-10-01

    With the explosive growth of harmful Internet information such as pornography, violence, and hate messages, network monitoring is essential. Traditional network monitors is based mainly on bypass monitoring. However, we can't filter network traffic using bypass monitoring. Meanwhile, only few studies focus on the network monitoring for HTTPS protocol. That is because HTTPS data is in the encrypted traffic, which makes it difficult to monitor. This paper proposes a network monitor for HTTPS protocol based on proxy. We adopt OpenSSL to establish TLS secure tunes between clients and servers. Epoll is used to handle a large number of concurrent client connections. We also adopt Knuth- Morris-Pratt string searching algorithm (or KMP algorithm) to speed up the search process. Besides, we modify request packets to reduce the risk of errors and modify response packets to improve security. Experiments show that our proxy can monitor the content of all tested HTTPS websites efficiently with little loss of network performance.

  13. A Secure Cloud-Based NFC Mobile Payment Protocol

    Directory of Open Access Journals (Sweden)

    Pardis Pourghomi

    2014-10-01

    Full Text Available Near Field Communication (NFC is one the most recent technologies in the area of application development and service delivery via mobile phone. NFC enables the mobile phone to act as identification and a credit card for customers. Dynamic relationships of NFC ecosystem players in an NFC transaction process make them partners in a way that sometimes they should share their access permissions on the applications that are running in the service environment. One of the technologies that can be used to ensure secure NFC transactions is cloud computing which offers wide range advantages compare to the use of a Secure Element (SE as a single entity in an NFC enabled mobile phone. In this paper, we propose a protocol based on the concept of NFC mobile payments. Accordingly, we present an extended version of the NFC cloud Wallet model [14], in which, the Secure Element in the mobile device is used for customer authentication whereas the customer's banking credentials are stored in a cloud under the control of the Mobile Network Operator (MNO. In this circumstance, Mobile Network Operator plays the role of network carrier which is responsible for controlling all the credentials transferred to the end user. The proposed protocol eliminates the requirement of a shared secret between the Point-of-Sale (POS and the Mobile Network Operator before execution of the protocol, a mandatory requirement in the earlier version of this protocol [16]. This makes it more practicable and user friendly. At the end, we provide a detailed analysis of the protocol where we discuss multiple attack scenarios.

  14. A Network Coding Based Routing Protocol for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xin Guan

    2012-04-01

    Full Text Available Due to the particularities of the underwater environment, some negative factors will seriously interfere with data transmission rates, reliability of data communication, communication range, and network throughput and energy consumption of underwater sensor networks (UWSNs. Thus, full consideration of node energy savings, while maintaining a quick, correct and effective data transmission, extending the network life cycle are essential when routing protocols for underwater sensor networks are studied. In this paper, we have proposed a novel routing algorithm for UWSNs. To increase energy consumption efficiency and extend network lifetime, we propose a time-slot based routing algorithm (TSR.We designed a probability balanced mechanism and applied it to TSR. The theory of network coding is introduced to TSBR to meet the requirement of further reducing node energy consumption and extending network lifetime. Hence, time-slot based balanced network coding (TSBNC comes into being. We evaluated the proposed time-slot based balancing routing algorithm and compared it with other classical underwater routing protocols. The simulation results show that the proposed protocol can reduce the probability of node conflicts, shorten the process of routing construction, balance energy consumption of each node and effectively prolong the network lifetime.

  15. Evaluation of Methyl-Binding Domain Based Enrichment Approaches Revisited.

    Directory of Open Access Journals (Sweden)

    Karolina A Aberg

    Full Text Available Methyl-binding domain (MBD enrichment followed by deep sequencing (MBD-seq, is a robust and cost efficient approach for methylome-wide association studies (MWAS. MBD-seq has been demonstrated to be capable of identifying differentially methylated regions, detecting previously reported robust associations and producing findings that replicate with other technologies such as targeted pyrosequencing of bisulfite converted DNA. There are several kits commercially available that can be used for MBD enrichment. Our previous work has involved MethylMiner (Life Technologies, Foster City, CA, USA that we chose after careful investigation of its properties. However, in a recent evaluation of five commercially available MBD-enrichment kits the performance of the MethylMiner was deemed poor. Given our positive experience with MethylMiner, we were surprised by this report. In an attempt to reproduce these findings we here have performed a direct comparison of MethylMiner with MethylCap (Diagenode Inc, Denville, NJ, USA, the best performing kit in that study. We find that both MethylMiner and MethylCap are two well performing MBD-enrichment kits. However, MethylMiner shows somewhat better enrichment efficiency and lower levels of background "noise". In addition, for the purpose of MWAS where we want to investigate the majority of CpGs, we find MethylMiner to be superior as it allows tailoring the enrichment to the regions where most CpGs are located. Using targeted bisulfite sequencing we confirmed that sites where methylation was detected by either MethylMiner or by MethylCap indeed were methylated.

  16. Rapid enrichment of leucocytes and genomic DNA from blood based on bifunctional core shell magnetic nanoparticles

    Science.gov (United States)

    Xie, Xin; Nie, Xiaorong; Yu, Bingbin; Zhang, Xu

    2007-04-01

    A series of protocols are proposed to extract genomic DNA from whole blood at different scales using carboxyl-functionalized magnetic nanoparticles as solid-phase absorbents. The enrichment of leucocytes and the adsorption of genomic DNA can be achieved with the same carboxyl-functionalized magnetic nanoparticles. The DNA bound to the bead surfaces can be used directly as PCR templates. By coupling cell separation and DNA purification, the whole operation can be accomplished in a few minutes. Our simplified protocols proved to be rapid, low cost, and biologically and chemically non-hazardous, and are therefore promising for microfabrication of a DNA-preparation chip and routine laboratory use.

  17. Transputer-based architecture for ATM LAN protocol testing

    Science.gov (United States)

    Di Concetto, M.; Crocetti, P.; Marino, G.; Merli, E.; Pavesi, M.; Zizza, F.

    1993-10-01

    Local Area Networks (LANs) have completed two generations of development (Ethernet and Token Ring the first, and FDDI and DQDB the second); the large volumes of traffic involved in the emerging multimedia applications, however, lead towards a third generation of LANs. This generation must provide real-time capabilities needed by new services and solve the problems of interworking with ATM-based B-ISDN. Moreover the possibility to vary the subscribed bandwidth with the B-ISDN will be given to the LAN interfaces. This paper focuses on an architecture for protocol testing of a Dynamic Bandwidth Allocation Protocol inserted in a LAN environment based on ATM technology. In fact, the technology of the third LAN generation will be the Asynchronous Transfer Mode solving every interface problem with the public B-ISDN. A testing and debugging environment which checks the implementation of the Dynamic Bandwidth Allocation Protocol at the interface host/LAN- ATM is discussed. The main concepts of the overall system architecture are analyzed, evidencing both software and hardware issues.

  18. Streetlight Control System Based on Wireless Communication over DALI Protocol.

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-04-27

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  19. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Directory of Open Access Journals (Sweden)

    Francisco José Bellido-Outeiriño

    2016-04-01

    Full Text Available Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  20. Research of Video Steganalysis Algorithm Based on H265 Protocol

    Directory of Open Access Journals (Sweden)

    Wu Kaicheng

    2015-01-01

    This paper researches LSB matching VSA based on H265 protocol with the research background of 26 original Video sequences, it firstly extracts classification features out from training samples as input of SVM, and trains in SVM to obtain high-quality category classification model, and then tests whether there is suspicious information in the video sample. The experimental results show that VSA algorithm based on LSB matching can be more practical to obtain all frame embedded secret information and carrier and video of local frame embedded. In addition, VSA adopts the method of frame by frame with a strong robustness in resisting attack in the corresponding time domain.

  1. Modular approach to the design and analysis of password-based security protocols

    Institute of Scientific and Technical Information of China (English)

    FENG DengGuo; CHEN WeiDong

    2007-01-01

    In this paper, a general framework for designing and analyzing password-based security protocols is presented, First we introduce the concept of "weak computational indistinguishability" based on current progress of password-based security protocols. Then, we focus on cryptographic foundations for password-based security protocols, i.e., the theory of "weak pseudorandomness". Furthermore, based on the theory of weak pseudorandomness, we present a modular approach to design and analysis of password-based security protocols. Finally, applying the modular approach, we design two kinds of password-based security protocols, i.e.,password-based session key distribution (PSKD) protocol and protected password change (PPC) protocol. In addition to having forward secrecy and improved efficiency, new protocols are proved secure.

  2. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    Directory of Open Access Journals (Sweden)

    Jamal N. Al-Karaki

    2011-04-01

    Full Text Available The new characteristics of Wireless Multimedia Sensor Network (WMSN and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  3. Biopipe: a flexible framework for protocol-based bioinformatics analysis.

    Science.gov (United States)

    Hoon, Shawn; Ratnapu, Kiran Kumar; Chia, Jer-Ming; Kumarasamy, Balamurugan; Juguang, Xiao; Clamp, Michele; Stabenau, Arne; Potter, Simon; Clarke, Laura; Stupka, Elia

    2003-08-01

    We identify several challenges facing bioinformatics analysis today. Firstly, to fulfill the promise of comparative studies, bioinformatics analysis will need to accommodate different sources of data residing in a federation of databases that, in turn, come in different formats and modes of accessibility. Secondly, the tsunami of data to be handled will require robust systems that enable bioinformatics analysis to be carried out in a parallel fashion. Thirdly, the ever-evolving state of bioinformatics presents new algorithms and paradigms in conducting analysis. This means that any bioinformatics framework must be flexible and generic enough to accommodate such changes. In addition, we identify the need for introducing an explicit protocol-based approach to bioinformatics analysis that will lend rigorousness to the analysis. This makes it easier for experimentation and replication of results by external parties. Biopipe is designed in an effort to meet these goals. It aims to allow researchers to focus on protocol design. At the same time, it is designed to work over a compute farm and thus provides high-throughput performance. A common exchange format that encapsulates the entire protocol in terms of the analysis modules, parameters, and data versions has been developed to provide a powerful way in which to distribute and reproduce results. This will enable researchers to discuss and interpret the data better as the once implicit assumptions are now explicitly defined within the Biopipe framework.

  4. Administrator and Fidelity Based Secure Routing (AFSR Protocol in MANET

    Directory of Open Access Journals (Sweden)

    Rohit Singh

    2016-03-01

    Full Text Available The proliferation of mobile computing and communication devices are driving a revolutionary change in our information society. Among all the applications and services run by mobile devices, network connections and corresponding data services are without doubt the most demanded services by mobile users. A MANET is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires, which makes it ideal for the present scenario. But, due to lack of any centralized infrastructure and access to trusted authorities, the security in MANET poses a huge threat. The prominent routing protocols we know are generally designed for environments where the nodes within a network are non-malicious. Due to the vulnerable nature of the mobile ad hoc network, there are numerous security threats that disturb its development. We propose a protocol for MANETs named “Administrator and Fidelity Based Secure Routing Protocol” (AFSR, which ensures secure routing through the network: by electing an Administrator node on the basis of Willingness and Fidelity, after which a node only communicates to that secure Admin node. This selection of secured admin nodes results in mitigation of various threats. We have evaluated our proposed protocol by simulating and comparing in GloMoSim.

  5. A secure cluster-based multipath routing protocol for WMSNs.

    Science.gov (United States)

    Almalkawi, Islam T; Zapata, Manel Guerrero; Al-Karaki, Jamal N

    2011-01-01

    The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  6. Energy Band Based Clustering Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Prabhat Kumar

    2012-07-01

    Full Text Available Clustering is one of the widely used techniques to prolong the lifetime of wireless sensor networks in environments where battery replacement of individual sensor nodes is not an option after their deployment. However, clustering overheads such as cluster formation, its size, cluster head selection rotation, directly affects the lifetime of WSN. This paper introduces and analyzes a new Single Hop Energy Band Based clustering protocol (EBBCP which tries to minimize the above said overheads resulting in a prolonged life for the WSN. EBBCP works on static clusters formed on the basis of energy band in the setup phase. The protocol reduces per round overhead of cluster formation which has been proved by the simulation result in MATLAB. The paper contains an in-depth analysis of the results obtained during simulation and compares EBBCP with LEACH. Unlike LEACH, EBBCP achieves evenly distributed Cluster Head throughout the target area. This protocol also produces evenly distributed dead nodes. EEBCP beats LEACH in total data packet received and produces better network life time. EBBCP uses the concept of grid node to eliminate the need of position finding system like GPS to estimating the transmission signal strength.

  7. An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption

    Science.gov (United States)

    Zhang, Long; Sun, Hong-Wei; Zhang, Ke-Jia; Jia, Heng-Yue

    2017-03-01

    In this paper, a new quantum encryption based on the key-controlled chained CNOT operations, which is named KCCC encryption, is proposed. With the KCCC encryption, an improved arbitrated quantum signature (AQS) protocol is presented. Compared with the existing protocols, our protocol can effectively prevent forgery attacks and disavowal attacks. Moreover, only single state is required in the protocol. We hope it is helpful to further research in the design of AQS protocols in future.

  8. Geo-Based Inter-Domain Routing (GIDR) Protocol for MANETS

    Science.gov (United States)

    2009-10-01

    routing protocol such as DSDV, AODV is used. The GIDR inter- domain routing protocol chooses the routing path which is marked by red... routing protocols , the scenarios of Figure 7 and 8 have multiple domains, each of which runs different routing protocols , such as AODV , BELLMANFORD...GEO-BASED INTER-DOMAIN ROUTING (GIDR) PROTOCOL FOR MANETS Biao Zhou*, Abhishek Tiwari+, Konglin Zhu*, You Lu$, Mario Gerla*, Anurag Ganguli+,

  9. Cryptanalysis of Pasargad, A Distance Bounding Protocol Based on RFID System

    Directory of Open Access Journals (Sweden)

    Mahdi Azizi

    2012-08-01

    Full Text Available In this paper we analyze an authentication protocol so-called Pasargad which proposed by Arjemand et al. [1]. The Pasargad protocol is a distance bounding protocol which has been designed for RFID-based electronic voting systems. The designers have claimed that this protocol is more secure than Preneel and Single protocol [2], against relay attacks. However, in this paper, we present some efficient attacks against it. Our attacks include conditional impersonation attack and recovery key attack. Moreover, we show that this protocol has some structural flaw which may prevent to execution the protocol.

  10. Low Cost ZigBee Protocol Based Laboratory Platforms

    Directory of Open Access Journals (Sweden)

    Alvaro Romero-Acero

    2013-11-01

    Full Text Available This paper presents a low cost wireless communication platform, based on the ZigBee protocol. It is designed with the purpose to strengthen the use of information technology in the classroom. Guides laboratory practices are focused on developing undergraduate engineering students to the area of telecommunications. The platform structure is composed of: Labs custom designed, web tools embedded wireless communication system for data acquisition in real time, and the Human Machine Interface (HMI, which records analog data and digital. 

  11. Two RFID standard-based security protocols for healthcare environments.

    Science.gov (United States)

    Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E

    2013-10-01

    Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.

  12. A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Comparison of Routing Protocol for WSNs: Redundancy Based Approach

    Directory of Open Access Journals (Sweden)

    Anand Prakash

    2014-03-01

    Full Text Available Wireless Sensor Networks (WSNs with their dynamic applications gained a tremendous attention of researchers. Constant monitoring of critical situations attracted researchers to utilize WSNs at vast platforms. The main focus in WSNs is to enhance network localization as much as one could, for efficient and optimal utilization of resources. Different approaches based upon redundancy are proposed for optimum functionality. Localization is always related with redundancy of sensor nodes deployed at remote areas for constant and fault tolerant monitoring. In this work, we propose a comparison of classic flooding and the gossip protocol for homogenous networks which enhances stability and throughput quiet significantly.  

  13. ASYNCHRONOUS BYZANTINE AGREEMENT PROTOCOL BASED ON VERIFIABLE SIGNATURE SHARING

    Institute of Scientific and Technical Information of China (English)

    Ji Dongyao; Feng Dengguo

    2006-01-01

    An ([n / 3]- 1 )-resilient Asynchronous Byzantine Agreement Protocol (ABAP) that combines verifiable signature sharing and random secret sharing is proposed. The protocol works in the asynchronous network environment and produces Byzantine agreement within a fixed expected number of computational rounds. The correctness of the protocol is proved in theory.

  14. Reputation-based Incentive Protocols in Crowdsourcing Applications

    CERN Document Server

    Zhang, Yu

    2011-01-01

    Crowdsourcing websites (e.g. Yahoo! Answers, Amazon Mechanical Turk, and etc.) emerged in recent years that allow requesters from all around the world to post tasks and seek help from an equally global pool of workers. However, intrinsic incentive problems reside in crowdsourcing applications as workers and requester are selfish and aim to strategically maximize their own benefit. In this paper, we propose to provide incentives for workers to exert effort using a novel game-theoretic model based on repeated games. As there is always a gap in the social welfare between the non-cooperative equilibria emerging when workers pursue their self-interests and the desirable Pareto efficient outcome, we propose a novel class of incentive protocols based on social norms which integrates reputation mechanisms into the existing pricing schemes currently implemented on crowdsourcing websites, in order to improve the performance of the non-cooperative equilibria emerging in such applications. We first formulate the exchange...

  15. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    Science.gov (United States)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  16. Modeling Damage in Composite Materials Using an Enrichment Based Multiscale Method

    Science.gov (United States)

    2015-03-01

    Technical Report ARWSB-TR-15002 Modeling Damage in Composite Materials Using an Enrichment Based Multiscale Method Michael F...4. TITLE AND SUBTITLE Modeling Damage in Composite Materials Using an Enrichment Based Multiscale Method 5a. CONTRACT NUMBER 5b...the RVE and how microdamage can be incorporated into the model . For many applications the material used in the multiscale model is some type of fiber

  17. Data acquisition and meter unit based in wifi communication protocol

    Directory of Open Access Journals (Sweden)

    Gerardo Cázarez Ayala

    2012-05-01

    Full Text Available Without doubt, the competitive fast rhythm of the industries is one of the main causes helped bring to the accelerated growth of the electronic technology and the communication. The need to develop new products with a best quality, cheaper and faster as assure and increase the quality of the products in the international markets, requires of new technologies to the metering, monitoring and control of their production processes, of which finality is to improve the processes to guaranteed their products in the market in the less time possible, the best quality and low cost for the final consumer. This work is based in the design and implementation of a Wireless Data Acquisition Unit based in WiFi protocol, which is oriented to meter, monitoring and the control of processes in the industry, commercial and the home automation applications, using one of the wirelessprotocols with the biggest acceptance in the market, with the main objective of to take advantage of the installed physical infrastructure in the place of the application, like industry, company or house. The Unit is based in the RN-131G, a Roving Network company module, which is able to work in stand-alone mode with ultralow power consummation and supporting the IEEE 802.11b/g protocols, in which is possible to achieve transfer rates of up to 11 Mbps and 54 Mbps in /b & /g specifications respectively. Whit this unit is possible to meter up to 5 analogs signals with 14 bits precision and has include a temperature and relative humidity sensors. This unit can meter two digital signals and act mean two digitals outputs, and gas include an USB port for communication and programming tasks.

  18. A Data-origin Authentication Protocol Based on ONOS Cluster

    Directory of Open Access Journals (Sweden)

    Qin Hua

    2016-01-01

    Full Text Available This paper is aim to propose a data-origin authentication protocol based on ONOS cluster. ONOS is a SDN controller which can work under a distributed environment. However, the security of an ONOS cluster is seldom considered, and the communication in an ONOS cluster may suffer from lots of security threats. In this paper, we used a two-tier self-renewable hash chain for identity authentication and data-origin authentication. We analyse the security and overhead of our proposal and made a comparison with current security measure. It showed that with the help of our proposal, communication in an ONOS cluster could be protected from identity forging, replay attacks, data tampering, MITM attacks and repudiation, also the computational overhead would decrease apparently.

  19. TCP-Rab:a receiver advertisement based TCP protocol

    Institute of Scientific and Technical Information of China (English)

    汤旭红; 刘正蓝; 朱淼良

    2004-01-01

    With the evolution of network technologies,the deficiencies of TCP protocol are becoming more and more distinct. The new TCP implementation,called Receiver Advertisement Based TCP(TCP-Rab)proposed here to eliminate these deficiencies,adopts two basic mechanisms:(1)Bandwidth Estimation and(2)Immediate Recovery. Bandwidth estimation is carried out at the receiver,and the result is sent back to the sender via the acknowledgments. Immediate Recovery guarantees high performance even in lossy link. Rab can distinguish the reason for packet loss,and thus adopt appropriate recovery strategy. For loss by network congestion,it will back off its congestion window,and for loss by link errors,it will recover the congestion window immediately. Simulations indicated that Rah has superiority over other TCP implementations.

  20. TCP-Rab: a receiver advertisement based TCP protocol

    Institute of Scientific and Technical Information of China (English)

    汤旭红; 刘正蓝; 朱淼良

    2004-01-01

    With the evolution of network technologies, the deficiencies of TCP protocol are becoming more and more distinct. The new TCP implementation, called Receiver Advertisement Based TCP (TCP-Rab) proposed here to eliminate these deficiencies, adopts two basic mechanisms: (1) Bandwidth Estimation and (2) Immediate Recovery. Bandwidth estimation is carried out at the receiver, and the result is sent back to the sender via the acknowledgments. Immediate Recovery guarantees high performance even in lossy link. Rab can distinguish the reason for packet loss, and thus adopt appropriate recovery strategy. For loss by network congestion, it will back off its congestion window, and for loss by link errors, it will recover the congestion window immediately. Simulations indicated that Rab has superiority over other TCP implementations.

  1. Analysis of security protocols based on challenge-response

    Institute of Scientific and Technical Information of China (English)

    LUO JunZhou; YANG Ming

    2007-01-01

    Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the existing analysis methods,which either adopt theorem proving techniques such as state exploration or logic reasoning techniques such as authentication logic, face the conflicts between analysis power and operability. To solve the problem, a new efficient method is proposed that provides SSM semantics-based definition of secrecy and authentication goals and applies authentication logic as fundamental analysis techniques,in which secrecy analysis is split into two parts: Explicit-Information-Leakage and Implicit-Information-Leakage, and correspondence analysis is concluded as the analysis of the existence relationship of Strands and the agreement of Strand parameters. This new method owns both the power of the Strand Space Model and concision of authentication logic.

  2. Research on Communication Protocol Based on NOC Resources

    Directory of Open Access Journals (Sweden)

    Zhang Bo

    2012-01-01

    Full Text Available SoC design is based on Bus Structure. It can resolve the complex system and multi-processor system effectively. NoC applies the computer network technology on system structure, and it will deal with the complex SoC design. The paper presents a new Chip-Only-Writing Bus (COWB for the communication among the NoC resources. We define the communication protocol and data frame format for COWB. Utilizing MicroBlaze processor as the main resource, DDR2 controller and RS232 controller as the slave resources, the reliability of the COWB is verified with the Xilinx XUPV5 FPGA platform. The testing results show that COWB is easy to expand the number of slave resources and the main resource will access two slave resources simultaneously.

  3. Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    A detailed analysis has showed that the quantum secret sharing protocol based on the Grover algorithm (Phys Rev A, 2003, 68: 022306) is insecure. A dishonest receiver may obtain the full information without being detected. A quantum secret-sharing protocol is presents here, which mends the security loophole of the original secret-sharing protocol, and doubles the information capacity.

  4. Abstraction for Epistemic Model Checking of Dining Cryptographers-based Protocols

    CERN Document Server

    Al-Bataineh, Omar I

    2010-01-01

    The paper describes an abstraction for protocols that are based on multiple rounds of Chaum's Dining Cryptographers protocol. It is proved that the abstraction preserves a rich class of specifications in the logic of knowledge, including specifications describing what an agent knows about other agents' knowledge. This result can be used to optimize model checking of Dining Cryptographers-based protocols, and applied within a methodology for knowledge-based program implementation and verification. Some case studies of such an application are given, for a protocol that uses the Dining Cryptographers protocol as a primitive in an anonymous broadcast system. Performance results are given for model checking knowledge-based specifications in the concrete and abstract models of this protocol, and some new conclusions about the protocol are derived.

  5. Design and Implementation of Embedded Transmission Control Protocol/Internet Protocol Network Based on System-on-programmable Chip

    Institute of Scientific and Technical Information of China (English)

    LUO Yong; HAN Xiao-jun

    2008-01-01

    A scheme of transmission control protocol/Internet protocol(TCP/IP) network system based on system-on-programmable chip(SOPC) is proposed for the embedded network communication. In this system, Nios processor, Ethernet controller and other peripheral logic circuits are all integrated on a Stratix Ⅱ field programmable gate array(FPGA) chip by using SOPC builder design software. And the network communication is realized by transplanting MicroC/OS Ⅱ(μC/OS Ⅱ) operation system and light weight Internet protocol(LwIP). The design idea, key points and the structures of both software and hardware of the system are presented and ran with a telecommunication example. The experiment shows that the embedded TCP/IP network system has high reliability and real-time performance.

  6. A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles

    Institute of Scientific and Technical Information of China (English)

    Hai-Bo Tian; Willy Susilo; Yang Ming; Yu-Min Wang

    2008-01-01

    In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key confirmation keys so that there is no direct usage of hash functions in the protocol. The protocol is proved secure without random oracles in a variant of Bellare and Rogaway style model, an exception to current proof method in this style model in the ID-based setting. We believe that this key isolation method is novel and can be further studied for constructing more efficient protocols.

  7. An improved network layer protocol based on mobile IPv6

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The mobile [Pv6 proposed by the IETF aims at providing mobility support on the next generation Internet. First, the authors described the basic principle of mobile lPv6 in brief and analyzed the advantages and disadvantages of it, presented a new idea of allocating a specific address space for mobile node ( MN ) and developed a new extension header and two ICMP message types for mobile IPv6. Lastly the authors proposed an optimization strategy, for mobile IPv6 based on these extensions of protocol, which has the following advantages:1 ) It is more convenient to manage the MNs because MN can be judged from its IP address; 2) When the correspondent node (CN) is not actively communicating with a MN, the MN and its home agent (HA) need not send Binding Update to tire CN, and the CN need not send Binding Request to the MN. Only when the CN really wants to send a packet to the MN, will the CN voluntarily send a MN Discover Request message to acquire the MN's care-of address. In this way, the transmission of Binding Update and Binding Request is greatly reduced, consequently the network overhead is also decreased; 3) While sending packets, the CN simply uses a MN Home Address Extension Header without using IPinlP encapsulation and routing header, which can reduce the redundant information in the packet and the message delay; 4) All the packets sent by the CN can be directly routed to the MN and the triangle routing can be completely avoided. By using these protocol extensions, the overhead of the network is greatly reduced and the network quality of services (QoS) is improved.

  8. FUZZY LOGIC BASED ENERGY EFFICIENT PROTOCOL IN WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Zhan Wei Siew

    2012-12-01

    Full Text Available Wireless sensor networks (WSNs have been vastly developed due to the advances in microelectromechanical systems (MEMS using WSN to study and monitor the environments towards climates changes. In environmental monitoring, sensors are randomly deployed over the interest area to periodically sense the physical environments for a few months or even a year. Therefore, to prolong the network lifetime with limited battery capacity becomes a challenging issue. Low energy adaptive cluster hierarchical (LEACH is the common clustering protocol that aim to reduce the energy consumption by rotating the heavy workload cluster heads (CHs. The CHs election in LEACH is based on probability model which will lead to inefficient in energy consumption due to least desired CHs location in the network. In WSNs, the CHs location can directly influence the network energy consumption and further affect the network lifetime. In this paper, factors which will affect the network lifetime will be presented and the demonstration of fuzzy logic based CH selection conducted in base station (BS will also be carried out. To select suitable CHs that will prolong the network first node dies (FND round and consistent throughput to the BS, energy level and distance to the BS are selected as fuzzy inputs.

  9. Validation of Context Based Service Discovery Protocol for Ubiquitous Applications

    Directory of Open Access Journals (Sweden)

    Anandi Giridharan

    2012-11-01

    Full Text Available Service Discovery Protocol (SDP is important in ubiquitous applications, where a large number of devicesand software components collaborate unobtrusively and provide numerous services without userintervention. Existing service discovery schemes use a service matching process in order to offer services ofinterest to the users. Potentially, the context information of the users and surrounding environment can beused to improve the quality of service matching. We propose a C-IOB (Context- Information, Observationand Belief based service discovery model, which deals with the above challenges by processing the contextinformation and by formulating the beliefs based on the basis of observations. With these formulated beliefsthe required services will be provided to the users. In this work, we present an approach for automatedvalidation of C-IOB based service discovery model in a typical ubiquitous museum environment, where theexternal behavior of the system can be predicted and compared to a model of expected behavior from theoriginal requirements. Formal specification using SDL (Specification and Description Language basedsystem has been used to conduct verification and validation of the system. The purpose of this framework isto provide a formal basis for their performance evaluation and behavioral study of the SDP.

  10. An Agent-Based Auction Protocol on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Yu-Fang Chung

    2014-01-01

    Full Text Available This paper proposes an English auction protocol to preserve a secure, fair, and effective online auction environment, where the operations are integrated with mobile agent technology for bidders participating in online auctions. The protocol consists of four participants, namely, registration manager, agent house, auction house, and bidder.

  11. Cryptanalysis of Xinyu et al.'s NTRU-Lattice Based Key Exchange Protocol

    OpenAIRE

    Valluri, Maheswara Rao

    2016-01-01

    Xinyu et al. proposed a public key exchange protocol, which is based on the NTRU-lattice based cryptography. In this paper, we show how Xinyu et al.'s NTRU-KE: A lattice based key exchange protocol can be broken, under the assumption that a man-in-the middle attack is used for extracting private keys of users who participate in the key exchange protocol.

  12. Oxidative stability of fish oil-enriched mayonnaise-based salads

    DEFF Research Database (Denmark)

    Sørensen, Ann-Dorit Moltke; Nielsen, Nina Skall; Jacobsen, Charlotte

    2010-01-01

    The oxidative stability of fish oil-enriched mayonnaise-based salads and the influence of different vegetables in shrimp and tuna salads were evaluated. Moreover, the lipid oxidation in the presence of 1% oregano, rosemary, or thyme in fish oil-enriched tuna salad was assessed. The results obtained...... showed that the mayonnaise itself was more oxidatively stable without vegetables and tuna or shrimp, in spite of the higher oil content in mayonnaise (63 and 6.3% fish oil, respectively) compared to salads (∼24 and 2.4% fish oil, respectively). Surprisingly, the fish oil-enriched mayonnaise was only...... significantly different from the standard mayonnaise in the volatile concentration during the end of storage. In fish oil-enriched shrimp salad, asparagus had an anti-oxidative effect and shrimp a pro-oxidative effect, where the anti-oxidative effect of asparagus was strong enough to prevent the pro...

  13. An Efficient Agent-Based AODV Routing Protocol in MANET

    Directory of Open Access Journals (Sweden)

    Preeti Bhati,

    2011-07-01

    Full Text Available A MANET (Mobile Adhoc Network consists of a collection of mobile nodes communicating with each other without any fixed infrastructure such as access points or base stations. MANETS are self organizing or self restoring. Network topology in MANETS is subject to continuous and precipitous (unpredictable change. The limited bandwidth availability, energy constraints and highly dynamic topology make the routing process as exigent. The routing process in MANET relies (based on the cooperation of individual nodes which constitute the network. In this paper, we have tried to remove the existence of misbehaving nodes that may paralyze or slows down the routing operation in MANET. This increases the efficiency of a network. Efficiency can be calculated by the parameters or factors such astransmission capacity, battery power and scalability. Here we are considering the most crucial factor named as transmission capacity of a node. In MANET, as the network size increases complexity of anetwork also increases. To overcome this we make network as modular. So the network becomes task specific which refer to a particular work only. This is the reason of infusing the concept of agents in anefficient network. This proposed protocol provides the most efficient and reliable route which may or may not be minimum hop count.

  14. Management of the infertile couple: an evidence-based protocol

    Directory of Open Access Journals (Sweden)

    Kamel Remah M

    2010-03-01

    Full Text Available Abstract Background Infertility is defined as inability of a couple to conceive naturally after one year of regular unprotected sexual intercourse. It remains a major clinical and social problem, affecting perhaps one couple in six. Evaluation usually starts after 12 months; however it may be indicated earlier. The most common causes of infertility are: male factor such as sperm abnormalities, female factor such as ovulation dysfunction and tubal pathology, combined male and female factors and unexplained infertility. Objectives The aim of this study is to provide the healthcare professionals an evidence-based management protocol for infertile couples away from medical information overload. Methods A comprehensive review where the literature was searched for "Management of infertility and/or infertile couples" at library website of University of Bristol (MetaLib by using a cross-search of different medical databases besides the relevant printed medical journals and periodicals. Guidelines and recommendations were retrieved from the best evidence reviews such as that from the American College of Obstetricians and Gynaecologists (ACOG, American Society for Reproductive Medicine (ASRM, Canadian Fertility and Andrology Society (CFAS, and Royal College of Obstetricians and Gynaecologists (RCOG. Results A simple guide for the clinicians to manage the infertile couples. Conclusions The study deploys a new strategy to translate the research findings and evidence-base recommendations into a simplified focused guide to be applied on routine daily practice. It is an approach to disseminate the recommended medical care for infertile couple to the practicing clinicians.

  15. Identity-based authenticated key exchange protocols from the Tate pairing

    Science.gov (United States)

    Shen, Jun; Jin, Hong; Yang, Zhiyong; Cui, Xiang

    2011-12-01

    Key agreement protocols are designed to establish a session keys between two or multiple entities oven an insecure network and the session key is used to assure confidentiality thought encryption. With the advantages of identity-based (ID-based) cryptography, there have been many ID-based key agreement protocols proposed. However, most of them are based on Weil pairing, which is more cost of computation compared with Tate paring. In this paper, we propose a newly ID-based key agreement protocol from the Tate pairing. Compared with previous protocols, the new protocol minimizes the cost of computation with no extra message exchange time. In addition, the proposed protocol provides known key security, no key control, no key-compromise impersonation and perfect forward secrecy.

  16. The Project Based Mechanisms of the Kyoto Protocol. Credible Instruments or Challenges to the Integrity of the Kyoto Protocol?

    Energy Technology Data Exchange (ETDEWEB)

    Takeuchi Waldegren, Linn

    2006-03-15

    The project based mechanisms of the Kyoto Protocol are innovative instruments which allow projects to earn credits for reducing greenhouse gas (GHG) emissions. The credits can in turn be used by countries to reach their emissions targets according to the Kyoto Protocol. The Project based mechanisms are known as the Clean Development Mechanism (CDM) and the Joint Implementation (JI). If the project based mechanisms are to be effective policy instruments they must ensure the integrity of the Kyoto Protocol, and their ability to promote and prove real emission reductions is critical. The environmental credibility of the project based mechanisms will also ensure their ability to promote cost effectiveness. Key concepts in this context are environmental and project additionality, and their role and value for the project based mechanisms are analyzed. Environmental additionality is established by comparing a project's emissions to a baseline. The baseline's credibility is thus vital. The concept of project additionality is somewhat controversial, but is nonetheless of equal importance. The case studies of CDM approved methodologies (AMs) and proposed projects suggest that there are credibility issues that need to be addressed if the project based mechanisms are to promote real emissions reductions.

  17. The Improvement of RFID Authentication Protocols Based on R-RAPSE

    Directory of Open Access Journals (Sweden)

    QingLing Cai

    2014-01-01

    Full Text Available Numerous RFID authentication protocols proposed often have some security vulnerabilities, since they lack systematic theory support. We had proposed a series of rules called R-RAPSE (RFID Authentication Protocol Security Enhanced Rules for RFID authentication protocol design and verification. By three examples, this paper justifies why the protocols do not offer sufficient security and privacy protection, and thereafter, proposes relevant solutions to fix the security holes based on R-RAPSE, which demonstrates how R-RAPSE can be used to verify and improve RFID authentication protocols.

  18. Precision Time Protocol-Based Trilateration for Planetary Navigation

    Science.gov (United States)

    Murdock, Ron

    2015-01-01

    Progeny Systems Corporation has developed a high-fidelity, field-scalable, non-Global Positioning System (GPS) navigation system that offers precision localization over communications channels. The system is bidirectional, providing position information to both base and mobile units. It is the first-ever wireless use of the Institute of Electrical and Electronics Engineers (IEEE) Precision Time Protocol (PTP) in a bidirectional trilateration navigation system. The innovation provides a precise and reliable navigation capability to support traverse-path planning systems and other mapping applications, and it establishes a core infrastructure for long-term lunar and planetary occupation. Mature technologies are integrated to provide navigation capability and to support data and voice communications on the same network. On Earth, the innovation is particularly well suited for use in unmanned aerial vehicles (UAVs), as it offers a non-GPS precision navigation and location service for use in GPS-denied environments. Its bidirectional capability provides real-time location data to the UAV operator and to the UAV. This approach optimizes assisted GPS techniques and can be used to determine the presence of GPS degradation, spoofing, or jamming.

  19. Zone Based Routing Protocol for Homogeneous Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    S. Taruna

    2011-09-01

    Full Text Available Wireless Sensor Networks, are made of low-cost, low -power, small in size, and multifunctional sensor nodes. The efficient energy utilization is one of t he important performance factors for wireless senso r networks survivability be-cause nodes operate with limited battery power. In this paper we propose and analyze a new approach of zone based clustering hea d selection algorithm for wireless sensor network o f homogeneous nodes. Nodes in the network are uniform ly distributed. In this clustering algorithm, netwo rk performance is improved by selecting cluster heads on the basis of the residual energy of existing clu ster heads, and nearest hop distance of the node. In thi s paper we evaluate various performance metrics lik e energy consumption, network life time, number of ch annel heads metrics in each round and compare these with respect to random algorithm i.e. LEACH. We con clude that proposed protocol effectively extends th e network lifetime without degrading the other critic al overheads and perform-ance metrics.

  20. Petri Net-based Analysis of the Safety Communication Protocol

    Directory of Open Access Journals (Sweden)

    Liu Hongjie

    2013-10-01

    Full Text Available There is a few research in area of safety-critical system, therefore the study of performance analyzing method of the protocol has important practical significance for transportation engineering. This paper first briefly introduces the execution procedure of safety communication protocol, then explores the application of Petri net to establish the model of the protocol, including the process of state transition and corresponding timer which record the time, then obtains related performance data such as maintainability and failure probability, which users usually pay most attention to, with different probability of time delay and no fault in channel by simulation. Finally this paper finds that how the probability of time delay and no fault in channel could influent the maintainability and failure probability through data process with theory of probability and mathematical statistic, this could provide a certain reference for development of safety communication protocol.    

  1. COSR: A Reputation-Based Secure Route Protocol in MANET

    Directory of Open Access Journals (Sweden)

    Yang LaurenceT

    2010-01-01

    Full Text Available Now, the route protocols defined in the Mobile Ad Hoc Network (MANET are constructed in a common assumption which all nodes contained in such networks are trustworthy and cooperative. Once malicious or selfish nodes exist, all route paths built by these protocols must be broken immediately. According to the secure problems within MANET, this paper proposes Cooperative On-demand Secure Route (COSR, a novel secure source route protocol, against malicious and selfish behaviors. COSR measures node reputation (NR and route reputation (RR by contribution, Capability of Forwarding (CoF and recommendation upon Dynamic Source Route (DSR and uses RR to balance load to avoid hotpoint. Furthermore, COSR defines path collection algorithm by NR to enhance efficiency of protocol. At last, we verify COSR through GloMoSim. Results show that COSR is secure and stable.

  2. Internet-Protocol-Based Satellite Bus Architecture Designed

    Science.gov (United States)

    Slywczak, Richard A.

    2004-01-01

    NASA is designing future complex satellite missions ranging from single satellites and constellations to space networks and sensor webs. These missions require more interoperability, autonomy, and coordination than previous missions; in addition, a desire exists to have scientists retrieve data directly from the satellite rather than a central distribution source. To meet these goals, NASA has been studying the possibility of extending the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for spacebased applications.

  3. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Directory of Open Access Journals (Sweden)

    Alavalapati Goutham Reddy

    Full Text Available Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  4. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  5. Enriching location-based games with navigational game activities

    DEFF Research Database (Denmark)

    Nadarajah, Stephanie Githa; Overgaard, Benjamin Nicholas; Pedersen, Peder Walz

    2017-01-01

    Mobile location-based games are experiences that entertain its players by requiring interactions mainly at points of interest (POIs). Navigation between POIs often involve the use of either a physical or digital map, not taking advantage of the opportunity available to engage users in activities...

  6. Ultratrace DNA Detection Based on the Condensing-Enrichment Effect of Superwettable Microchips.

    Science.gov (United States)

    Xu, Li-Ping; Chen, Yanxia; Yang, Gao; Shi, Wanxin; Dai, Bing; Li, Guannan; Cao, Yanhua; Wen, Yongqiang; Zhang, Xueji; Wang, Shutao

    2015-11-18

    A sensitive nucleic acid detection platform based on superhydrophilic microwells spotted on a superhydrophobic substrate is fabricated. Due to the wettability differences, ultratrace DNA molecules are enriched and the fluorescent signals are amplified to allow more sensitive detection. The biosensing interface based on superwettable materials provides a simple and cost-effective way for ultratrace DNA sensing.

  7. Coexistence of WiFi and WiMAX systems based on PS-request protocols.

    Science.gov (United States)

    Kim, Jongwoo; Park, Suwon; Rhee, Seung Hyong; Choi, Yong-Hoon; Chung, Young-uk; Hwang, Ho Young

    2011-01-01

    We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol.

  8. A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications

    Institute of Scientific and Technical Information of China (English)

    JIANG Jun; HE Chen

    2005-01-01

    In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and "challenge-response" techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial procedure and real execution stage. Since the lightweight NTRU public key cryptography is employed, their protocol can not only overcome the security flaws of secret-key based authentication protocols such as those used in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols.

  9. A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    Science.gov (United States)

    Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  10. Assessment of lectin and HILIC based enrichment protocols for characterization of serum glycoproteins by mass spectrometry

    DEFF Research Database (Denmark)

    Calvano, Cosima D; Zambonin, Carlo G; Jensen, Ole Nørregaard

    2008-01-01

    glycosylation profiles are associated with certain human ailments. Glycoprotein analysis by mass spectrometry of biological samples, such as blood serum, is hampered by sample complexity and the low concentration of the potentially informative glycopeptides and -proteins. We assessed the utility of lectin...... of 63 glycosylation sites in 38 proteins were identified by both methods, demonstrating distinct differences and complementarity. Serial application of custom-made microcolumns of mixed, immobilized lectins proved efficient for recovery and analysis of glycopeptides from serum samples of breast cancer...

  11. Rare earth element enrichment using membrane based solvent extraction

    Science.gov (United States)

    Makertiharta, I. G. B. N.; Dharmawijaya, P. T.; Zunita, M.; Wenten, I. G.

    2017-01-01

    The chemical, catalytic, electrical, magnetic, and optical properties of rare earth elements are required in broad applications. Rare earth elements have similar physical and chemical properties thus it is difficult to separate one from each other. Rare earth element is relatively abundant in earth's crust but rarely occur in high concentrated deposits. Traditionally, ion-exchange and solvent extraction techniques have been developed to separate and purify single rare earth solutions or compounds. Recently, membrane starts to gain attention for rare earth separation by combining membrane and proven technologies such as solvent extraction. Membrane-based process offers selective, reliable, energy efficient and easy to scale up separation. During membrane-based separation process, one phase passes through membrane pores while the other phase is rejected. There is no direct mixing of two phases thus the solvent loss is very low. Membrane can also lower solvent physical properties requirement (viscosity, density) and backmixing, eliminate flooding phenomenon and provide large interfacial area for mass transfer. This paper will summarize research efforts in developing membrane technology for rare earth element separation. Special attention will be given to solvent extraction related process as the commonly used method for rare earth element separation. Furthermore, membrane configuration and its potentials will also be discussed.

  12. LMEEC: Layered Multi-Hop Energy Efficient Cluster-based Routing Protocol for Wireless Sensor Networks

    CERN Document Server

    Khelifi, Manel

    2012-01-01

    In this paper, we propose LMEEC, a cluster-based routing protocol with low energy consumption for wireless sensor networks. Our protocol is based on a strategy which aims to provide a more reasonable exploitation of the selected nodes (cluster-heads) energy. Simulation results show the effectiveness of LMEEC in decreasing the energy consumption, and in prolonging the network lifetime, compared to LEACH.

  13. A semantically enriched web usage based recommendation model

    CERN Document Server

    Ramesh, C; Govardhan, A

    2011-01-01

    With the rapid growth of internet technologies, Web has become a huge repository of information and keeps growing exponentially under no editorial control. However the human capability to read, access and understand Web content remains constant. This motivated researchers to provide Web personalized online services such as Web recommendations to alleviate the information overload problem and provide tailored Web experiences to the Web users. Recent studies show that Web usage mining has emerged as a popular approach in providing Web personalization. However conventional Web usage based recommender systems are limited in their ability to use the domain knowledge of the Web application. The focus is only on Web usage data. As a consequence the quality of the discovered patterns is low. In this paper, we propose a novel framework integrating semantic information in the Web usage mining process. Sequential Pattern Mining technique is applied over the semantic space to discover the frequent sequential patterns. Th...

  14. Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode

    Institute of Scientific and Technical Information of China (English)

    WANG ShengBao; CAO ZhenFu; CHENG ZhaoHui; CHOO Kim-KwangRaymond

    2009-01-01

    The majority of existing escrowable identity-based key agreement protocols only provide partial forward secrecy. Such protocols are, arguably, not suitable for many real-word applications, as the latter tends to require a stronger sense of forward secrecy-perfect forward secrecy. In this paper, we propose an efficient perfect forward-secure identity-based key agreement protocol in the escrow mode. We prove the security of our protocol in the random oracle model, assuming the intractability of the Gap Bilinear Diffie-Hellman (GBDH) problem.

  15. A mathematical analysis of the selective enrichment of NECEEM-based non-SELEX.

    Science.gov (United States)

    Yu, Xinliang; Yu, Yixiong

    2014-08-01

    Non-Systematic Evolution of Ligands by EXponential enrichment (SELEX)selection of aptamers, a novel technology for aptamer selection from libraries of random DNA (or RNA) sequences, involves repetitive steps of partitioning without polymerase chain reaction (PCR) amplification between them. This selection is based on non-equilibrium capillary electrophoresis of equilibrium mixtures (NECEEM) and has exceptionally high efficiency. In this paper, a mathematical analysis was carried out to predict the levels of enrichment of non-SELEX selection under different conditions such as different protein concentrations and different efficiencies of partitioning. Investigated results suggest that the magnitude of the bulk affinity (k d) being 10(4) or 10(5) μM for the initial pool has no obvious effect on selective enrichment and that the first, second, and third rounds of non-SELEX selection have different optimum protein concentration values [T f] that give maximum enrichment levels when [T f] ranges from 0.0005 to 0.5 μM. The significance of analyzing selective enrichment of NECEEM-based non-SELEX with the efficiency of partitioning target-bound ligands from free ligands has been demonstrated.

  16. Validation of internal dosimetry protocols based on stochastic method

    Energy Technology Data Exchange (ETDEWEB)

    Mendes, Bruno M.; Fonseca, Telma C.F., E-mail: bmm@cdtn.br [Centro de Desenvolvimento da Tecnologia Nuclear (CDTN/CNEN-MG), Belo Horizonte, MG (Brazil); Almeida, Iassudara G.; Trindade, Bruno M.; Campos, Tarcisio P.R., E-mail: tprcampos@yahoo.com.br [Universidade Federal de Minas Gerais (DEN/UFMG), Belo Horizonte, MG (Brazil). Departamento de Engenharia Nuclear

    2015-07-01

    Computational phantoms adapted to Monte Carlo codes have been applied successfully in radiation dosimetry fields. NRI research group has been developing Internal Dosimetry Protocols - IDPs, addressing distinct methodologies, software and computational human-simulators, to perform internal dosimetry, especially for new radiopharmaceuticals. Validation of the IDPs is critical to ensure the reliability of the simulations results. Inter comparisons of data from literature with those produced by our IDPs is a suitable method for validation. The aim of this study was to validate the IDPs following such inter comparison procedure. The Golem phantom has been reconfigured to run on MCNP5. The specific absorbed fractions (SAF) for photon at 30, 100 and 1000 keV energies were simulated based on the IDPs and compared with reference values (RV) published by Zankl and Petoussi-Henss, 1998. The SAF average differences from RV and those obtained in IDP simulations was 2.3 %. The SAF largest differences were found in situations involving low energy photons at 30 keV. The Adrenals and thyroid, i.e. the lowest mass organs, had the highest SAF discrepancies towards RV as 7.2 % and 3.8 %, respectively. The statistic differences of SAF applying our IDPs from reference values were considered acceptable at the 30, 100 and 1000 keV spectra. We believe that the main reason for the discrepancies in IDPs run, found in lower masses organs, was due to our source definition methodology. Improvements of source spatial distribution in the voxels may provide outputs more consistent with reference values for lower masses organs. (author)

  17. Designing a Clustering and Prediction-based Protocol for Target Tracking in Wireless Sensor Networks (WSNs

    Directory of Open Access Journals (Sweden)

    Vahid Hosseini

    2013-07-01

    Full Text Available Target tracking is one of the applications of wireless sensor network which is set up in the areas of field surveillance, habitat monitoring, and intruder tracking. Energy saving is one of the main challenges in target tracking sensor networks. In this paper, we present a Clustering and Prediction-Based Protocol (CPBP for Target Tracking in Wireless Sensor Networks (WSNs. Also, the Base Station (BS was exploited as a cluster formation manager and target movement predictor. Our protocol uses two parameters, distance and energy, for clustering algorithm. For evaluation, the proposed protocol was compared to a number of protocols in terms of network lifetime, number of transmitted packets and number of target miss during network lifetime. Performance of the proposed protocol was compared with cluster size 5 and 7. The simulation results represented desirable performance of the presented protocol.

  18. An Efficient Multi-Carrier Position-Based Packet Forwarding Protocol For Wireless Sensor Networks

    CERN Document Server

    Bader, Ahmed; Alouini, Mohamed-Slim

    2011-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the node density grows, the overhead incurred in the process of relay selection grows significantly. As such, end-to-end performance in terms of energy and latency is adversely impacted. With the motivation of developing a packet forwarding mechanism that is tolerant to node density, an alternative position-based protocol is proposed in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the underlying overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. The end-to-end performance of the proposed protocol is evaluated...

  19. Property Enrichment of Aged Nickel Base Superalloy Supercast 247A

    Directory of Open Access Journals (Sweden)

    Lavakumar Avala

    2013-12-01

    Full Text Available The commercial nickel-base superalloy Supercast 247A can be used for applications in which is required high mechanical strength and corrosion resistance at elevated temperatures, such as turbine blades and automotive turbocharger rotors. The mechanical properties are totally connected to the morphology, size and distribution of γ' phase and carbides. In order to improve the mechanical properties, the material is subjected to solution and aging heat treatment, to raise the volume fraction of γ' phase in the matrix and to form carbides at grain boundaries. In the present study the Supercast 247A superalloy was remelted and cast to obtain the desired polycrystalline test bars by controlling casting parameters, followed by the investigation of precipitation morphology and mechanical properties with respect to solution treatment and aging treatment. The experimental results show that by well controlled casting parameters the Supercast 247A owns excellent castability to form a superalloy with fine grain structure, resistance to indentation as well as superior strength.

  20. Wi-Fi Protocol Vulnerability Discovery Based on Fuzzy Testing

    Directory of Open Access Journals (Sweden)

    Kunhua Zhu

    2013-08-01

    Full Text Available To detect the wireless network equipment whether there is protocol vulnerability, using the method of modular design and implementation of a new suitable for Wi-Fi protocol vulnerability discovery fuzzy test framework. It can be independent of its transmission medium, produce deformity packet and implementation of the attack on the target system. The author firstly describes the wireless network protocol vulnerability discovery and fuzzy test in this paper,then focused on the test frame technical scheme, detailed technical realization and so on, and its application are analyzed. In the experimental stage the fuzzy test is applied to a wireless networks gateway, the test results show that the fuzzy test framework can be well applied to the wireless network equipment agreement loophole mining work.  

  1. Timer-based mechanisms in reliable transport protocol connection management: a comparison of the TCP and Delta-t protocol approaches

    Energy Technology Data Exchange (ETDEWEB)

    Watson, R.W.

    1980-02-19

    There is a need for timer-based mechanisms (other than retransmission timers) to achieve reliable connection management in transport protocols. This need is illustrated by comparing the timer mechanisms in the Department of Defense Transmission Control Protocol (TCP), initially designed using only a message exchange based mechanism, and in the Lawrence Livermore Laboratory Delta-t protocol, designed explicitly to be timer based. The bounding of maximum packet lifetime and related parameters for achieving transport protocol reliability are important, and a mechanism is outlined for enforcing such a bound.

  2. Improvement Of Aodv Routing Protocol Based On Wireless Networks

    OpenAIRE

    Baria Vanrajkumar Dineshkumar

    2012-01-01

    For wireless networks has no support infrastructure and shows a highly dynamic feature, routing becomes a key problem to be solved. Data packets are transmitted on a path that had least hops in AODV protocol. It couldn't consider the path stability. When the node of wireless networks moved quickly and the path had short lifetime, the path recovery and routing again is caused. It is a lot of network resource. For network performance, AODV_V that improvement of AODV protocol in the paper. Opnet...

  3. An efficient multi-carrier position-based packet forwarding protocol for wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the node density grows, the overhead incurred in the process of relay selection grows significantly. As such, end-to-end performance in terms of energy and latency is adversely impacted. With the motivation of developing a packet forwarding mechanism that is tolerant to variation in node density, an alternative position-based protocol is proposed in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the underlying overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. The end-to-end performance of the proposed protocol is evaluated against existing beaconless position-based protocols analytically and as well by means of simulations. The proposed protocol is demonstrated in this paper to be more efficient. In particular, it is shown that for the same amount of energy the proposed protocol transports one bit from source to destination much quicker. © 2012 IEEE.

  4. Foraging-Based Enrichment Promotes More Varied Behaviour in Captive Australian Fur Seals (Arctocephalus pusillus doriferus.

    Directory of Open Access Journals (Sweden)

    David P Hocking

    Full Text Available During wild foraging, Australian fur seals (Arctocephalus pusillus doriferus encounter many different types of prey in a wide range of scenarios, yet in captive environments they are typically provided with a narrower range of opportunities to display their full repertoire of behaviours. This study aimed to quantitatively explore the effect of foraging-based enrichment on the behaviour and activity patterns displayed by two captive Australian fur seals at Melbourne Zoo, Australia. Food was presented as a scatter in open water, in a free-floating ball device, or in a static box device, with each treatment separated by control trials with no enrichment. Both subjects spent more time interacting with the ball and static box devices than the scatter feed. The total time spent pattern swimming was reduced in the enrichment treatments compared to the controls, while the time spent performing random swimming behaviours increased. There was also a significant increase in the total number of bouts of behaviour performed in all three enrichment treatments compared to controls. Each enrichment method also promoted a different suit of foraging behaviours. Hence, rather than choosing one method, the most effective way to increase the diversity of foraging behaviours, while also increasing variation in general activity patterns, is to provide seals with a wide range of foraging scenarios where food is encountered in different ways.

  5. Pros and cons of methylation-based enrichment methods for ancient DNA

    DEFF Research Database (Denmark)

    Seguin-Orlando, Andaine; Gamba, Cristina; Der Sarkissian, Clio

    2015-01-01

    The recent discovery that DNA methylation survives in fossil material provides an opportunity for novel molecular approaches in palaeogenomics. Here, we apply to ancient DNA extracts the probe-independent Methylated Binding Domains (MBD)-based enrichment method, which targets DNA molecules contai...

  6. Inquiry-Based Science and Technology Enrichment Program for Middle School-Aged Female Students

    Science.gov (United States)

    Kim, Hanna

    2016-01-01

    This study investigates the effects of an intensive 1-week Inquiry-Based Science and Technology Enrichment Program (InSTEP) designed for middle school-aged female students. InSTEP uses a guided/open inquiry approach that is deepened and redefined as eight sciences and engineering practices in the Next Generation Science Standards, which aimed at…

  7. Enriching semantic knowledge bases for opinion mining in big data applications.

    Science.gov (United States)

    Weichselbraun, A; Gindl, S; Scharl, A

    2014-10-01

    This paper presents a novel method for contextualizing and enriching large semantic knowledge bases for opinion mining with a focus on Web intelligence platforms and other high-throughput big data applications. The method is not only applicable to traditional sentiment lexicons, but also to more comprehensive, multi-dimensional affective resources such as SenticNet. It comprises the following steps: (i) identify ambiguous sentiment terms, (ii) provide context information extracted from a domain-specific training corpus, and (iii) ground this contextual information to structured background knowledge sources such as ConceptNet and WordNet. A quantitative evaluation shows a significant improvement when using an enriched version of SenticNet for polarity classification. Crowdsourced gold standard data in conjunction with a qualitative evaluation sheds light on the strengths and weaknesses of the concept grounding, and on the quality of the enrichment process.

  8. An arbitrated quantum signature protocol based on the chained CNOT operations encryption

    Science.gov (United States)

    Li, Feng-Guang; Shi, Jian-Hong

    2015-06-01

    At present, the encryption scheme used by most arbitrated quantum signature (AQS) protocols is quantum one-time pad (QOTP) which encrypts data qubit by qubit. Though QOTP can achieve high security for data encryption, it is not suitable for AQS. There are many attacks on AQS using QOTP. In this paper, we propose an AQS protocol based on another encryption scheme called the chained CNOT operations, which encrypts quantum message ensemble. Our protocol preserves all merits in the similar AQS schemes and has better security. Security analysis shows that our protocol cannot be forged and disavowed under the existing attacks.

  9. A Study on the Distributed Antenna Based Heterogeneous Cognitive Wireless Network Synchronous MAC Protocol

    Directory of Open Access Journals (Sweden)

    Lian-Fen Huang

    2015-01-01

    Full Text Available This paper introduces distributed antennas into a cognitive radio network and presents a heterogeneous network. The best contribution of this paper is that it designs a synchronous cognitive MAC protocol (DAHCWNS-MAC protocol: distributed antenna based heterogeneous cognitive wireless network synchronous MAC protocol. The novel protocol aims at combining the advantages of cognitive radio and distributed antennas to fully utilize the licensed spectrum, broaden the communication range, and improve throughput. This paper carries out the mathematical modeling and performance simulation to demonstrate its superiority in improving the network throughput at the cost of increasing antenna hardware costs.

  10. Two new Controlled not Gate Based Quantum Secret Sharing Protocols without Entanglement Attenuation

    Science.gov (United States)

    Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min

    2016-05-01

    In this paper, we propose two new controlled not gate based quantum secret sharing protocols. In these two protocols, each photon only travels once, which guarantees the agents located in long distance can be able to derive the dealer's secret without suffering entanglement attenuation problem. The protocols are secure against trojan horse attack, intercept-resend attack, entangle-measure attack and entanglement-swapping attack. The theoretical efficiency for qubits of these two protocols can approach 100 %, except those used for eavesdropping checking, all entangled states can be used for final secret sharing.

  11. Does capillary racetrack-based enrichment reflect the diversity of uncultivated magnetotactic cocci in environmental samples?

    Science.gov (United States)

    Lin, Wei; Tian, Lanxiang; Li, Jinhua; Pan, Yongxin

    2008-02-01

    The racetrack-based PCR approach is widely used in phylogenetic analysis of magnetotactic bacteria (MTB), which are isolated from environmental samples using the capillary racetrack method. To evaluate whether the capillary racetrack-based enrichment can truly reflect the diversity of MTB in the targeted environmental sample, phylogenetic diversity studies of MTB enriched from the Miyun lake near Beijing were carried out, using both the capillary racetrack-based PCR and a modified metagenome-based PCR approach. Magnetotactic cocci were identified in the studied sample using both approaches. Comparative studies showed that three clusters of magnetotactic cocci were revealed by the modified metagenome-based PCR approach, while only one of them (e.g. MYG-22 sequence) was detected by the racetrack-based PCR approach from the studied sample. This suggests that the result of capillary racetrack-based enrichment might have been biased by the magnetotaxis of magnetotactic bacteria. It appears that the metagenome-based PCR approach better reflects the original diversity of MTB in the environmental sample.

  12. Communication protocol in chassis detecting wireless transmission system based on WiFi

    Science.gov (United States)

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  13. A Modified Protocol of Quantum Key Distribution Based on Entanglement Swapping

    Institute of Scientific and Technical Information of China (English)

    HUANG Xin; LI Shu-Min; WANG An-Min

    2007-01-01

    By comparing Cabello's addendum to his quantum key distribution protocol [Phys. Rev. A 64 (2001) 024301],we propose a more convenient modified protocol based on the entanglement swapping which is secure against the eavesdropping strategy addressed by Zhang et al. [Phys. Rev. A 63 (2001)036301] and other existing types of attack.

  14. Security Enhanced EMV-Based Mobile Payment Protocol

    Directory of Open Access Journals (Sweden)

    Ming-Hour Yang

    2014-01-01

    Full Text Available Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant’s reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer’s credits for risk control, and users can have online-equivalent credits in offline transactions.

  15. Security enhanced EMV-based mobile payment protocol.

    Science.gov (United States)

    Yang, Ming-Hour

    2014-01-01

    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions.

  16. Smart Traffic Management Protocol Based on VANET architecture

    Directory of Open Access Journals (Sweden)

    Amilcare Francesco Santamaria

    2014-01-01

    Full Text Available Nowadays one of the hottest theme in wireless environments research is the application of the newest technologies to road safety problems and traffic management exploiting the (VANET architecture. In this work, a novel protocol that aims to achieve a better traffic management is proposed. The overal system is able to reduce traffic level inside the city exploiting inter-communication among vehicles and support infrastructures also known as (V2V and (V2I communications. We design a network protocol called (STMP that takes advantages of IEEE 802.11p standard. On each road several sensors system are placed and they are responsible of monitoring. Gathered data are spread in the network exploiting ad-hoc protocol messages. The increasing knowledge about environment conditions make possible to take preventive actions. Moreover, having a realtime monitoring of the lanes it is possible to reveal roads and city blocks congestions in a shorter time. An external entity to the (VANET is responsible to manage traffic and rearrange traffic along the lanes of the city avoiding huge traffic levels.

  17. Exercise and nutrition routine improving cancer health (ENRICH: The protocol for a randomized efficacy trial of a nutrition and physical activity program for adult cancer survivors and carers

    Directory of Open Access Journals (Sweden)

    Boyes Allison

    2011-04-01

    Full Text Available Abstract Background The Exercise and Nutrition Routine Improving Cancer Health (ENRICH study is investigating a novel lifestyle intervention aimed at improving the health behaviors of adult cancer survivors and their carers. The main purpose of the study is to determine the efficacy of lifestyle education and skill development delivered via group-based sessions on the physical activity and dietary behaviors of participants. This article describes the intervention development, study design, and participant recruitment. Methods/Design ENRICH is a randomized controlled trial, conducted in Australia, with two arms: an intervention group participating in six, two-hour face-to-face sessions held over eight weeks, and a wait-list control group. Intervention sessions are co-facilitated by an exercise physiologist and dietician. Content includes healthy eating education, and a home-based walking (utilizing a pedometer and resistance training program (utilizing elastic tubing resistance devices. The program was developed with reference to social cognitive theory and chronic disease self-management models. The study population consists of cancer survivors (post active-treatment and their carers recruited through community-based advertising and referral from health professionals. The primary outcome is seven-days of sealed pedometry. Secondary outcomes include: self-reported physical activity levels, dietary intake, sedentary behavior, waist circumference, body mass index, quality of life, and perceived social support. The outcomes will be measured at baseline (one week prior to attending the program, eight-weeks (at completion of intervention sessions, and 20-weeks. The intervention group will also be invited to complete 12-month follow-up data collection. Process evaluation data will be obtained from participants by questionnaire and attendance records. Discussion No trials are yet available that have evaluated the efficacy of group-based lifestyle

  18. Evolutionary Based Type-2 Fuzzy Routing Protocol for Clustered Wireless Sensor

    Directory of Open Access Journals (Sweden)

    Maryam Salehi

    2016-06-01

    Full Text Available Power management is an important issue in wireless sensor network as the sensor nodes are battery-operated devices. For energy efficient data transmission, many routing protocols have been proposed. To achieve energy efficiency in wireless sensor networks, Clustering is an effective approach. In clustering routing protocol, Cluster heads are selected among all nodes within the wireless sensor networkand clusters are formed by assigning each node to the nearest cluster.Energy efficiency, network lifetime and uncertainties are the main drawbacks in clustering routing protocols.In this paper, a new clustering routing protocol named T2FLSBA is introduced to select optimal cluster heads. The proposed protocol is based on type-2 fuzzy logic system. To achieve the best performance based on the application, its parameters are tuned based on bat algorithm.The three important factors- residual energy, the density of neighbour sensor nodes and the distance to sink are taken into consideration as inputs of T2FLSBA protocol to compute the probability of a node to be a candidate cluster head. The simulation results show that the proposed routing protocol outperforms the existing clustering routing protocols in terms of prolonging the network lifetime and energy consumption of sensor nodes.

  19. Development of microsatellite markers for common bean (Phaseolus vulgaris L.) based on screening of non-enriched, small-insert genomic libraries.

    Science.gov (United States)

    Blair, Matthew W; Torres, Monica Muñoz; Pedraza, Fabio; Giraldo, Martha C; Buendía, Hector F; Hurtado, Natalia

    2009-09-01

    Microsatellite markers are useful genetic tools for a wide array of genomic analyses although their development is time-consuming and requires the identification of simple sequence repeats (SSRs) from genomic sequences. Screening of non-enriched, small-insert libraries is an effective method of SSR isolation that can give an unbiased picture of motif frequency. Here we adapt high-throughput protocols for the screening of plasmid-based libraries using robotic colony picking and filter preparation. Seven non-enriched genomic libraries from common bean genomic DNA were made by digestion with four frequently cutting restriction enzymes, double digestion with a frequently cutting restriction enzyme and a less frequently cutting restriction enzyme, or sonication. Library quality was compared and three of the small-insert libraries were selected for further analysis. Each library was plated and picked into 384-well plates that were used to create high-density filter arrays of over 18 000 clones each, which were screened with oligonucleotide probes for various SSR motifs. Positive clones were found to have low redundancy. One hundred SSR markers were developed and 80 were tested for polymorphism in a standard parental survey. These microsatellite markers derived from non-SSR-enriched libraries should be useful additions to previous markers developed from enriched libraries.

  20. Optimisation of current injection protocol based on a region of interest.

    Science.gov (United States)

    Faulkner, Mayo; Jehl, Markus; Aristovich, Kirill; Avery, James; Witkowska-Wrobel, Anna; Holder, David

    2017-03-29

    Electrical Impedance Tomography has the potential to image fast neural activity associated with physiological or epileptic activity throughout the brain. These applications pose a particular challenge as expected voltage changes on the electrodes are less than 1% and geometrical constraints of the body under investigation mean that electrodes can not be evenly distributed around its boundary. Unlike other applications, however, information regarding the location of expected activity is typically available. An informative method for choosing current paths that maximise sensitivity to specific regions is desirable. Two electrode addressing protocol generation methods based on current density vectors concentrated in a region of interest have been proposed. One focuses solely on maximising its magnitude while the other considers its distribution. The quality of reconstructed images using these protocols was assessed in a simulation study conducted in a human and rat mesh and compared to the protocol that maximises distance between injecting electrodes. When implementing the protocol that focused on maximising magnitude, the current density concentrated in a region of interest increased by up to a factor of 3. When the distribution of the current was maximised, the spread of current density vectors increased by up to fivefold. For the small conductivity changes expected in the applications explored, image quality was best when implementing the protocol that maximised current density. The average image error when using this protocol was 7% better than when employing other protocols. We conclude that for fast neural EIT applications, the protocol that maximises current density is the best protocol to implement.

  1. Self-Adaptive and Energy-Efficient MAC Protocol Based on Event-Driven

    Directory of Open Access Journals (Sweden)

    Xin Hou

    2013-01-01

    Full Text Available Combined with WSN MAC layer protocol characteristics and design requirements, according to the characteristic of WSN monitoring application requirements, this paper puts forward a method based on event driven MAC protocol. The agreement algorithm is to solve the problem of network congestion and node energy unnecessary consumption cause by a large number of redundant monitoring data transceiver. It is a kind of adaptive low power consumption of the MAC layer protocol, which is pointed out based on theoretical foundation of S_MAC protocol, made use of the event driven mechanism system theory, combined with event driven mechanism and the characteristics of the WSN. It has the periodic dormancy mechanism of S_MAC protocol, in the premise of the reliability data, to reduce data redundancy and communication delay time, improve the overall network throughput, to ensure the safety and reliability of the network, which can greatly extends  the node of working time.

  2. HLAODV - A Cross Layer Routing Protocol for Pervasive Heterogeneous Wireless Sensor Networks Based On Location

    Directory of Open Access Journals (Sweden)

    Jasmine Norman

    2010-07-01

    Full Text Available A pervasive network consists of heterogeneous devices with different computing, storage, mobility and connectivity properties working together to solve real-world problems. The emergence of wireless sensor networks has enabled new classes of applications in pervasive world that benefit a large number of fields. Routing in wireless sensor networks is a demanding task. This demand has led to a number of routing protocols which efficiently utilize the limited resources available at the sensor nodes. Most of these protocols either support stationary sensor networks or mobile networks. This paper proposes an energy efficient routing protocol for heterogeneous sensor networks with the goal of finding the nearest base station or sink node. Hence the problem of routing is reduced to finding the nearest base station problem in heterogeneous networks. The protocol HLAODV when compared with popular routing protocols AODV and DSR is energy efficient. Also the mathematical model of the proposed system and its properties are studied.

  3. A multiple channel assignment algorithm and routing protocol base on wireless mesh networks

    Science.gov (United States)

    Shi, Xiaochuan; Li, Nan

    2011-10-01

    In this paper, a hybrid routing protocol TOIRP and a distributed channel assignment algorithm CLBCA of WMN in the multi-channel environment are proposed. The tree base protocol and the traditional AODV routing protocol are integrated together to reduce delay in the routing protocol, which is proposed by HWMP. A new routing metric CETTI is used in this routing protocol, which uses a new method to quantify the interference of communication. It divided interference into two parts: inter-flow interference and intra- flow interference, and it integrate the considerations of hop- count and delay. This improves the throughput of WMN. The channel assignment algorithm is divided into two parts: radio- neighbor binding and channel-radio binding. This algorithm is based on the channel load and avoids the channel-dependency problem which is common in the multi-channel environment. In the same time, it increases the utilization of each channel.

  4. Optimistic fair exchange E-commerce protocol based on secret sharing

    Institute of Scientific and Technical Information of China (English)

    Ma Changshe; Lei Feiyu; Chen Kefei

    2006-01-01

    A key problem of electronic commerce (for short e-commerce) is fair exchange which guarantees that at the end of the transaction, either both parties involved in the transaction receive each other's items or none do. A non-interactive optimistic fair exchange e-commerce protocol model based on the publicly verifiable secret sharing is presented. The main idea of our exchange protocol is to interchange verifiable and recoverable keys of the symmetric encryption for participants' items. So it is especially suitable for exchange of large-size items. Furthermore, our protocol is efficient and simple as it does not need interactive proof system which has been adopted by a large quantity of previously proposed fair exchange protocols. Based on a modified (2,2) secret sharing scheme, a concrete non-interactive fair exchange e-commerce protocol is designed.

  5. ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX

    Institute of Scientific and Technical Information of China (English)

    Wang Shaohui; Liu Sujuan

    2013-01-01

    Most of the Radio Frequency IDentification (RFID) authentication protocols,proposed to preserve security and privacy,are analysed to show that they can not provide security against some passive or active attacks.In this paper,the security of two matrix-based protocols,proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al.(RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard,are investigated.Using the linear relationship of multiplication of matrix and vector,we point out that both protocols can not provide scalability,and they are vulnerable to passive impersonation attack.In addition,both protocols are totally insecure if the adversary can compromise one tag to extract the secrets.A modified lightweight matrix-based authentication protocol is presented,which can resist mainly common attacks on an RFID authentication system including eavesdropping,relay attack,desynchronization attack,impersonation attack and tag tracking attack.The new protocol also has the desirable scalability property and can keep secure under compromising attack.

  6. Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Seonho Choi

    2012-12-01

    Full Text Available A predictive-hashing based Denial-of-Service (DoS resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platformindependent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams.

  7. Feasibility of web-based protocol in a 12 weeks home-based IMT program for individuals with COPD

    DEFF Research Database (Denmark)

    Svenningsen, Helle; Sørensen, Dorthe

    2016-01-01

    of a web-based protocol with feedback function using mechanical threshold loading (MTL) as a home-based IMT in individuals with COPD. Thirty-six individuals with inspiratory muscle weakness were randomly selected from a pulmonary rehabilitation program to perform 12 weeks of MTL with either a web......-based protocol (n=17) or a usual protocol with a paper logbook (n=19). All participants performed two daily sessions of 30 breaths. In the intervention group, training was executed with the highest tolerable intensity of maximal inspiratory mouth pressure (PImax), and feedback was web-based on effort scores...... the intervention group. The web-based protocol with feedback function had similar feasibility and adherence as the usual protocol and indicates a better outcome at six minutes of a walk test....

  8. Virus enrichment for single virus infection by using 3D insulator based dielectrophoresis.

    Science.gov (United States)

    Masuda, Taisuke; Maruyama, Hisataka; Honda, Ayae; Arai, Fumihito

    2014-01-01

    We developed an active virus filter (AVF) that enables virus enrichment for single virus infection, by using insulator-based dielectrophoresis (iDEP). A 3D-constricted flow channel design enabled the production of an iDEP force in the microfluidic chip. iDEP using a chip with multiple active virus filters (AVFs) was more accurate and faster than using a chip with a single AVF, and improved the efficiency of virus trapping. We utilized maskless photolithography to achieve the precise 3D gray-scale exposure required for fabrication of constricted flow channel. Influenza virus (A PR/8) was enriched by a negative DEP force when sinusoidal wave was applied to the electrodes within an amplitude range of 20 Vp-p and a frequency of 10 MHz. AVF-mediated virus enrichment can be repeated simply by turning the current ON or OFF. Furthermore, the negative AVF can inhibit virus adhesion onto the glass substrate. We then trapped and transported one of the enriched viruses by using optical tweezers. This microfluidic chip facilitated the effective transport of a single virus from AVFs towards the cell-containing chamber without crossing an electrode. We successfully transported the virus to the cell chamber (v = 10 µm/s) and brought it infected with a selected single H292 cell.

  9. Virus enrichment for single virus infection by using 3D insulator based dielectrophoresis.

    Directory of Open Access Journals (Sweden)

    Taisuke Masuda

    Full Text Available We developed an active virus filter (AVF that enables virus enrichment for single virus infection, by using insulator-based dielectrophoresis (iDEP. A 3D-constricted flow channel design enabled the production of an iDEP force in the microfluidic chip. iDEP using a chip with multiple active virus filters (AVFs was more accurate and faster than using a chip with a single AVF, and improved the efficiency of virus trapping. We utilized maskless photolithography to achieve the precise 3D gray-scale exposure required for fabrication of constricted flow channel. Influenza virus (A PR/8 was enriched by a negative DEP force when sinusoidal wave was applied to the electrodes within an amplitude range of 20 Vp-p and a frequency of 10 MHz. AVF-mediated virus enrichment can be repeated simply by turning the current ON or OFF. Furthermore, the negative AVF can inhibit virus adhesion onto the glass substrate. We then trapped and transported one of the enriched viruses by using optical tweezers. This microfluidic chip facilitated the effective transport of a single virus from AVFs towards the cell-containing chamber without crossing an electrode. We successfully transported the virus to the cell chamber (v = 10 µm/s and brought it infected with a selected single H292 cell.

  10. Rheology, fatty acid profile and quality characteristics of nutrient enriched pizza base.

    Science.gov (United States)

    Gupta, Chaitali Sen; Milind; Jeyarani, T; Rajiv, Jyotsna

    2015-05-01

    Enrichment of thick bread type pizza base (PZB) was done by substituting wheat flour (WF) with 5, 10 and 15 % soya protein isolate (SPI). The rheological characteristics of WF showed that water absorption increased, extensibility and peak viscosity decreased when level of SPI increased from 5 to 15 %. Baking studies showed that spread ratio decreased and hardness values of PZB increased with the increase in amount of SPI from 5 to15 %. Beyond 10 % SPI, the overall quality of PZB was adversely affected. To the optimal blend of 10 % SPI, 5 % psyllium husk (PH) was added and the hydrogenated fat was replaced by canola oil (CAN) in enriched PZB. The enriched PZB treated with combination of additives had 1.7 and 1.6 times more protein and dietary fiber than the control PZB. Fatty acid analysis showed that the enriched PZB had 58.65 % oleic, 6.58 % linolenic acid and 31.28 % polyunsaturated fatty acid and no Trans fat was present.

  11. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hiroshi Ishii

    2012-05-01

    Full Text Available The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided.

  12. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    Science.gov (United States)

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350

  13. Implementation of Embedded Ethernet Based on Hardware Protocol Stack in Substation Automation System

    Institute of Scientific and Technical Information of China (English)

    MA Qiang; ZHAO Jianguo; LIU Bingxu

    2008-01-01

    Embedded Ethernet technology has been utilized increasingly widely as the communication mode in the substation automation system (SAS). This paper introduces the current applying situation about embedded Ethernet in SAS First. After analyzing the protocol levels used in SAS based on embedded Ethernet and the differences between the TCP and UDP, UDP/IP is selected as the communication protocol between the station-level and bay-level devices for its real-time characteristic. Then a new kind of implementation of the embedded Ethernet is presented based on hardware protocol stack. The designed scheme can be implemented easily, reduce cost significantly and shorten developing cycle.

  14. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    Science.gov (United States)

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  15. Integrating authentic assessment with competency based learning: the Protocol Portfolio Scoring.

    NARCIS (Netherlands)

    Sluijsmans, Dominique; Straetmans, Gerard; Van Merriënboer, Jeroen

    2009-01-01

    Sluijsmans, D. M. A., Straetmans, G., & Van Merriënboer, J. (2008). Integrating authentic assessment with competency based learning: the Protocol Portfolio Scoring. Journal of Vocational Education and Training, 60(2), 157-172.

  16. Corrections to "Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs"

    Directory of Open Access Journals (Sweden)

    Choi Woo-Yong

    2010-01-01

    Full Text Available We have found the errors in the throughput formulae presented in our paper "Connectivity-based reliable multicast MAC protocol for IEEE 802.11 wireless LANs". We provide the corrected formulae and numerical results.

  17. STRESS TESTS FOR VIDEOSTREAMING SERVICES BASED ON RTSP PROTOCOL

    Directory of Open Access Journals (Sweden)

    Gabriel Elías Chanchí Golondrino

    2015-11-01

    Full Text Available Video-streaming is a technology with major implications these days in such diverse contexts as education, health and the business sector; all of this regarding the ease it provides for remote access to live or recorded media content, allowing communication regardless of geographic location. One standard protocol that enables implementation of this technology is real time streaming protocol, or RTSP. However, since most application servers and Internet services are supported on HTTP requests, very little research has been done on generating tools for carrying out stress tests on streaming servers. This paper presents a stress measuring tool called Hermes, developed in Python, which allows calculation of response times for establishing RTSP connections to streaming servers, as well as obtaining RAM memory consumption and CPU usage rate data from these servers. Hermes was deployed in a video-streaming environment where stress testing was carried out on the LIVE555 server, using calls in the background to VLC and OpenRTSP open source clients. 

  18. Nonlinear consensus protocols for multi-agent systems based on centre manifold reduction

    Institute of Scientific and Technical Information of China (English)

    Li Yu-Mei; Guan Xin-Ping

    2009-01-01

    Nonlinear consensus protocols for dynamic directed networks of multi-agent systems with fixed and switching topologies are investigated separately in this paper. Based on the centre manifold reduction technique,nonlinear consensus protocols are presented.We prove that a group of agents can reach a β-consensus,the value of which is the group decision value varying from the minimum and the maximum values of the initial states of the agents.Moreover,we derive the conditions to guarantee that all the agents reach a β-consensus on a desired group decision value.Finally,a simulation study concerning the vertical alignment manoeuvere of a team of unmanned air vehicles is performed.Simulation results show that the nonlinear consensus protocols proposed are more effective than the linear protocols for the formation control of the agents and they are an improvement over existing protocols.

  19. Handling Data-Based Concurrency in Context-Aware Service Protocols

    CERN Document Server

    Cubo, Javier; Salaün, Gwen; Canal, Carlos; 10.4204/EPTCS.30.5

    2010-01-01

    Dependency analysis is a technique to identify and determine data dependencies between service protocols. Protocols evolving concurrently in the service composition need to impose an order in their execution if there exist data dependencies. In this work, we describe a model to formalise context-aware service protocols. We also present a composition language to handle dynamically the concurrent execution of protocols. This language addresses data dependency issues among several protocols concurrently executed on the same user device, using mechanisms based on data semantic matching. Our approach aims at assisting the user in establishing priorities between these dependencies, avoiding the occurrence of deadlock situations. Nevertheless, this process is error-prone, since it requires human intervention. Therefore, we also propose verification techniques to automatically detect possible inconsistencies specified by the user while building the data dependency set. Our approach is supported by a prototype tool we...

  20. Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Gani, Abdullah; Anisi, Mohammad Hossein; Ab Hamid, Siti Hafizah; Akhunzada, Adnan; Khan, Muhammad Khurram

    2016-01-01

    A wireless sensor network (WSN) comprises small sensor nodes with limited energy capabilities. The power constraints of WSNs necessitate efficient energy utilization to extend the overall network lifetime of these networks. We propose a distance-based and low-energy adaptive clustering (DISCPLN) protocol to streamline the green issue of efficient energy utilization in WSNs. We also enhance our proposed protocol into the multi-hop-DISCPLN protocol to increase the lifetime of the network in terms of high throughput with minimum delay time and packet loss. We also propose the mobile-DISCPLN protocol to maintain the stability of the network. The modelling and comparison of these protocols with their corresponding benchmarks exhibit promising results. PMID:27658194

  1. Protocol Support for a New Satellite-Based Airspace Communication Network

    Science.gov (United States)

    Shang, Yadong; Hadjitheodosiou, Michael; Baras, John

    2004-01-01

    We recommend suitable transport protocols for an aeronautical network supporting Internet and data services via satellite. We study the characteristics of an aeronautical satellite hybrid network and focus on the problems that cause dramatically degraded performance of the Transport Protocol. We discuss various extensions to standard TCP that alleviate some of these performance problems. Through simulation, we identify those TCP implementations that can be expected to perform well. Based on the observation that it is difficult for an end-to-end solution to solve these problems effectively, we propose a new TCP-splitting protocol, termed Aeronautical Transport Control Protocol (AeroTCP). The main idea of this protocol is to use a fixed window for flow control and one duplicated acknowledgement (ACK) for fast recovery. Our simulation results show that AeroTCP can maintain higher utilization for the satellite link than end-to-end TCP, especially in high BER environment.

  2. AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    Ge Ma

    2009-07-01

    Full Text Available Designing low energy consumption, high efficiency Media Access Control (MAC protocols are one ofthe most important directions in wireless sensor networks (WSN. In this paper, we proposed a newcontention reserve MAC protocol, named CRMAC, under the inspiration of IEEE 802.15.4’s superframestructure. CRMAC is a MAC protocol suitable for intra-cluster WSN that combines the advantages ofcontention and schedule-based MAC protocols. We introduce the mechanism and superframe structure ofCRMAC in detail and verified the performance of this protocol through simulations. Our results showthat CRMAC performs better than IEEE 802.15.4 in energy consumption, system delay and networkthroughput. CRMAC is especially suitable for short packet transmission under low load networks, whichis the main situation in WSN.

  3. LMEEC: Layered Multi-Hop Energy Efficient Cluster-based Routing Protocol for Wireless Sensor Networks

    CERN Document Server

    Khelifi, Manel

    2012-01-01

    In this paper, we propose LMEEC, a cluster-based rout- ing protocol with low energy consumption for wireless sensor networks. Our protocol is based on a strategy which aims to provide a more equitable exploitation of the selected nodes (cluster-heads) energy. Simulation results show the effective- ness of LMEEC in decreasing the energy consumption, and in prolonging the network lifetime, compared to LEACH.

  4. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    Science.gov (United States)

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  5. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Nenad Kojić

    2012-06-01

    Full Text Available The networking infrastructure of wireless mesh networks (WMNs is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs. This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission. The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.

  6. A neural networks-based hybrid routing protocol for wireless mesh networks.

    Science.gov (United States)

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.

  7. Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC

    Science.gov (United States)

    Wang, Lei; Ohta, Kazuo; Sasaki, Yu; Sakiyama, Kazuo; Kunihiro, Noboru

    Many hash-based authentication protocols have been proposed, and proven secure assuming that underlying hash functions are secure. On the other hand, if a hash function compromises, the security of authentication protocols based on this hash function becomes unclear. Therefore, it is significantly important to verify the security of hash-based protocols when a hash function is broken. In this paper, we will re-evaluate the security of two MD5-based authentication protocols based on a fact that MD5 cannot satisfy a required fundamental property named collision resistance. The target protocols are APOP (Authenticated Post Office Protocol) and NMAC (Nested Message Authentication Code), since they or their variants are widely used in real world. For security evaluation of APOP, we will propose a modified password recovery attack procedure, which is twice as fast as previous attacks. Moreover, our attack is more realistic, as the probability of being detected is lower than that of previous attacks. For security evaluation of MD5-based NMAC, we will propose a new key-recovery attack procedure, which has a complexity lower than that of previous attack. The complexity of our attack is 276, while that of previous attack is 2100.**Moreover, our attack has another interesting point. NMAC has two keys: the inner key and the outer key. Our attack can recover the outer key partially without the knowledge of the inner key.

  8. A Centralized Energy Efficient Distance Based Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rohit D. Gawade

    2016-01-01

    Full Text Available Wireless sensor network (WSN typically consists of a large number of low cost wireless sensor nodes which collect and send various messages to a base station (BS. WSN nodes are small battery powered devices having limited energy resources. Replacement of such energy resources is not easy for thousands of nodes as they are inaccessible to users after their deployment. This generates a requirement of energy efficient routing protocol for increasing network lifetime while minimizing energy consumption. Low Energy Adaptive Clustering Hierarchy (LEACH is a widely used classic clustering algorithm in WSNs. In this paper, we propose a Centralized Energy Efficient Distance (CEED based routing protocol to evenly distribute energy dissipation among all sensor nodes. We calculate optimum number of cluster heads based on LEACH’s energy dissipation model. We propose a distributed cluster head selection algorithm based on dissipated energy of a node and its distance to BS. Moreover, we extend our protocol by multihop routing scheme to reduce energy dissipated by nodes located far away from base station. The performance of CEED is compared with other protocols such as LEACH and LEACH with Distance Based Thresholds (LEACH-DT. Simulation results show that CEED is more energy efficient as compared to other protocols. Also it improves the network lifetime and stability period over the other protocols.

  9. A lightweight neighbor-info-based routing protocol for no-base-station taxi-call system.

    Science.gov (United States)

    Zhu, Xudong; Wang, Jinhang; Chen, Yunchao

    2014-01-01

    Since the quick topology change and short connection duration, the VANET has had unstable routing and wireless signal quality. This paper proposes a kind of lightweight routing protocol-LNIB for call system without base station, which is applicable to the urban taxis. LNIB maintains and predicts neighbor information dynamically, thus finding the reliable path between the source and the target. This paper describes the protocol in detail and evaluates the performance of this protocol by simulating under different nodes density and speed. The result of evaluation shows that the performance of LNIB is better than AODV which is a classic protocol in taxi-call scene.

  10. A Trust Based Cross Layer Security Protocol for Mobile Ad hoc Networks

    CERN Document Server

    Rajaram, A

    2009-01-01

    In this paper, we develop a trust based security protocol based on a cross layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet forwarding by maintaining a trust counter for each node. A node is punished or rewarded by decreasing or increasing the trust counter. If the trust counter value falls below a trust threshold, the corresponding intermediate node is marked as malicious. In the next phase of the protocol, we provide link layer security using the CBCX mode of authentication and encryption. By simulation results, we show that the proposed cross layer security protocol achieves high packet delivery ratio while attaining low delay and overhead.

  11. On Distributed Reduced-Order Observer-Based Protocol for Linear Multiagent Consensus under Switching Topology

    Directory of Open Access Journals (Sweden)

    Yan Zhang

    2013-01-01

    Full Text Available We discuss linear multiagent systems consensus problem with distributed reduced-order observer-based protocol under switching topology. We use Jordan decomposition method to prove that the proposed protocols can solve consensus problem under directed fixed topology. By constructing a parameter-dependent common Lyapunov function, we prove that the distributed reduced-order observer-based protocol can also solve the continuous-time multi-agent consensus problem under the undirected switching interconnection topology. Then, we investigate the leader-following consensus problem and propose a reduced-order observer-based protocol for each following agent. By using similar analysis method, we can prove that all following agents can track the leader under a class of directed interaction topologies. Finally, the given simulation example also shows the effectiveness of our obtained result.

  12. Nutrient enrichment reduces constraints on material flows in a detritus-based food web.

    Science.gov (United States)

    Cross, Wyatt F; Wallace, J Bruce; Rosemond, Amy D

    2007-10-01

    Most aquatic and terrestrial ecosystems are experiencing increased nutrient availability, which is affecting their structure and function. By altering community composition and productivity of consumers, enrichment can indirectly cause changes in the pathways and magnitude of material flows in food webs. These changes, in turn, have major consequences for material storage and cycling in the ecosystem. Understanding mechanisms and predicting consequences of nutrient-induced changes in material flows requires a quantitative food web approach that combines information on consumer energetics and consumer-resource stoichiometry. We examined effects of a whole-system experimental nutrient enrichment on the trophic basis of production and the magnitude and pathways of carbon (C), nitrogen (N), and phosphorus (P) flows in a detritus-based stream food web. We compared the response of the treated stream to an adjacent reference stream throughout the study. Dietary composition and elemental flows varied considerably among invertebrate functional feeding groups. During nutrient enrichment, increased flows of leaf litter and amorphous detritus to shredders and gatherers accounted for most of the altered flows of C from basal resources to consumers. Nutrient enrichment had little effect on patterns of material flows but had large positive effects on the magnitude of C, N, and P flows to consumers (mean increase of 97% for all elements). Nutrient-specific food webs revealed similar flows of N and P to multiple functional groups despite an order of magnitude difference among groups in consumption of C. Secondary production was more strongly related to consumption of nutrients than C, and increased material flows were positively related to the degree of consumer-resource C:P and C:N imbalances. Nutrient enrichment resulted in an increased proportion of detrital C inputs consumed by primary consumers (from -15% to 35%) and a decreased proportion of invertebrate prey consumed by

  13. Enhancing user privacy in SARG04-based private database query protocols

    Science.gov (United States)

    Yu, Fang; Qiu, Daowen; Situ, Haozhen; Wang, Xiaoming; Long, Shun

    2015-11-01

    The well-known SARG04 protocol can be used in a private query application to generate an oblivious key. By usage of the key, the user can retrieve one out of N items from a database without revealing which one he/she is interested in. However, the existing SARG04-based private query protocols are vulnerable to the attacks of faked data from the database since in its canonical form, the SARG04 protocol lacks means for one party to defend attacks from the other. While such attacks can cause significant loss of user privacy, a variant of the SARG04 protocol is proposed in this paper with new mechanisms designed to help the user protect its privacy in private query applications. In the protocol, it is the user who starts the session with the database, trying to learn from it bits of a raw key in an oblivious way. An honesty test is used to detect a cheating database who had transmitted faked data. The whole private query protocol has O( N) communication complexity for conveying at least N encrypted items. Compared with the existing SARG04-based protocols, it is efficient in communication for per-bit learning.

  14. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  15. A Pharmacology-Based Enrichment Program for Undergraduates Promotes Interest in Science.

    Science.gov (United States)

    Godin, Elizabeth A; Wormington, Stephanie V; Perez, Tony; Barger, Michael M; Snyder, Kate E; Richman, Laura Smart; Schwartz-Bloom, Rochelle; Linnenbrink-Garcia, Lisa

    2015-01-01

    There is a strong need to increase the number of undergraduate students who pursue careers in science to provide the "fuel" that will power a science and technology-driven U.S. economy. Prior research suggests that both evidence-based teaching methods and early undergraduate research experiences may help to increase retention rates in the sciences. In this study, we examined the effect of a program that included 1) a Summer enrichment 2-wk minicourse and 2) an authentic Fall research course, both of which were designed specifically to support students' science motivation. Undergraduates who participated in the pharmacology-based enrichment program significantly improved their knowledge of basic biology and chemistry concepts; reported high levels of science motivation; and were likely to major in a biological, chemical, or biomedical field. Additionally, program participants who decided to major in biology or chemistry were significantly more likely to choose a pharmacology concentration than those majoring in biology or chemistry who did not participate in the enrichment program. Thus, by supporting students' science motivation, we can increase the number of students who are interested in science and science careers.

  16. Pros and cons of methylation-based enrichment methods for ancient DNA

    DEFF Research Database (Denmark)

    Seguin-Orlando, Andaine; Gamba, Cristina; Der Sarkissian, Clio;

    2015-01-01

    The recent discovery that DNA methylation survives in fossil material provides an opportunity for novel molecular approaches in palaeogenomics. Here, we apply to ancient DNA extracts the probe-independent Methylated Binding Domains (MBD)-based enrichment method, which targets DNA molecules...... containing methylated CpGs. Using remains of a Palaeo-Eskimo Saqqaq individual, woolly mammoths, polar bears and two equine species, we confirm that DNA methylation survives in a variety of tissues, environmental contexts and over a large temporal range (4,000 to over 45,000 years before present). MBD...... enrichment, however, appears principally biased towards the recovery of CpG-rich and long DNA templates and is limited by the fast post-mortem cytosine deamination rates of methylated epialleles. This method, thus, appears only appropriate for the analysis of ancient methylomes from very well preserved...

  17. Efficient Three-Party Quantum Dialogue Protocol Based on the Continuous Variable GHZ States

    Science.gov (United States)

    Yu, Zhen-Bo; Gong, Li-Hua; Zhu, Qi-Biao; Cheng, Shan; Zhou, Nan-Run

    2016-07-01

    Based on the continuous variable GHZ entangled states, an efficient three-party quantum dialogue protocol is devised, where each legitimate communication party could simultaneously deduce the secret information of the other two parties with perfect efficiency. The security is guaranteed by the correlation of the continuous variable GHZ entangled states and the randomly selected decoy states. Furthermore, the three-party quantum dialogue protocol is directly generalized to an N-party quantum dialogue protocol by using the n-tuple continuous variable GHZ entangled states.

  18. Cryptanalysis and Improvement of Two GHZ-State-Based QSDC Protocols

    Institute of Scientific and Technical Information of China (English)

    GUO Fen-Zhuo; QIN Su-Juan; WEN Qiao-Yan; ZHU Fu-Chen

    2010-01-01

    @@ In a recent paper[J.Korean.Phys.Soc.49 (2006) 459],two GHZ-state-based quantum secure direct communi-cation protocols were presented.Here we point out that an eavesdropper can utilize a special property of GHZ states,i.e."correlation-elicitable" to obtain half information of the transmitted secrets without being detected in both protocols.The particular attack strategy is demonstrated in detail.Furthermore,a possible improvement is proposed,which makes the protocols secure against this kind of attack.

  19. An Energy- Aware Routing Protocol Based on Effective Transmission in Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    YUAN Linfeng; YANG Zongkai; CHENG Wenqing; DU Xu

    2006-01-01

    In order to minimize the energy consumption in the discovery of the routing path, this paper introduces a novel concept of effective transmission (ET) that ensures each forwarding node is not only farther from the source node, but also nearer to the destination node with respect to its sender.An energy-aware routing protocol based on ET is proposed.It enables the energy consumption for each hop to be the least for the transmission. The simulation results show the routing protocol is effective in the performance of energy consumption comparing with some other routing protocols.

  20. [Multi-bed & multi-parameter central monitoring system based on TCP/IP protocol].

    Science.gov (United States)

    Lian, S J; Hu, D K; Zhao, M H; Tang, L H

    2000-02-01

    Communication is one of the key problems to a central monitoring system. In this paper we put forward a central monitoring system using TCP/IP as the network protocol, Windows NT4.0 as the platform, forming a Intranet in a hospital. We also discussed the communication problem between the bed-side monitoring station and the central monitoring station in detail and then put forward a new protocol--Hospital Central Monitor Protocol (HCMP) based on TCP/IP to transfer monitoring data. It is easy to achieve tele-monitoring through the current communication subsystem.

  1. A DUAL RESERVATION CDMA-BASED MAC PROTOCOL WITH POWER CONTROL FOR AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Jia Min; Chen Huimin; Yuan Yuhua

    2007-01-01

    This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel, broadcast channel and several data channels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol, the results show that the proposed mechanism improves the average throughput and limits the transmission delay efficiently.

  2. An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing

    Institute of Scientific and Technical Information of China (English)

    LU Rong-xing; CAO Zhen-fu; SU Ren-wang; CHAI Zhen-chuan

    2006-01-01

    Peer-to-peer computing has recently started to gain significant acceptance, since it can greatly increase the performance and reliability of overall system. However, the security issue is still a major gating factor for its full adoption. In order to guarantee the security of data exchanged between two peers in Peer-to-Peer system, this paper comes up with an ID-based authenticated key agreement from bilinear pairings and uses BAN logic to prove the protocol's security. Compared with other existing protocols, the proposed protocol seems more secure and efficient, since it adopts the static shared Diffie-Hellman key.

  3. Efficient and configurable transmission protocol based on UDP in grid computing

    Institute of Scientific and Technical Information of China (English)

    Jigang WANG; Guochang GU; Chunguang MA; Weidong ZHONG

    2009-01-01

    At present,mainstream data transfer protocols are not always a good match for the diverse demands of grid computing.Considering this situation,this article proposes an efficient and configurable data transfer protocol (ECUDP) for grid computing.The ECUDP is based on the standard user datagram protocol (UDP),but with a collection of optimizations that meet the challenge of providing configurability and reliability while main-taining performance that meets the communication requirements of demanding applications.Experimental results show that the ECUDP performs efficiently in various grid computing scenarios and the performance analysis model can provide a good estimation of its performance.

  4. Performance Evaluation of Stable Weight-Based on Demand Routing Protocol for Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Oon C. Hsi

    2009-01-01

    Full Text Available Problem statement: A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. Approach: A Stable Weight-based On demand Routing Protocol (SWORP that uses the weight-based route strategy to select a stable route was created by Wang. But SWORP only evaluated in a limited setting of simulation, more simulation parameter have to test with SWORP to evaluate how far this protocol can go on. In this project, SWORP was implemented in simulation environment with two other routing protocols, AODV and DSR. Results: These three protocols were implemented in Network Simulator 2 (NS2 and the performance was compare with performance metrics, end-to-end delay, number of packet drop and packet delivery ratio. Conclusion: As expected, SWORP had outperformed AODV and DSR in the overall routing performance.

  5. History-based MAC Protocol for Low Duty-Cycle Wireless Sensor Networks: the SLACK-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Affoua Thérèse Aby

    2016-06-01

    Full Text Available Wireless sensor networks (WSNs are increasingly used in environmental monitoring applications. They are designed to operate for several months by featuring low activity cycles in order to save energy. In this paper, we propose a Medium Access Control (MAC protocol for suchWSNs with very low duty-cycles of 1% and less. Nodes are activated randomly and use a history of previous successful frame exchanges to decide their next activation time. We study the choice of the history size, and we compare the performance of our protocol with other protocols from the literature. We show by simulations and real experiments that with a limited history size of only six entries, our protocol achieves better performance than other protocols from the literature, while keeping the advantages of fully asynchronous protocols.

  6. AMQ Protocol Based Performance Analysis of Bare Metal Hypervisors

    Directory of Open Access Journals (Sweden)

    Dr Deepak Arora

    2014-06-01

    Full Text Available Cloud computing is one of the most exciting technology because of its cost-reducing approach, flexibility, and scalability. Hypervisor is the essential part of cloud technology; it is a component of software that provides a virtualized hardware environment to support running multiple operating systems concurrently using one physical server. In this paper we took KVM, XEN, Hyper-V and ESXi as hypervisors. We have compared the performance of Virtual Machines (VMs by RabbitMQ message broker server that uses Advanced Message Queuing Protocol(AMQP for breaking messages. We establish the setup on bare metal hypervisor that is installed directly on the hardware of the system. We took SAN (Shared Storage Network server for maintaining the storage of all VMs. By the evaluation of these hyperviosrs we got a brief idea about their performance on different parameters. These results will be beneficial to small enterprise, social group or any private IT firm which is choosing to build small cloud infrastructure with optimal benefits. Experiment results of checking the performance of VMs for all the hypervisors shows that there is performance variation on different applications and workloads of the hypervisors. None of the hypervisors outperform another at every aspect of our comparison.

  7. Enriched goal-oriented error estimation for fracture problems solved by continuum-based shell extended finite element method

    Institute of Scientific and Technical Information of China (English)

    Zhi-jia LIN; Zhuo ZHUANG BU

    2014-01-01

    An enriched goal-oriented error estimation method with extended degrees of freedom is developed to estimate the error in the continuum-based shell extended finite element method. It leads to high quality local error bounds in three-dimensional fracture mechanics simulation which involves enrichments to solve the singularity in crack tip. This enriched goal-oriented error estimation gives a chance to evaluate this continuum-based shell extended finite element method simulation. With comparisons of reliability to the stress intensity factor calculation in stretching and bending, the accuracy of the continuum-based shell extended finite element method simulation is evaluated, and the reason of error is discussed.

  8. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    Science.gov (United States)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  9. Quality evaluation of methyl binding domain based kits for enrichment DNA-methylation sequencing.

    Directory of Open Access Journals (Sweden)

    Tim De Meyer

    Full Text Available DNA-methylation is an important epigenetic feature in health and disease. Methylated sequence capturing by Methyl Binding Domain (MBD based enrichment followed by second-generation sequencing provides the best combination of sensitivity and cost-efficiency for genome-wide DNA-methylation profiling. However, existing implementations are numerous, and quality control and optimization require expensive external validation. Therefore, this study has two aims: 1 to identify a best performing kit for MBD-based enrichment using independent validation data, and 2 to evaluate whether quality evaluation can also be performed solely based on the characteristics of the generated sequences. Five commercially available kits for MBD enrichment were combined with Illumina GAIIx sequencing for three cell lines (HCT15, DU145, PC3. Reduced representation bisulfite sequencing data (all three cell lines and publicly available Illumina Infinium BeadChip data (DU145 and PC3 were used for benchmarking. Consistent large-scale differences in yield, sensitivity and specificity between the different kits could be identified, with Diagenode's MethylCap kit as overall best performing kit under the tested conditions. This kit could also be identified with the Fragment CpG-plot, which summarizes the CpG content of the captured fragments, implying that the latter can be used as a tool to monitor data quality. In conclusion, there are major quality differences between kits for MBD-based capturing of methylated DNA, with the MethylCap kit performing best under the used settings. The Fragment CpG-plot is able to monitor data quality based on inherent sequence data characteristics, and is therefore a cost-efficient tool for experimental optimization, but also to monitor quality throughout routine applications.

  10. An Analysis of Energy Consumption on ACK+Rate Packet in Rate Based Transport Protocol

    Directory of Open Access Journals (Sweden)

    P.Ganeshkumar

    2009-09-01

    Full Text Available Rate based transport protocol determines the rate of data transmission between the sender and receiver and then sends the data according to that rate. To notify the rate to the sender, the receiver sends ACK+Rate packet based on epoch timer expiry. In this paper, through detailed arguments and simulation it is shown that the transmission of ACK+Rate packet based on epoch timer expiry consumes more energy in network with low mobility. To overcome this problem, a new technique called Dynamic Rate Feedback (DRF is proposed. DRF sends ACK+Rate whenever there is a change in rate of ±25% than the previous rate. Based on ns2 simulation DRF is compared with ATP.Keywords- Ad hoc network, Ad hoc transport Protocol, Rate based transport protocols, energy consumption, Intermediate node

  11. Enhancing data exploitation through DTN-based data transmission protocols

    Science.gov (United States)

    Daglis, Ioannis A.; Tsaoussidis, Vassilis; Rontogiannis, Athanasios; Balasis, Georgios; Keramitsoglou, Iphigenia; Paronis, Dimitrios; Sykioti, Olga; Tsinganos, Antonios

    2014-05-01

    Data distribution and data access are major issues in space sciences and geosciences as they strongly influence the degree of data exploitation. Processing and analysis of large volumes of Earth observation and space/planetary data face two major impediments: limited access capabilities due to narrow connectivity windows between spacecraft and ground receiving stations and lack of sufficient communication and dissemination mechanisms between space data receiving centres and the end-user community. Real-time data assimilation that would be critical in a number of forecasting capabilities is particularly affected by such limitations. The FP7-Space project "Space-Data Routers" (SDR) has the aim of allowing space agencies, academic institutes and research centres to disseminate/share space data generated by single or multiple missions, in an efficient, secure and automated manner. The approach of SDR relies on space internetworking - and in particular on Delay-Tolerant Networking (DTN), which marks the new era in space communications, unifies space and earth communication infrastructures and delivers a set of tools and protocols for space-data exploitation. The project includes the definition of limitations imposed by typical space mission scenarios in which the National Observatory of Athens is currently involved, including space and planetary exploration, as well as satellite-supported geoscience applications. In this paper, we present the mission scenarios, the SDR-application and the evaluation of the associated impact from the space-data router enhancements. The work leading to this paper has received funding from the European Union's Seventh Framework Programme (FP7-SPACE-2010-1) under grant agreement no. 263330 for the SDR (Space-Data Routers for Exploiting Space Data) collaborative research project. This paper reflects only the authors' views and the Union is not liable for any use that may be made of the information contained therein.

  12. Verifier-based Password Authenticated 3P-EKE Protocol using PCLA keys

    Directory of Open Access Journals (Sweden)

    Archana Raghuvamshi

    2016-06-01

    Full Text Available This paper endeavors to present a novel framework for the generic structure of a verifier-based password authenticated Three-Party Encrypted Key Exchange (3P-EKE protocol which yields more efficient protocol than the ones knew before. A previous framework presented by Archana and Premchand is more secured against all types of attacks like password guessing, replay, pre-play, man-in-the-middle attack etc. But unfortunately, this protocol does not solve the problem of a server compromise. These proofs help as inspiration to search for another framework. The framework we offer produces more efficient 3P-EKE protocol, and, in addition, delivers perceptive clarification about the existing attacks that do not solve in the previous framework. Moreover, it allows direct change from a class of verge private-key encryption to a hybrid (symmetric & Asymmetric one without significant overhead.

  13. Implementing an ultrasound-based protocol for diagnosingappendicitis while maintaining diagnostic accuracy

    Energy Technology Data Exchange (ETDEWEB)

    Van Atta, Angela J. [University of Utah School of Medicine, Salt Lake City, UT (United States); Baskin, Henry J.; Maves, Connie K.; Dansie, David M. [Primary Children' s Hospital, Department of Radiology, Salt Lake City, UT (United States); Rollins, Michael D. [University of Utah School of Medicine, Department of Surgery, Division of Pediatric Surgery, Salt Lake City, UT (United States); Bolte, Robert G. [University of Utah School of Medicine, Department of Pediatrics, Division of Pediatric Emergency Medicine, Salt Lake City, UT (United States); Mundorff, Michael B.; Andrews, Seth P. [Primary Children' s Hospital, Systems Improvement, Salt Lake City, UT (United States)

    2015-05-01

    The use of ultrasound to diagnose appendicitis in children is well-documented but not universally employed outside of pediatric academic centers, especially in the United States. Various obstacles make it difficult for institutions and radiologists to abandon a successful and accurate CT-based imaging protocol in favor of a US-based protocol. To describe how we overcame barriers to implementing a US-based appendicitis protocol among a large group of nonacademic private-practice pediatric radiologists while maintaining diagnostic accuracy and decreasing medical costs. A multidisciplinary team of physicians (pediatric surgery, pediatric emergency medicine and pediatric radiology) approved an imaging protocol using US as the primary modality to evaluate suspected appendicitis with CT for equivocal cases. The protocol addressed potential bias against US and accommodated for institutional limitations of radiologist and sonographer experience and availability. Radiologists coded US reports according to the probability of appendicitis. Radiology reports were compared with clinical outcomes to assess diagnostic accuracy. During the study period, physicians from each group were apprised of the interim US protocol accuracy results. Problematic cases were discussed openly. A total of 512 children were enrolled and underwent US for evaluation of appendicitis over a 30-month period. Diagnostic accuracy was comparable to published results for combined US/CT protocols. Comparing the first 12 months to the last 12 months of the study period, the proportion of children achieving an unequivocal US result increased from 30% (51/169) to 53% (149/282) and the proportion of children undergoing surgery based solely on US findings increased from 55% (23/42) to 84% (92/109). Overall, 63% (325/512) of patients in the protocol did not require a CT. Total patient costs were reduced by $30,182 annually. We overcame several barriers to implementing a US protocol. During the study period our

  14. INTEROPERABILITY, TRUST BASED INFORMATION SHARING PROTOCOL AND SECURITY: DIGITAL GOVERNMENT KEY ISSUES

    Directory of Open Access Journals (Sweden)

    Md.Headayetullah

    2010-06-01

    Full Text Available Improved interoperability between public and private organizations is of key significance to make digitalgovernment newest triumphant. Digital Government interoperability, information sharing protocol andsecurity are measured the key issue for achieving a refined stage of digital government. Flawlessinteroperability is essential to share the information between diverse and merely dispersed organisationsin several network environments by using computer based tools. Digital government must ensure securityfor its information systems, including computers and networks for providing better service to the citizens.Governments around the world are increasingly revolving to information sharing and integration forsolving problems in programs and policy areas. Evils of global worry such as syndrome discovery andmanage, terror campaign, immigration and border control, prohibited drug trafficking, and more demandinformation sharing, harmonization and cooperation amid government agencies within a country andacross national borders. A number of daunting challenges survive to the progress of an efficientinformation sharing protocol. A secure and trusted information-sharing protocol is required to enableusers to interact and share information easily and perfectly across many diverse networks and databasesglobally. This article presents (1 literature review of digital government security and interoperabilityand, (2 key research issue trust based information sharing protocol for seamless interoperability amongdiverse government organizations or agencies around the world. While trust-based information access iswell studied in the literature, presented secure information sharing technologies and protocols cannotoffer enough incentives for government agencies to share information amid them without harming theirown national interest. To overcome the drawbacks of the exiting technology, an innovative and proficienttrust-based security protocol is proposed in this

  15. Gossip Based Routing Protocol Design for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Toqeer Mahmood

    2012-01-01

    Full Text Available A spontaneously mannered decentralized network with no formal infrastructure and limited in temporal and spatial extent where each node communicate with each other over a wireless channel and is willing to forward data for other nodes is called as Wireless Ad Hoc network. In this research study, we proposed a routing strategy based on gossip based routing approach that follows the proactive routing with some treatment for wireless Ad Hoc network. The analytical verification of our proposed idea shows that it is a better approach based on gossip routing.

  16. What does it cost to deliver information using position-based beaconless forwarding protocols?

    KAUST Repository

    Bader, Ahmed

    2012-04-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single node. Although useful, but a solid understanding of the end-to-end performance is still necessary. In this paper, we shed light on the end-to-end performance of beaconless position-based protocols along three distinct dimensions: energy, latency, and back-off probability. The latter is used as a direct indicator of the network\\'s transport capacity. Consequently, we are able to provide an elaborate response to the question: what does it really cost to deliver a packet in a wireless sensor network using position-based beaconless forwarding protocols? In responding to this question, we highlighted the different performance tradeoffs inherent to beaconless position-based protocols. Furthermore, some operational recommendations are also provided. © 2012 IEEE.

  17. A Multiple-Dimensional Tree Routing Protocol for Multisink Wireless Sensor Networks Based on Ant Colony Optimization

    OpenAIRE

    Hui Zhou; Dongliang Qing; Xiaomei Zhang; Honglin Yuan; Chen Xu

    2012-01-01

    Routing protocol is an important topic in the wireless sensor networks. For MultiSink wireless sensor networks, the routing protocol designs and implementations are more difficult due to the structure complexity. The paper deals with the problem of a multiple-dimensional tree routing protocol for multisink wireless sensor networks based on ant colony optimization. The proposed protocol is as follows: (1) listening mechanism is used to establish and maintain multidimensional tree routing topol...

  18. Gossip Based Routing Protocol Design for Ad Hoc Networks

    OpenAIRE

    Toqeer Mahmood; Tabbassam Nawaz; Rehan Ashraf; Syed M. Adnan Shah

    2012-01-01

    A spontaneously mannered decentralized network with no formal infrastructure and limited in temporal and spatial extent where each node communicate with each other over a wireless channel and is willing to forward data for other nodes is called as Wireless Ad Hoc network. In this research study, we proposed a routing strategy based on gossip based routing approach that follows the proactive routing with some treatment for wireless Ad Hoc network. The analytical verification of our proposed id...

  19. Enrichment, Amplification, and Sequence-Based Typing of Salmonella enterica and Other Foodborne Pathogens.

    Science.gov (United States)

    Edlind, Tom; Brewster, Jeffrey D; Paoli, George C

    2017-01-01

    Detection of Salmonella enterica in foods typically involves microbiological enrichment, molecular-based assay, and subsequent isolation and identification of a pure culture. This is ideally followed by strain typing, which provides information critical to the investigation of outbreaks and the attribution of their sources. Pulsed-field gel electrophoresis is the "gold standard" for S. enterica strain typing, but its limitations have encouraged the search for alternative methods, including whole genome sequencing. Both methods typically require a pure culture, which adds to the cost and turnaround time. A more rapid and cost-effective method with sufficient discriminatory power would benefit food industries, regulatory agencies, and public health laboratories. To address this need, a novel enrichment, amplification, and sequence-based typing (EAST) approach was developed involving (i) overnight enrichment and total DNA preparation, (ii) amplification of polymorphic tandem repeat-containing loci with electrophoretic detection, and (iii) DNA sequencing and bioinformatic analysis to identify related strains. EAST requires 3 days or less and provides a strain resolution that exceeds serotyping and is comparable to pulsed-field gel electrophoresis. Evaluation with spiked ground turkey demonstrated its sensitivity (with a starting inoculum of ≤1 CFU/g) and specificity (with unique or nearly unique alleles relative to databases of >1,000 strains). In tests with unspiked retail chicken parts, 3 of 11 samples yielded S. enterica -specific PCR products. Sequence analysis of three distinct typing targets (SeMT1, SeCRISPR1, and SeCRISPR2) revealed consistent similarities to specific serotype Schwarzengrund, Montevideo, and Typhimurium strains. EAST provides a time-saving and cost-effective approach for detecting and typing foodborne S. enterica , and postenrichment steps can be commercially outsourced to facilitate its implementation. Initial studies with Listeria

  20. Highly Scalable, UDP-Based Network Transport Protocols for Lambda Grids and 10 GE Routed Networks

    Energy Technology Data Exchange (ETDEWEB)

    PI: Robert Grossman Co-PI: Stephen Eick

    2009-08-04

    Summary of Report In work prior to this grant, NCDM developed a high performance data transport protocol called SABUL. During this grant, we refined SABUL’s functionality, and then extended both the capabilities and functionality and incorporated them into a new protocol called UDP-based Data transport Protocol, or UDT. We also began preliminary work on Composable UDT, a version of UDT that allows the user to choose among different congestion control algorithms and implement the algorithm of his choice at the time he compiles the code. Specifically, we: · Investigated the theoretical foundations of protocols similar to SABUL and UDT. · Performed design and development work of UDT, a protocol that uses UDP in both the data and control channels. · Began design and development work of Composable UDT, a protocol that supports the use of different congestion control algorithms by simply including the appropriate library when compiling the code. · Performed experimental studies using UDT and Composable UDT using real world applications such as the Sloan Digital Sky Survey (SDSS) astronomical data sets. · Released several versions of UDT and Composable, the most recent being v3.1.

  1. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks

    Science.gov (United States)

    Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole. PMID:28121992

  2. Multi-Gateway-Based Energy Holes Avoidance Routing Protocol for WSN

    Directory of Open Access Journals (Sweden)

    Rohini Sharma

    2016-04-01

    Full Text Available In wireless sensor networks (WSNs, efficient energy conservation is required to prolong the lifetime of the network. In this work, we have given emphasis on balanced energy consumption and energy holes avoidance. This paper proposes a multi-gateway-based approach to reduce the transmission distance between the sender and the sink node. The area to be monitored is divided into regions and gateway nodes are deployed at optimal positions. We have designed a transmission scheme, in which sensors in the sink region communicate directly to the sink, sensors in the gateway region communicate directly to the gateway, and sensors in the cluster region transmit their data directly to their respective cluster head which transmits data to the gateway in its region. If the distance between a cluster head and the sink is less than the distance between the cluster head and the gateway node, the cluster head transmits data to the sink instead of the gateway node. We have compared the proposed protocol with Low-Energy Adaptive Clustering Hierarchy (LEACH, Gateway Based Energy Aware Multi-Hop Routing (M-GEAR, and Gateway Based Stable Election Protocol (GSEP protocols. The protocol performs better than other protocols in terms of throughput, stability period, lifetime, residual energy, and the packet transmitted to the sink.

  3. An Adaptive Information Quantity-Based Broadcast Protocol for Safety Services in VANET

    Directory of Open Access Journals (Sweden)

    Wenjie Wang

    2016-01-01

    Full Text Available Vehicle-to-vehicle communication plays a significantly important role in implementing safe and efficient road traffic. When disseminating safety messages in the network, the information quantity on safety packets changes over time and space. However, most of existing protocols view each packet the same to disseminate, preventing vehicles from collecting more recent and precise safety information. Hence, an information quantity-based broadcast protocol is proposed in this paper to ensure the efficiency of safety messages dissemination. In particular, we propose the concept of emergency-degree to evaluate packets’ information quantity. Then we present EDCast, an emergency-degree-based broadcast protocol. EDCast differentiates each packet’s priority for accessing the channel based on its emergency-degree so as to provide vehicles with more safety information timely and accurately. In addition, an adaptive scheme is presented to ensure fast dissemination of messages in different network condition. We compare the performance of EDCast with those of three other representative protocols in a typical highway scenario. Simulation results indicate that EDCast achieves higher broadcast efficiency and less redundancy with less delivery delay. What we found demonstrates that it is feasible and necessary for incorporating information quantity of messages in designing an efficient safety message broadcast protocol.

  4. Graph- versus Vector-Based Analysis of a Consensus Protocol

    NARCIS (Netherlands)

    Delzanno, Giorgio; Rensink, Arend; Traverso, Riccardo; Bošnački, Dragan; Edelkamp, Stefan; Lluch Lafuente, Alberto; Wijs, Anton

    2014-01-01

    The Paxos distributed consensus algorithm is a challenging case-study for standard, vector-based model checking techniques. Due to asynchronous communication, exhaustive analysis may generate very large state spaces already for small model instances. In this paper, we show the advantages of graph tr

  5. A School-Based Suicide Risk Assessment Protocol

    Science.gov (United States)

    Boccio, Dana E.

    2015-01-01

    Suicide remains the third leading cause of death among young people in the United States. Considering that youth who contemplate suicide generally exhibit warning signs before engaging in lethal self-harm, school-based mental health professionals can play a vital role in identifying students who are at risk for suicidal behavior. Nevertheless, the…

  6. Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures

    Directory of Open Access Journals (Sweden)

    Christian M. Mueller

    2010-12-01

    Full Text Available Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown attacks. In this paper, we present an extension to known Support Vector Machine (SVM based anomaly detection algorithms for the Session Initiation Protocol (SIP. Our contribution is to extend the amount of different features used for classification (feature space by exploiting the structure of SIP messages, which reduces the false positive rate. Additionally, we show how combining our approach with attribute reduction significantly improves throughput.

  7. A Unidirectional Split-key Based Signature Protocol with Encrypted Function in Mobile Code Environment

    Institute of Scientific and Technical Information of China (English)

    MIAOFuyou; YANGShoubao; XIONGYan; HUABei; WANGXingfu

    2005-01-01

    In mobile code environment, signing private keys are liable to be exposed; visited hosts are susceptible to be attacked by all kinds of vicious mobile codes, therefore a signer often sends remote nodes mobile codes containing an encrypted signature function to complete a signature. The paper first presents a unidirectional split-key scheme for private key protection based on RSA, which is more simple and secure than secret sharing; and then proposes a split-key based signature protocol with encrypted function, which is traceable, undeniable and malignance resistant. Security analysis shows that the protocol can effectively protect the signing private key and complete secure signatures in mobile code environment.

  8. Enriched glucose and dextrin mannitol-based media modulates fibroblast behavior on bacterial cellulose membranes

    Energy Technology Data Exchange (ETDEWEB)

    Stumpf, Taisa R.; Pértile, Renata A.N. [Integrated Technologies Laboratory, Department of Chemical and Food Engineering (Brazil); Rambo, Carlos R., E-mail: rambo@intelab.ufsc.br [Department of Electrical Engineering, Federal University of Santa Catarina, Florianópolis 88040-900 (Brazil); Porto, Luismar M. [Integrated Technologies Laboratory, Department of Chemical and Food Engineering (Brazil)

    2013-12-01

    Bacterial cellulose (BC) produced by Gluconacetobacter hansenii is a suitable biopolymer for biomedical applications. In order to modulate the properties of BC and expand its use as substrate for tissue engineering mainly in the form of biomembranes, glucose or dextrin were added into a BC fermentation mannitol-based medium (BCGl and BCDe, respectively) under static culture conditions. SEM images showed effects on fiber density and porosity on both sides of the BC membranes. Both enriched media decreased the BET surface area, water holding capacity, and rehydration rate. Fourier transform infrared (attenuated total reflectance mode) spectroscopy (FTIR-ATR) analysis revealed no change in the chemical structure of BC. L929 fibroblast cells were seeded on all BC-based membranes and evaluated in aspects of cell adhesion, proliferation and morphology. BCG1 membranes showed the highest biological performance and hold promise for the use in tissue engineering applications. - Highlights: • Glucose and dextrin were used to modify culture media for BC production. • Microarchitecture of BC was different depending on the enriching agent. • Fibroblasts adhered on the surface of BC modified microarchitectures. • Fibroblasts adhered on glucose modified BC exhibited healthy cell morphology.

  9. Management of Energy Consumption on Cluster Based Routing Protocol for MANET

    Science.gov (United States)

    Hosseini-Seno, Seyed-Amin; Wan, Tat-Chee; Budiarto, Rahmat; Yamada, Masashi

    The usage of light-weight mobile devices is increasing rapidly, leading to demand for more telecommunication services. Consequently, mobile ad hoc networks and their applications have become feasible with the proliferation of light-weight mobile devices. Many protocols have been developed to handle service discovery and routing in ad hoc networks. However, the majority of them did not consider one critical aspect of this type of network, which is the limited of available energy in each node. Cluster Based Routing Protocol (CBRP) is a robust/scalable routing protocol for Mobile Ad hoc Networks (MANETs) and superior to existing protocols such as Ad hoc On-demand Distance Vector (AODV) in terms of throughput and overhead. Therefore, based on this strength, methods to increase the efficiency of energy usage are incorporated into CBRP in this work. In order to increase the stability (in term of life-time) of the network and to decrease the energy consumption of inter-cluster gateway nodes, an Enhanced Gateway Cluster Based Routing Protocol (EGCBRP) is proposed. Three methods have been introduced by EGCBRP as enhancements to the CBRP: improving the election of cluster Heads (CHs) in CBRP which is based on the maximum available energy level, implementing load balancing for inter-cluster traffic using multiple gateways, and implementing sleep state for gateway nodes to further save the energy. Furthermore, we propose an Energy Efficient Cluster Based Routing Protocol (EECBRP) which extends the EGCBRP sleep state concept into all idle member nodes, excluding the active nodes in all clusters. The experiment results show that the EGCBRP decreases the overall energy consumption of the gateway nodes up to 10% and the EECBRP reduces the energy consumption of the member nodes up to 60%, both of which in turn contribute to stabilizing the network.

  10. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  11. Adaptive low-power listening MAC protocol based on transmission rates.

    Science.gov (United States)

    Hwang, Kwang-il; Yi, Gangman

    2014-01-01

    Even though existing low-power listening (LPL) protocols have enabled ultra-low-power operation in wireless sensor networks (WSN), they do not address trade-off between energy and delay, since they focused only on energy aspect. However, in recent years, a growing interest in various WSN applications is requiring new design factors, such as minimum delay and higher reliability, as well as energy efficiency. Therefore, in this paper we propose a novel sensor multiple access control (MAC) protocol, transmission rate based adaptive low-power listening MAC protocol (TRA-MAC), which is a kind of preamble-based LPL but is capable of controlling preamble sensing cycle adaptively to transmission rates. Through experiments, it is demonstrated that TRA-MAC enables LPL cycle (LC) and preamble transmission length to adapt dynamically to varying transmission rates, compensating trade-off between energy and response time.

  12. Gene-ontology enrichment analysis in two independent family-based samples highlights biologically plausible processes for autism spectrum disorders.

    LENUS (Irish Health Repository)

    Anney, Richard J L

    2012-02-01

    Recent genome-wide association studies (GWAS) have implicated a range of genes from discrete biological pathways in the aetiology of autism. However, despite the strong influence of genetic factors, association studies have yet to identify statistically robust, replicated major effect genes or SNPs. We apply the principle of the SNP ratio test methodology described by O\\'Dushlaine et al to over 2100 families from the Autism Genome Project (AGP). Using a two-stage design we examine association enrichment in 5955 unique gene-ontology classifications across four groupings based on two phenotypic and two ancestral classifications. Based on estimates from simulation we identify excess of association enrichment across all analyses. We observe enrichment in association for sets of genes involved in diverse biological processes, including pyruvate metabolism, transcription factor activation, cell-signalling and cell-cycle regulation. Both genes and processes that show enrichment have previously been examined in autistic disorders and offer biologically plausibility to these findings.

  13. gDNA Enrichment by a Transposase-based Technology for NGS Analysis of the Whole Sequence of BRCA1, BRCA2, and 9 Genes Involved in DNA Damage Repair

    Science.gov (United States)

    Chevrier, Sandy; Boidot, Romain

    2014-01-01

    The widespread use of Next Generation Sequencing has opened up new avenues for cancer research and diagnosis. NGS will bring huge amounts of new data on cancer, and especially cancer genetics. Current knowledge and future discoveries will make it necessary to study a huge number of genes that could be involved in a genetic predisposition to cancer. In this regard, we developed a Nextera design to study 11 complete genes involved in DNA damage repair. This protocol was developed to safely study 11 genes (ATM, BARD1, BRCA1, BRCA2, BRIP1, CHEK2, PALB2, RAD50, RAD51C, RAD80, and TP53) from promoter to 3'-UTR in 24 patients simultaneously. This protocol, based on transposase technology and gDNA enrichment, gives a great advantage in terms of time for the genetic diagnosis thanks to sample multiplexing. This protocol can be safely used with blood gDNA. PMID:25350069

  14. A Structure-Based Design Protocol for Optimizing Combinatorial Protein Libraries.

    Science.gov (United States)

    Lunt, Mark W; Snow, Christopher D

    2016-01-01

    Protein variant libraries created via site-directed mutagenesis are a powerful approach to engineer improved proteins for numerous applications such as altering enzyme substrate specificity. Conventional libraries commonly use a brute force approach: saturation mutagenesis via degenerate codons that encode all 20 natural amino acids. In contrast, this chapter describes a protocol for designing "smarter" degenerate codon libraries via direct combinatorial optimization in "library space." Several case studies illustrate how it is possible to design degenerate codon libraries that are highly enriched for favorable, low-energy sequences as assessed using a standard all-atom scoring function. There is much to gain for experimental protein engineering laboratories willing to think beyond site saturation mutagenesis. In the common case that the exact experimental screening budget is not fixed, it is particularly helpful to perform a Pareto analysis to inspect favorable libraries at a range of possible library sizes.

  15. An adaptive OFDMA-based MAC protocol for underwater acoustic wireless sensor networks.

    Science.gov (United States)

    Khalil, Issa M; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols.

  16. An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Issa M. Khalil

    2012-06-01

    Full Text Available Underwater acoustic wireless sensor networks (UAWSNs have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA-based Media Access Control (MAC protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA-based MAC protocols.

  17. Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Shugo Mikami

    2015-01-01

    Full Text Available Passive radio-frequency identification (RFID tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function.

  18. A Swarm Intelligent Algorithm Based Route Maintaining Protocol for Mobile Sink Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaoming Wu

    2015-01-01

    Full Text Available Recent studies have shown that mobile sink can be a solution to solve the problem that energy consumption of sensor nodes is not balanced in wireless sensor networks (WSNs. Caused by the sink mobility, the paths between the sensor nodes and the sink change frequently and have profound influence on the lifetime of WSN. It is necessary to design a protocol that can find efficient routings between the mobile sink and nodes but does not consume too many network resources. In this paper, we propose a swarm intelligent algorithm based route maintaining protocol to resolve this issue. The protocol utilizes the concentric ring mechanism to guide the route researching direction and adopts the optimal routing selection to maintain the data delivery route in mobile sink WSN. Using the immune based artificial bee colony (IABC algorithm to optimize the forwarding path, the routing maintaining protocol could find an alternative routing path quickly and efficiently when the coordinate of sink is changed in WSN. The results of our extensive experiments demonstrate that our proposed route maintaining protocol is able to balance the network traffic load and prolong the network lifetime.

  19. Fuzzy Based Energy Efficient Multiple Cluster Head Selection Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sohel Rana

    2015-03-01

    Full Text Available The Wireless Sensor Network (WSN is made up with small batteries powered sensor devices with lim-ited energy resources within it. These sensor nodes are used to monitor physical or environmental conditions and to pass their data through the wireless network to the main location. One of the crucial issues in wireless sensor network is to create a more energy efficient system. Clustering is one kind of mechanism in Wireless Sensor Networks to prolong the network lifetime and to reduce network energy consumption. In this paper, we propose a new routing protocol called Fuzzy Based Energy Effi-cient Multiple Cluster Head Selection Routing Protocol (FEMCHRP for Wireless Sensor Network. The routing process involves the Clustering of nodes and the selection of Cluster Head (CH nodes of these clusters which sends all the information to the Cluster Head Leader (CHL. After that, the cluster head leaders send aggregated data to the Base Station (BS. The selection of cluster heads and cluster head leaders is performed by using fuzzy logic and the data transmission process is performed by shortest energy path which is selected applying Dijkstra Algorithm. The simulation results of this research are compared with other protocols BCDCP, CELRP and ECHERP to evaluate the performance of the proposed routing protocol. The evaluation concludes that the proposed routing protocol is better in prolonging network lifetime and balancing energy consumption.

  20. An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks

    Science.gov (United States)

    Khalil, Issa M.; Gadallah, Yasser; Hayajneh, Mohammad; Khreishah, Abdallah

    2012-01-01

    Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. PMID:23012517

  1. Hybrid Weighted-based Clustering Routing Protocol for Railway Communications

    Directory of Open Access Journals (Sweden)

    Jianli Xie

    2013-12-01

    Full Text Available In the paper, a hybrid clustering routing strategy is proposed for railway emergency ad hoc network, when GSM-R base stations are destroyed or some terminals (or nodes are far from the signal coverage. In this case, the cluster-head (CH election procedure is invoked on-demand, which takes into consideration the degree difference from the ideal degree, relative clustering stability, the sum of distance between the node and it’s one-hop neighbors, consumed power, node type and node mobility. For the clustering forming, the weights for the CH election parameters are allocated rationally by rough set theory. The hybrid weighted-based clustering routing (HWBCR strategy is designed for railway emergency communication scene, which aims to get a good trade-off between the computation costs and performances. The simulation platform is constructed to evaluate the performance of our strategy in terms of the average end-to-end delay, packet loss ratio, routing overhead and average throughput. The results, by comparing with the railway communication QoS index, reveal that our strategy is suitable for transmitting dispatching voice and data between train and ground, when the train speed is less than 220km/h

  2. In vivo protein quality of selected cereal-based staple foods enriched with soybean proteins

    Directory of Open Access Journals (Sweden)

    Laura Acevedo-Pacheco

    2016-10-01

    Full Text Available Background: One way to diminish protein malnutrition in children is by enriching cereal-based flours for the manufacturing of maize tortillas, wheat flour tortillas, and yeast-leavened breads, which are widely consumed among low socio-economic groups. Objective: The aim was to determine and compare the essential amino acid (EAA scores, protein digestibility corrected amino acid scores (PDCAAS, and in vivo protein quality (protein digestibility, protein efficiency ratio (PER, biological values (BV, and net protein utilization (NPU values of regular versus soybean-fortified maize tortillas, yeast-leavened bread, and wheat flour tortillas. Design: To comparatively assess differences in protein quality among maize tortillas, wheat flour tortillas, and yeast-leavened breads, EAA compositions and in vivo studies with weanling rats were performed. The experimental diets based on regular or soybean-fortified food products were compared with a casein-based diet. Food intake, weight gains, PER, dry matter and protein digestibility, BV, NPU, and PDCAAS were assessed. The soybean-fortified tortillas contained 6% of defatted soybean flour, whereas the yeast-leavened bread flour contained 4.5% of soybean concentrate. Results: The soybean-fortified tortillas and bread contained higher amounts of lysine and tryptophan, which improved their EAA scores and PDCAAS. Rats fed diets based on soybean-fortified maize or wheat tortillas gained considerably more weight and had better BV and NPU values compared with counterparts fed with respective regular products. As a result, fortified maize tortillas and wheat flour tortillas improved PER from 0.73 to 1.64 and 0.69 to 1.77, respectively. The PER improvement was not as evident in rats fed the enriched yeast-leavened bread because the formulation contained sugar that decreased lysine availability possibly to Maillard reactions. Conclusions: The proposed enrichment of cereal-based foods with soybean proteins greatly

  3. A Cross-domain Authentication Protocol based on ID

    Directory of Open Access Journals (Sweden)

    Zheng Jun

    2013-01-01

    Full Text Available In large distributed networks, many computers must be mutual coordination to complete some works Under the certain conditions, these computers may come from different domains. For ensuring the safety to access resources among these computers in different domains, we propose a cross-domain union authentication scheme. We compute a large prime cyclic group by elliptic curve, and use the direct decomposition of this group to decompose automorphism groups ,and design an signcryption scheme between domains by bilinear of automorphism group to achieve cross-domain union authentication. this scheme overcome the complexity of certificate transmission and bottlenecks in the scheme of PKI-based, and it can trace the entities and supports two-way entities anonymous authentication, which avoid the authority counterfeiting its member to cross-domain access resources. Analyses show that its advantages on security and communication-consumption .

  4. A combined enrichment/polymerase chain reaction based method for the routine screening of streptococcus agalactiae in pregnant women

    OpenAIRE

    MUNARI, F. M.; de-Paris,F.; Salton, G.D.; Lora,P.S; Giovanella, P.; Machado, A.B.M.P.; Laybauer, L.S.; Oliveira, K.R.P.; C. Ferri; Silveira, J.L.S.; Laurino,C.C.F.C; Xavier, R.M.; Barth,A.L.; S Echeverrigaray; Laurino, J.P.

    2012-01-01

    Group B Streptococcus (GBS) is the most common cause of life-threatening infection in neonates. Guidelines from CDC recommend universal screening of pregnant women for rectovaginal GBS colonization. The objective of this study was to compare the performance of a combined enrichment/PCR based method targeting the atr gene in relation to culture using enrichment with selective broth medium (standard method) to identify the presence of GBS in pregnant women. Rectovaginal GBS samples from women a...

  5. Validation of Flow Cytometry and Magnetic Bead-Based Methods to Enrich CNS Single Cell Suspensions for Quiescent Microglia.

    Science.gov (United States)

    Volden, T A; Reyelts, C D; Hoke, T A; Arikkath, J; Bonasera, S J

    2015-12-01

    Microglia are resident mononuclear phagocytes within the CNS parenchyma that intimately interact with neurons and astrocytes to remodel synapses and extracellular matrix. We briefly review studies elucidating the molecular pathways that underlie microglial surveillance, activation, chemotaxis, and phagocytosis; we additionally place these studies in a clinical context. We describe and validate an inexpensive and simple approach to obtain enriched single cell suspensions of quiescent parenchymal and perivascular microglia from the mouse cerebellum and hypothalamus. Following preparation of regional CNS single cell suspensions, we remove myelin debris, and then perform two serial enrichment steps for cells expressing surface CD11b. Myelin depletion and CD11b enrichment are both accomplished using antigen-specific magnetic beads in an automated cell separation system. Flow cytometry of the resultant suspensions shows a significant enrichment for CD11b(+)/CD45(+) cells (perivascular microglia) and CD11b(+)/CD45(-) cells (parenchymal microglia) compared to starting suspensions. Of note, cells from these enriched suspensions minimally express Aif1 (aka Iba1), suggesting that the enrichment process does not evoke significant microglial activation. However, these cells readily respond to a functional challenge (LPS) with significant changes in the expression of molecules specifically associated with microglia. We conclude that methods employing a combination of magnetic-bead based sorting and flow cytometry produce suspensions highly enriched for microglia that are appropriate for a variety of molecular and cellular assays.

  6. Efficient dielectrophoretic cell enrichment using a dielectrophoresis-well based system.

    Science.gov (United States)

    Abdul Razak, Mohd Azhar; Hoettges, Kai F; Fatoyinbo, Henry O; Labeed, Fatima H; Hughes, Michael P

    2013-01-01

    Whilst laboratory-on-chip cell separation systems using dielectrophoresis are increasingly reported in the literature, many systems are afflicted by factors which impede "real world" performance, chief among these being cell loss (in dead spaces, attached to glass and tubing surfaces, or sedimentation from flow), and designs with large channel height-to-width ratios (large channel widths, small channel heights) that make the systems difficult to interface with other microfluidic systems. In this paper, we present a scalable structure based on 3D wells with approximately unity height-to-width ratios (based on tubes with electrodes on the sides), which is capable of enriching yeast cell populations whilst ensuring that up to 94.3% of cells processed through the device can be collected in tubes beyond the output.

  7. Enriched glucose and dextrin mannitol-based media modulates fibroblast behavior on bacterial cellulose membranes.

    Science.gov (United States)

    Stumpf, Taisa R; Pértile, Renata A N; Rambo, Carlos R; Porto, Luismar M

    2013-12-01

    Bacterial cellulose (BC) produced by Gluconacetobacter hansenii is a suitable biopolymer for biomedical applications. In order to modulate the properties of BC and expand its use as substrate for tissue engineering mainly in the form of biomembranes, glucose or dextrin were added into a BC fermentation mannitol-based medium (BCGl and BCDe, respectively) under static culture conditions. SEM images showed effects on fiber density and porosity on both sides of the BC membranes. Both enriched media decreased the BET surface area, water holding capacity, and rehydration rate. Fourier transform infrared (attenuated total reflectance mode) spectroscopy (FTIR-ATR) analysis revealed no change in the chemical structure of BC. L929 fibroblast cells were seeded on all BC-based membranes and evaluated in aspects of cell adhesion, proliferation and morphology. BCG1 membranes showed the highest biological performance and hold promise for the use in tissue engineering applications.

  8. Timed artificial insemination programs during the summer in lactating dairy cows: comparison of the 5-d Cosynch protocol with an estrogen/progesterone-based protocol.

    Science.gov (United States)

    Pereira, M H C; Rodrigues, A D P; Martins, T; Oliveira, W V C; Silveira, P S A; Wiltbank, M C; Vasconcelos, J L M

    2013-01-01

    The objective of this study was to compare a GnRH-based to an estrogen/progesterone (E2/P4)-based protocol for estrous cycle synchronization and fixed timed artificial insemination (TAI), both designed for synchronization of ovulation and to reduce the period from follicular emergence until ovulation in cows with a synchronized follicular wave. A total of 1,190 lactating Holstein cows (primiparous: n=685 and multiparous: n=505) yielding 26.5 ± 0.30 kg of milk/d at 177 ± 5.02 d in milk were randomly assigned to receive one of the following programs: 5-d Cosynch protocol [d -8: controlled internal drug release (CIDR) + GnRH; d -3: CIDR removal + PGF2α; d -2: PGF2α; d 0: TAI + GnRH] or E2/P4 protocol (d -10: CIDR + estradiol benzoate; d -3: PGF2α; d -2: CIDR removal + estradiol cypionate; d 0: TAI). Rectal temperature and circulating progesterone (P4) were measured on d -3, -2, 0 (TAI), and 7. The estrous cycle was considered to be synchronized when P4 was ≥ 1.0 ng/mL on d 7 in cows that had luteolysis (P4 ≤ 0.4 ng/mL on d 0). To evaluate the effects of heat stress, cows were classified by number of heat stress events: 0, 1, and 2-or-more measurements of elevated body temperature (≥ 39.1 °C). Pregnancy success (pregnancy per artificial insemination, P/AI) was determined at d 32 and 60 after TAI. The cows in the 5-d Cosynch protocol had increased circulating P4 at the time of PGF2α injection (2.66 ± 0.13 vs. 1.66 ± 0.13 ng/mL). The cows in the E2/P4 protocol were more likely to be detected in estrus (62.8 vs. 43.4%) compared with the cows in the 5-d Cosynch protocol, and expression of estrus improved P/AI in both treatments. The cows in the 5-d Cosynch protocol had greater percentage of synchronized estrous cycle (78.2%), compared with cows in the E2/P4 protocol (70.7%). On d 60, the E2/P4 protocol tended to improve P/AI (20.7 vs. 16.7%) and reduced pregnancy loss from 32 to 60 d (11.0 vs. 19.6%), compared with the 5-d Cosynch protocol. In cows withtheir

  9. nPAKE+:A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords

    Institute of Scientific and Technical Information of China (English)

    Zhi-guo Wan; Robert H. Deng; Feng Bao; Bart Preneel; Ming Gu

    2009-01-01

    Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a tree-based group PAKE protocol -- nPAKE+ protocol under the setting where each party shares an independent password with a trusted server. The nPAKE+ protocol is a novel combination of the hierarchical key tree structure and the password-based Diffie-Hellman exchange, and hence it achieves substantial gain in computation efficiency. In particular, the computation cost for each client in our protocol is only O(log n). Additionally, the hierarchical feature of nPAKE+ enables every subgroup to obtain its own subgroup key in the end. We also prove the security of our protocol under the random oracle model and the ideal cipher model.

  10. Material classification and automatic content enrichment of images using supervised learning and knowledge bases

    Science.gov (United States)

    Mallepudi, Sri Abhishikth; Calix, Ricardo A.; Knapp, Gerald M.

    2011-02-01

    In recent years there has been a rapid increase in the size of video and image databases. Effective searching and retrieving of images from these databases is a significant current research area. In particular, there is a growing interest in query capabilities based on semantic image features such as objects, locations, and materials, known as content-based image retrieval. This study investigated mechanisms for identifying materials present in an image. These capabilities provide additional information impacting conditional probabilities about images (e.g. objects made of steel are more likely to be buildings). These capabilities are useful in Building Information Modeling (BIM) and in automatic enrichment of images. I2T methodologies are a way to enrich an image by generating text descriptions based on image analysis. In this work, a learning model is trained to detect certain materials in images. To train the model, an image dataset was constructed containing single material images of bricks, cloth, grass, sand, stones, and wood. For generalization purposes, an additional set of 50 images containing multiple materials (some not used in training) was constructed. Two different supervised learning classification models were investigated: a single multi-class SVM classifier, and multiple binary SVM classifiers (one per material). Image features included Gabor filter parameters for texture, and color histogram data for RGB components. All classification accuracy scores using the SVM-based method were above 85%. The second model helped in gathering more information from the images since it assigned multiple classes to the images. A framework for the I2T methodology is presented.

  11. A Field-Based Testing Protocol for Assessing Gross Motor Skills in Preschool Children: The Children's Activity and Movement in Preschool Study Motor Skills Protocol

    Science.gov (United States)

    Williams, Harriet G.; Pfeiffer, Karin A.; Dowda, Marsha; Jeter, Chevy; Jones, Shaverra; Pate, Russell R.

    2009-01-01

    The purpose of this study was to develop a valid and reliable tool for use in assessing motor skills in preschool children in field-based settings. The development of the Children's Activity and Movement in Preschool Study Motor Skills Protocol included evidence of its reliability and validity for use in field-based environments as part of large…

  12. Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Transmission Protocol: A Simulation Based Approach

    Directory of Open Access Journals (Sweden)

    Meenakshi Sharma

    2012-10-01

    Full Text Available This paper gives a brief description about some routing protocols like EEE LEACH, LEACH and DirectTransmission protocol (DTx in Wireless Sensor Network (WSN and a comparison study of theseprotocols based on some performance matrices. Addition to this an attempt is done to calculate theirtransmission time and throughput. To calculate these, MATLAB environment is used. Finally, on the basisof the obtained results from the simulation, the above mentioned three protocols are compared. Thecomparison results show that, the EEE LEACH routing protocol has a greater transmission time thanLEACH and DTx protocol and with smaller throughput

  13. Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Transmission Protocol: A Simulation Based Approach

    Directory of Open Access Journals (Sweden)

    Meenakshi Sharma

    2012-12-01

    Full Text Available This paper gives a brief description about some routing protocols like EEE LEACH, LEACH and DirectTransmission protocol (DTx in Wireless Sensor Network (WSN and a comparison study of theseprotocols based on some performance matrices. Addition to this an attempt is done to calculate theirtransmission time and throughput. To calculate these, MATLAB environment is used. Finally, on the basisof the obtained results from the simulation, the above mentioned three protocols are compared. Thecomparison results show that, the EEE LEACH routing protocol has a greater transmission time thanLEACH and DTx protocol and with smaller throughput.

  14. Experimental implementation of a real-time token-based network protocol on a microcontroller

    NARCIS (Netherlands)

    Hanssen, Ferdy; Krikke, Robert; Baron, Bert; Jansen, Pierre G.; Scholten, Hans

    2004-01-01

    The real-time token-based RTnet network protocol has been implemented on a standard Ethernet network to investigate the possibility to use cheap components with strict resource limitations while preserving Quality of Service guarantees. It will be shown that the proposed implementation is feasible o

  15. Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation

    Science.gov (United States)

    Xiao, Xin; Shi, Yuanchun; Tang, Yun; Zhang, Nan

    During recent years, there has been a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node acts as dual roles of receiver and sender, independently exchanging data with its neighbors to facilitate scalability and resilience. However, most of previous work in this literature seldom considered cheating issue of end users, which is also very important in face of the fact that the mutual cooperation inherently determines overall system performance. In this paper, we investigate the dishonest behaviors in decentralized gossip-based protocol through extensive experimental study. Our original contributions come in two-fold: In the first part of cheating study, we analytically discuss two typical cheating strategies, that is, intentionally increasing subscription requests and untruthfully calculating forwarding probability, and further evaluate their negative impacts. The results indicate that more attention should be paid to defending cheating behaviors in gossip-based protocol. In the second part of anti-cheating study, we propose a receiver-driven measurement mechanism, which evaluates individual forwarding traffic from the perspective of receivers and thus identifies cheating nodes with high incoming/outgoing ratio. Furthermore, we extend our mechanism by introducing reliable factor to further improve its accuracy. The experiments under various conditions show that it performs quite well in case of serious cheating and achieves considerable performance in other cases.

  16. An Improved Constraint-based system for the verification of security protocols

    NARCIS (Netherlands)

    Corin, Ricardo; Etalle, Sandro; Hermenegildo, Manuel V.; Puebla, German

    2002-01-01

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect aws associated to partial runs an

  17. Synchronization of ovulation in goats using prostaglandin F2α based protocols during the breeding season

    Directory of Open Access Journals (Sweden)

    João Simões

    2016-03-01

    Full Text Available The main aim of this review was to describe the feasibility of prostaglandin F2α (PGF2α based protocols used as a tool for ovulation synchronization in cycling goats. There is a reproductive seasonality in small ruminants. However, from latitudes 45 ° towards equator, the intensity of anoestrus progressively decreases and tends to disappear in local breeds. Consequently, PGF2α or their synthetic analogues as luteolytic substances can assume a great importance in reproductive management of flocks from these regions. However, a single or double (9–11 days apart PGF2α administration provokes a good induction but a moderate synchronization of ovulations if timed artificial insemination is considered, and a significant short oestrous cycle can occur with detrimental effects on fertility rate when compared with conventional progesterone-based protocols. In order to minimize this constraint, some gonadotropinreleasing hormone-PGF2α-gonadotropin-releasing hormone (Ovsynch-based protocols and their modifications, manipulating the dominant follicles and corpora lutea, were successfully tested in goats. Similar to cows, these PGF2α based protocols seem to be a promising and more cost-effective tool for reproductive management in cycling goats.

  18. Synchronization of ovulation in goats using prostaglandin F2α based protocols during the breeding season

    Institute of Scientific and Technical Information of China (English)

    João Simões

    2016-01-01

    The main aim of this review was to describe the feasibility of prostaglandin F2α (PGF2α)based protocols used as a tool for ovulation synchronization in cycling goats. There is a reproductive seasonality in small ruminants. However, from latitudes 45° towards equator, the intensity of anoestrus progressively decreases and tends to disappear in local breeds. Consequently, PGF2α or their synthetic analogues as luteolytic substances can assume a great importance in reproductive management of flocks from these regions. However, a single or double (9–11 days apart)PGF2α administration provokes a good induction but a moderate synchronization of ovulations if timed artificial insemination is considered, and a significant short oestrous cycle can occur with detrimental effects on fertility rate when compared with conventional progesterone-based protocols. In order to minimize this constraint, some gonadotropin-releasing hormone-PGF2α-gonadotropin-releasing hormone (Ovsynch)-based protocols and their modifications, manipulating the dominant follicles and corpora lutea, were successfully tested in goats. Similar to cows, thesePGF2α based protocols seem to be a promising and more cost-effective tool for reproductive management in cycling goats.

  19. DPHM: A FAULT DETECTION PROTOCOL BASED ON HEARTBEAT OF MULTIPLE MASTER-NODES

    Institute of Scientific and Technical Information of China (English)

    Dong Jian; Zuo Decheng; Liu Hongwei; Yang Xiaozong

    2007-01-01

    In most of fault detection algorithms of distributed system, fault model is restricted to fault of process, and link failure is simply masked, or modeled by process failure. Both methods can soon use up system resource and potentially reduce the availability of system. A fault Detection Protocol based on Heartbeat of multiple Master-nodes (DPHM) is proposed, which can immediately and accurately detect and locate faulty links by adopting voting and electing mechanism among master-nodes. Thus,DPHM can effectively improve availability of system. In addition, in contrast with other detection protocols, DPHM reduces greatly the detection cost due to the structure of master-nodes.

  20. A TDMA based media access control protocol for wireless ad hoc networks

    Science.gov (United States)

    Yang, Qi; Tang, Biyu

    2013-03-01

    This paper presents a novel Time Division Multiplex Access (TDMA) based Media Access Control (MAC) protocol of wireless Ad Hoc network. To achieve collision free transmission, time slots in a MAC frame are cataloged into three types, that is access slot, control slot and traffic slot. Nodes in the network access to the network in the access slot, and an exclusive control is allocated subsequently. Data packets are transmission by dynamic schedule the traffic slots. Throughput and transmission delay are also analyzed by simulation experiment. The proposed protocol is capable of providing collision free transmission and achieves high throughput.

  1. AIF-ω: Set-Based Protocol Abstraction with Countable Families

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Bruni, Alessandro

    2016-01-01

    Abstraction based approaches like ProVerif are very efficient in protocol verification, but have a limitation in dealing with stateful protocols. A number of extensions have been proposed to allow for a limited amount of state information while not destroying the advantages of the abstraction...... this limitation by abstracting state into countable families of sets. We can then formalize a problem with unbounded agents, where each agent maintains its own set of keys. Still, our method does not loose the benefits of the abstraction approach, in particular, it translates a verification problem to a set...

  2. Multi-Party Quantum Private Comparison Protocol Based on Entanglement Swapping of Bell Entangled States

    Science.gov (United States)

    Ye, Tian-Yu

    2016-09-01

    Recently, Liu et al. proposed a two-party quantum private comparison (QPC) protocol using entanglement swapping of Bell entangled state (Commun. Theor. Phys. 57 (2012) 583). Subsequently Liu et al. pointed out that in Liu et al.'s protocol, the TP can extract the two users' secret inputs without being detected by launching the Bell-basis measurement attack, and suggested the corresponding improvement to mend this loophole (Commun. Theor. Phys. 62 (2014) 210). In this paper, we first point out the information leakage problem toward TP existing in both of the above two protocols, and then suggest the corresponding improvement by using the one-way hash function to encrypt the two users' secret inputs. We further put forward the three-party QPC protocol also based on entanglement swapping of Bell entangled state, and then validate its output correctness and its security in detail. Finally, we generalize the three-party QPC protocol into the multi-party case, which can accomplish arbitrary pair's comparison of equality among K users within one execution. Supported by the National Natural Science Foundation of China under Grant No. 61402407

  3. Ground-Based Network and Supersite Observations to Complement and Enrich EOS Research

    Science.gov (United States)

    Tsay, Si-Chee; Holben, Brent N.; Welton, Ellsworth J.

    2011-01-01

    Since 1997 NASA has been successfully launching a series of satellites - the Earth Observing System (EOS) - to intensively study, and gain a better understanding of, the Earth as an integrated system. Space-borne remote sensing observations, however, are often plagued by contamination of surface signatures. Thus, ground-based in-situ and remote-sensing measurements, where signals come directly from atmospheric constituents, the sun, and/or the Earth-atmosphere interactions, provide additional information content for comparisons that confirm quantitatively the usefulness of the integrated surface, aircraft, and satellite datasets. Through numerous participations, particularly but not limited to the EOS remote-sensing/retrieval and validation projects over the years, NASA/GSFC has developed and continuously refined ground-based networks and mobile observatories that proved to be vital in providing high temporal measurements, which complement and enrich the satellite observations. These are: the AERO NET (AErosol RObotic NETwork) a federation of ground-based globally distributed network of spectral sun-sky photometers; the MPLNET (Micro-Pulse Lidar NETwork, a similarly organized network of micro-pulse lidar systems measuring aerosol and cloud vertical structure continuously; and the SMART-COMMIT (Surface-sensing Measurements for Atmospheric Radiative Transfer - Chemical, Optical & Microphysical Measurements of In-situ Troposphere, mobile observatories, a suite of spectral radiometers and in-situ probes acquiring supersite measurements. Most MPLNET sites are collocated with those of AERONET, and both networks always support the deployment of SMART-COMMIT worldwide. These data products follow the data structure of EOS conventions: Level-0, instrument archived raw data; Level-1 (or 1.5), real-time data with no (or limited) quality assurance; Level-2, not real high temporal and spectral resolutions. In this talk, we will present NASA/GSFC groundbased facilities, serving

  4. An Efficient Quality of Service Based Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Tapan Kumar Godder

    2011-05-01

    Full Text Available Ad-hoc network is set up with multiple wireless devices without any infrastructure. Its employment is favored in many environments. Quality of Service (QoS is one of the main issues for any network and due to bandwidth constraint and dynamic topology of mobile ad hoc networks, supporting Quality of Service (QoS is extremely a challenging task. It is modeled as a multi-layer problem and is considered in both Medium Access Control (MAC and routing layers for ad hoc networks. Ad-hoc On-demand Distance Vector (AODV routing protocol is one of the most used and popular reactive routing protocols in ad-hoc networks. This paper proposed a new protocol QoS based AODV (QAODV which is a modified version of AODV.

  5. A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations

    CERN Document Server

    Laurent, Burgy; Lawall, Julia; Muller, Gilles

    2007-01-01

    The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, hand-writing network message processing code has become increasingly error-prone. In this paper, we present a domain-specific language, Zebu, for describing protocol message formats and related processing constraints. From a Zebu specification, a compiler automatically generates stubs to be used by an application to parse network messages. Zebu is easy to use, as it builds on notations used in RFCs to describe protocol grammars. Zebu is also efficient, as the memory usage is tailored to application needs and message fragments can be specified to be processed on demand. Finally, Zebu-based applications are robust, as the Zebu compiler automatically checks specification consistency and generates parsing stubs that include validation of the message structure. Using a mutation analysis in the context of SIP and RTSP, we show that Zebu sign...

  6. Correlation dimension based nonlinear analysis of network traffics with different application protocols

    Institute of Scientific and Technical Information of China (English)

    Wang Jun-Song; Yuan Jing; Li Qiang; Yuan Rui-Xi

    2011-01-01

    This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols-HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic,furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components.

  7. A Multi-Channel Diversity Based MAC Protocol for Power-Constrained Cognitive Ad Hoc Networks

    CERN Document Server

    Wang, Yichen; Du, Qinghe; Zhang, Chao

    2011-01-01

    One of the major challenges in the medium access control (MAC) protocol design over cognitive Ad Hoc networks (CAHNs) is how to efficiently utilize multiple opportunistic channels, which vary dynamically and are subject to limited power resources. To overcome this challenge, in this paper we first propose a novel diversity technology called \\emph{Multi-Channel Diversity} (MCD), allowing each secondary node to use multiple channels simultaneously with only one radio per node under the upperbounded power. Using the proposed MCD, we develop a MCD based MAC (MCD-MAC) protocol, which can efficiently utilize available channel resources through joint power-channel allocation. Particularly, we convert the joint power-channel allocation to the Multiple-Choice Knapsack Problem, such that we can obtain the optimal transmission strategy to maximize the network throughput through dynamic programming. Simulation results show that our proposed MCD-MAC protocol can significantly increase the network throughput as compared to...

  8. A Hop Count Based Heuristic Routing Protocol for Mobile Delay Tolerant Networks

    Science.gov (United States)

    Wei, Changjiang; Dai, Chenqu; Xu, Jixing; Hu, Lejuan

    2014-01-01

    Routing in delay tolerant networks (DTNs) is a challenge since it must handle network partitioning, long delays, and dynamic topology. Meanwhile, routing protocols of the traditional mobile ad hoc networks (MANETs) cannot work well due to the failure of its assumption that most network connections are available. In this paper, we propose a hop count based heuristic routing protocol by utilizing the information carried by the peripatetic packets in the network. A heuristic function is defined to help in making the routing decision. We formally define a custom operation for square matrices so as to transform the heuristic value calculation into matrix manipulation. Finally, the performance of our proposed algorithm is evaluated by the simulation results, which show the advantage of such self-adaptive routing protocol in the diverse circumstance of DTNs. PMID:25110736

  9. A Hop Count Based Heuristic Routing Protocol for Mobile Delay Tolerant Networks

    Directory of Open Access Journals (Sweden)

    Lei You

    2014-01-01

    Full Text Available Routing in delay tolerant networks (DTNs is a challenge since it must handle network partitioning, long delays, and dynamic topology. Meanwhile, routing protocols of the traditional mobile ad hoc networks (MANETs cannot work well due to the failure of its assumption that most network connections are available. In this paper, we propose a hop count based heuristic routing protocol by utilizing the information carried by the peripatetic packets in the network. A heuristic function is defined to help in making the routing decision. We formally define a custom operation for square matrices so as to transform the heuristic value calculation into matrix manipulation. Finally, the performance of our proposed algorithm is evaluated by the simulation results, which show the advantage of such self-adaptive routing protocol in the diverse circumstance of DTNs.

  10. A Simple Battery Aware Gossip Based Sleep Protocol for Densely Deployed Ad-hoc and Sensor Networks

    OpenAIRE

    Shukla, Ashish

    2010-01-01

    Conserving power in mobile ad-hoc and sensor networks is a big challenge. Most of the nodes in these networks, in general, are battery powered, therefore, an efficient power saving protocol is required to extend the lifetime of such networks. A lot of work has been done and several protocols have been proposed to address this problem. Gossip based protocols, which are based on the results of percolation theory, significantly reduce power consumption with very little implementation overhead. H...

  11. A Systematic Design Method for Large-Scale Wireless Ad Hoc Network Protocol Based on Optimization Decomposition Theory

    OpenAIRE

    Chaonong Xu; Chi Zhang; Yongjun Xu; Zhiguang Wang

    2015-01-01

    The idea of network protocol design based on optimization theory has been proposed and used practically in Internet for about 15 years. However, for large-scale wireless ad hoc network, although protocol could be viewed as a recursive solving of a global optimization problem, protocol design is still facing huge challenge because an effective distributed algorithm for solving global optimization problem is still lacking. We solve the problem by putting forward a systematic design method based...

  12. Design and Evaluation of a Novel HIP-Based Network Mobility Protocol

    Directory of Open Access Journals (Sweden)

    Szabolcs Nováczki

    2008-01-01

    Full Text Available The rapid growth of IP-based mobile telecommunication technologies in the past few years has revealed situations where not only a single node but an entire network moves and changes its point of attachment to the Internet. The main goal of any protocol supporting network mobility is to provide continuous, optimal and secure Internet access to all nodes and even recursively nested mobile subnetworks inside a moving network. For this purpose, the IETF (Internet Engineering Task Force has developed the NEtwork MObility Basic Support (NEMO BS protocol which extends the operation of Mobile IPv6 (MIPv6. In order to bypass the same problems suffered by MIPv6 and NEMO BS, a novel Host Identity Protocol (HIP extension called HIP-NEMO is introduced, proposed and evaluated in this paper. Our proposal is based on hierarchical topology of mobile RVSs (mRVS, signaling delegation and inter-mRVS communication to enable secure and efficient network mobility support in the HIP layer. The method provides secure connectivity and reachability for every node and nested subnet in the moving network and supports multihomed scenarios as well. Moreover, HIPNEMO reduces signaling and packet overhead during network mobility management by achieving route optimization inside any moving network even in nested scenarios. To evaluate the proposed scheme we present a simulation model implemented in OMNeT++ and discuss the results of our simulation based analysis to show the efficiency of the approach compared to the NEMO BS protocol formulated by the IETF.

  13. Intervention mapping protocol for developing a theory-based diabetes self-management education program.

    Science.gov (United States)

    Song, Misoon; Choi, Suyoung; Kim, Se-An; Seo, Kyoungsan; Lee, Soo Jin

    2015-01-01

    Development of behavior theory-based health promotion programs is encouraged with the paradigm shift from contents to behavior outcomes. This article describes the development process of the diabetes self-management program for older Koreans (DSME-OK) using intervention mapping (IM) protocol. The IM protocol includes needs assessment, defining goals and objectives, identifying theory and determinants, developing a matrix to form change objectives, selecting strategies and methods, structuring the program, and planning for evaluation and pilot testing. The DSME-OK adopted seven behavior objectives developed by the American Association of Diabetes Educators as behavioral outcomes. The program applied an information-motivation-behavioral skills model, and interventions were targeted to 3 determinants to change health behaviors. Specific methods were selected to achieve each objective guided by IM protocol. As the final step, program evaluation was planned including a pilot test. The DSME-OK was structured as the 3 determinants of the IMB model were intervened to achieve behavior objectives in each session. The program has 12 weekly 90-min sessions tailored for older adults. Using the IM protocol in developing a theory-based self-management program was beneficial in terms of providing a systematic guide to developing theory-based and behavior outcome-focused health education programs.

  14. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  15. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  16. Vital pulp therapy using calcium-enriched mixture: An evidence-based review

    Directory of Open Access Journals (Sweden)

    Saeed Asgary

    2013-01-01

    Full Text Available Worldwide, casecontrol studies have revealed that the treatment outcomes of root canal therapy (RCT are generally favorable; however, the overall epidemiological success rate of RCT in the general population is relatively low. On the other hand, vitality of dental pulp is a key factor in the long-term prognosis of permanent teeth; in recent years, vital pulp therapy (VPT has received significant consideration as it has been revealed that the inflamed pulp has the potential to heal. In this review article, the current best evidence with regard to VPT using calcium-enriched mixture (CEM cement in human permanent/primary teeth is discussed. A strategy based on a search using keywords for CEM cement as well as VPT was applied.

  17. A design pattern for event-based processing of security-enriched SOAP messages

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko; Lo Iacono, Luigi

    2010-01-01

    For Web Services in Cloud Computing contexts, the efficient processing of XML documents is a major topic of interest. Especially for WS-Security-enriched messages, processing performance nowadays tends to become a major issue. Streaming XML processing approaches lead to valuable optimization due...... to lower resource consumption, but their adoption requires major conceptional changes in the processing application. In this paper, we present a pattern for architectural concepts that employ the SAX-based streaming processing approach. Its major benefit - apart from providing the performance advantage...... - consists in a convenient, modular architecture that can easily be extended with new modules and new types of events without modification of existing modules. © 2010 IEEE....

  18. Coexistence of WiFi and WiMAX Systems Based on PS-Request Protocols

    Directory of Open Access Journals (Sweden)

    Ho Young Hwang

    2011-10-01

    Full Text Available We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt bit within the Frame Control field of the frames transmitted by a WiFi AP. The performance of the revised PS-Request protocol is evaluated by computer simulation, and compared to those of the cases without a coexistence protocol and to the original PS-Request protocol.

  19. Implementation of Symptom Protocols for Nurses Providing Telephone‐Based Cancer Symptom Management: A Comparative Case Study

    Science.gov (United States)

    Green, Esther; Ballantyne, Barbara; Tarasuk, Joy; Skrutkowski, Myriam; Carley, Meg; Chapman, Kim; Kuziemsky, Craig; Kolari, Erin; Sabo, Brenda; Saucier, Andréanne; Shaw, Tara; Tardif, Lucie; Truant, Tracy; Cummings, Greta G.; Howell, Doris

    2016-01-01

    ABSTRACT Background The pan‐Canadian Oncology Symptom Triage and Remote Support (COSTaRS) team developed 13 evidence‐informed protocols for symptom management. Aim To build an effective and sustainable approach for implementing the COSTaRS protocols for nurses providing telephone‐based symptom support to cancer patients. Methods A comparative case study was guided by the Knowledge to Action Framework. Three cases were created for three Canadian oncology programs that have nurses providing telephone support. Teams of researchers and knowledge users: (a) assessed barriers and facilitators influencing protocol use, (b) adapted protocols for local use, (c) intervened to address barriers, (d) monitored use, and (e) assessed barriers and facilitators influencing sustained use. Analysis was within and across cases. Results At baseline, >85% nurses rated protocols positively but barriers were identified (64‐80% needed training). Patients and families identified similar barriers and thought protocols would enhance consistency among nurses teaching self‐management. Twenty‐two COSTaRS workshops reached 85% to 97% of targeted nurses (N = 119). Nurses felt more confident with symptom management and using the COSTaRS protocols (p < .01). Protocol adaptations addressed barriers (e.g., health records approval, creating pocket versions, distributing with telephone messages). Chart audits revealed that protocols used were documented for 11% to 47% of patient calls. Sustained use requires organizational alignment and ongoing leadership support. Linking Evidence to Action Protocol uptake was similar to trials that have evaluated tailored interventions to improve professional practice by overcoming identified barriers. Collaborating with knowledge users facilitated interpretation of findings, aided protocol adaptation, and supported implementation. Protocol implementation in nursing requires a tailored approach. A multifaceted intervention approach increased nurses’ use

  20. SNP-based pathway enrichment analysis for genome-wide association studies

    Directory of Open Access Journals (Sweden)

    Potkin Steven G

    2011-04-01

    Full Text Available Abstract Background Recently we have witnessed a surge of interest in using genome-wide association studies (GWAS to discover the genetic basis of complex diseases. Many genetic variations, mostly in the form of single nucleotide polymorphisms (SNPs, have been identified in a wide spectrum of diseases, including diabetes, cancer, and psychiatric diseases. A common theme arising from these studies is that the genetic variations discovered by GWAS can only explain a small fraction of the genetic risks associated with the complex diseases. New strategies and statistical approaches are needed to address this lack of explanation. One such approach is the pathway analysis, which considers the genetic variations underlying a biological pathway, rather than separately as in the traditional GWAS studies. A critical challenge in the pathway analysis is how to combine evidences of association over multiple SNPs within a gene and multiple genes within a pathway. Most current methods choose the most significant SNP from each gene as a representative, ignoring the joint action of multiple SNPs within a gene. This approach leads to preferential identification of genes with a greater number of SNPs. Results We describe a SNP-based pathway enrichment method for GWAS studies. The method consists of the following two main steps: 1 for a given pathway, using an adaptive truncated product statistic to identify all representative (potentially more than one SNPs of each gene, calculating the average number of representative SNPs for the genes, then re-selecting the representative SNPs of genes in the pathway based on this number; and 2 ranking all selected SNPs by the significance of their statistical association with a trait of interest, and testing if the set of SNPs from a particular pathway is significantly enriched with high ranks using a weighted Kolmogorov-Smirnov test. We applied our method to two large genetically distinct GWAS data sets of schizophrenia, one

  1. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    . Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware

  2. A Rule-Based Data Transfer Protocol for On-Demand Data Exchange in Vehicular Environment

    Directory of Open Access Journals (Sweden)

    Liao Hsien-Chou

    2009-01-01

    Full Text Available The purpose of Intelligent Transport System (ITS is mainly to increase the driving safety and efficiency. Data exchange is an important way to achieve the purpose. An on-demand data exchange is especially useful to assist a driver avoiding some emergent events. In order to handle the data exchange under dynamic situations, a rule-based data transfer protocol is proposed in this paper. A set of rules is designed according to the principle of request-forward-reply (RFR. That is, they are used to determine the timing of data broadcasting, forwarding, and replying automatically. Two typical situations are used to demonstrate the operation of rules. One is the front view of a driver occluded by other vehicles. The other is the traffic jam. The proposed protocol is flexible and extensible for unforeseen situations. Three simulation tools were also implemented to demonstrate the feasibility of the protocol and measure the network transmission under high density of vehicles. The simulation results show that the rule-based protocol is efficient on data exchange to increase the driving safety.

  3. TBEE: Tier Based Energy Efficient Protocol Providing Sink and Source Mobility in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Siddhartha Chauhan

    2011-11-01

    Full Text Available In resource constrained wireless sensor networks (WSNs it is important to utilize energy efficiently. Data dissemination is mainly responsible for the consumption of energy in sensor nodes (SNs. The data dissemination protocols for WSNs should reduce the energy consumption of the SNs. Sink and source mobility is the major challenge for data dissemination protocols. In this paper, a Tier based Energy Efficient protocol (TBEE providing sink and source mobility in WSNs has been proposed. TBEE protocol has been designed so that fewer SNs located nearer to the dissemination point (DP respond to the sinks message for grid formation thereby reducing message overheads. TBEE exploits an improved approach of communication amongst the SNs so that the collisions are reduced. TBEE efficiently handles the movement of the sinks and sources in the network and reduces the overheads associated with their mobility. TBEEs performance was evaluated in different conditions and scenarios. Simulation results show substantial improvement by TBEE as compared with the other existing grid based approaches for most of the scenarios.

  4. An Update based Energy-Efficient Reactive Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dhirendra Kumar Sharma

    2013-09-01

    Full Text Available Low cost energy-efficient (power based routing protocols of mobile ad hoc networks (MANETs increase the lifetime of static networks by using received signal strength (RSS and battery power status (PS. They require GPS service to find the exact location of mobile nodes. The GPS devices themselves consume power because they need excessive updates to find the stationary nodes for efficient routing. To overcome this, RSS is being used as a metric, followed by, residual battery power. The recent protocols, based on these concepts, provide energy efficient routes during the route discovery phase only. Topological changes make these routes weak in due course of time. To update routes, HELLO process can be used, which however creates unnecessary overhead, delay and consumes power. Hence, these protocols do not update the routes. We propose an energy-efficient reactive routing protocol that uses the RSS and PS of mobile nodes. Proposed Link Failure Prediction (LFP algorithm uses the link-layer feedback system to update active routes. We use ns2 for simulation of the proposed algorithm. Comparing the results of proposed scheme and existing scheme, in terms of energy consumption, link failure probability, and retransmission of packets, we observe that the proposed scheme outperforms the existing one.

  5. A quality of service routing protocol based on mobility prediction in mobile ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    王建新; 邓曙光; 陈松乔; 陈建二

    2003-01-01

    A QoS routing protocol based on mobility prediction is proposed. The protocol selects the steadiest path based on mobility prediction and QoS requirements on bandwidth, delay, and so forth. The main properties of the protocol as follows. (1) Each node just broadcasts its own information, so the packet is very small and can get to the destination in a very short time. (2)When another path is built for the same QoS requirements, the original path has higher priority.(3) The update messages are reduced by using mobility prediction. (4) Data packets carry the information of link change using piggyback, which is helpful for forecasting the link status more accurately. (5) When source node gets Resource-Reserve and reconnect packets at the same time, it selects reconnect packet over Resource-Reserve packet. The results of simulation show that the protocol has good network performance with low control overload, and efficiently supports transmitting multimedia with QoS requirements in mobile ad hoc networks.

  6. A slotted floor acquisition multiple access based MAC protocol for underwater acoustic networks with RTS competition

    Institute of Scientific and Technical Information of China (English)

    Liang-fang QIAN; Sen-lin ZHANG; Mei-qin LIU

    2015-01-01

    Long propagation delay, limited bandwidth, and high bit error rate pose great challenges in media access control (MAC) protocol design for underwater acoustic networks. A MAC protocol called slotted fl oor acquisition multiple access (slotted-FAMA) suitable for underwater acoustic networks is proposed and analyzed. This FAMA based protocol adds a time slot mechanism to avoid DATA packet collisions. However, slotted-FAMA is not suitable for dense networks since the multiple request-to-send (RTS) attempts problem in dense networks is serious and greatly limits the network throughput. To overcome this drawback, this paper proposes a slotted-FAMA based MAC protocol for underwater acoustic networks, called RC-SFAMA. RC-SFAMA introduces an RTS competition mechanism to keep the network from high frequency of backoff caused by the multiple RTS attempts problem. Via the RTS competition mechanism, useful data transmission can be completed successfully when the situation of multiple RTS attempts occurs. Simulation results show that RC-SFAMA increases the network throughput efficiency as compared with slotted-FAMA, and minimizes the energy consumption.

  7. Electronic and optoelectronic devices based on chirality-enriched wafer-scale single-wall carbon nanotube thin films

    Science.gov (United States)

    Gao, Weilu; He, Xiaowei; Xie, Lijuan; Zhang, Qi; Haroz, Erik; Doorn, Stephen K.; Kono, Junichiro

    2015-03-01

    The unique and rich material properties of single-wall carbon nanotubes (SWCNTs) make them attractive for nano-electronic and optoelectronic applications. Slight changes in tube diameter and wrapping angle, defined by the chirality indices (n, m), can dramatically modify the bandstructure, which can be utilized for designing devices with tailored properties. However, it remains to be a challenge to fabricate macroscopic, single-chirality devices. Here, we introduce a simple way of producing chirality-enriched wafer-scale SWCNT films by combining recently developed solution-based polymer-modified sorting method and vacuum filtration. The produced thin films can be easily transferred onto any substrate to have a CMOS compatible wafer. We fabricated a transistor of (6,5)-enriched SWCNTs with an on/off ratio >103. Large-scale photothermoelectric-effect-based and photovoltaic-effect-based photodetectors made of (6,6)- and (6,5)-enriched films, respectively, will also be discussed.

  8. Cryptanalysis of Wang et al.’s lattice-based key exchange protocol

    Directory of Open Access Journals (Sweden)

    Daya Sagar Gupta

    2016-09-01

    Full Text Available Wang et al. proposed a new hard problem on lattices which is an extension of the small integer solution (SIS on lattices. This new generated hard problem is named to be bilateral in-homogeneous small integer solution (Bi-ISIS. Using the hardness of Bi-ISIS, Wang et al. proposed a new key exchange protocol, which is based on the lattice-based cryptography. In this paper, we signalize that Wang et al.’s lattice-based key exchange protocol is vulnerable to an attack, namely, man-in-the-middle (MITM attack. Through this attack, Eavesdropper can intercept the authenticated messages and communicate the unauthentic messages among the communicating parties.

  9. Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism

    Directory of Open Access Journals (Sweden)

    Qin Qin

    2015-01-01

    Full Text Available In order to improve the Internet coverage ratio and provide connectivity guarantee, based on sensor opportunistic coverage mechanism and cooperative cloud service, we proposed the coverage connectivity guarantee protocol for mobile Internet. In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. Then, the cloud service business support platform is created based on the Internet application service management capabilities and wireless sensor network communication service capabilities, which is the architecture of the cloud support layer. The cooperative cloud service aware model was proposed. Finally, we proposed the mobile Internet coverage connectivity guarantee protocol. The results of experiments demonstrate that the proposed algorithm has excellent performance, in terms of the security of the Internet and the stability, as well as coverage connectivity ability.

  10. GBP-WAHSN: A Group-Based Protocol for Large Wireless Ad Hoc and Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Jaime Lloret; Miguel Garcia; Jesus Tomás; Fernando Boronat

    2008-01-01

    Grouping nodes gives better performance to the whole network by diminishing the average network delay and avoiding unnecessary message for warding and additional overhead. Many routing protocols for ad-hoc and sensor network shave been designed but none of them are based on groups. In this paper, we will start defining group-based topologies,and then we will show how some wireless ad hoc sensor networks (WAHSN) routing protocols perform when the nodes are arranged in groups. In our proposal connections between groups are established as a function of the proximity of the nodes and the neighbor's available capacity (based on the node's energy). We describe the architecture proposal, the messages that are needed for the proper operation and its mathematical description. We have also simulated how much time is needed to propagate information between groups. Finally, we will show a comparison with other architectures.

  11. Machine learning approaches to supporting the identification of photoreceptor-enriched genes based on expression data

    Directory of Open Access Journals (Sweden)

    Simpson David

    2006-03-01

    Full Text Available Abstract Background Retinal photoreceptors are highly specialised cells, which detect light and are central to mammalian vision. Many retinal diseases occur as a result of inherited dysfunction of the rod and cone photoreceptor cells. Development and maintenance of photoreceptors requires appropriate regulation of the many genes specifically or highly expressed in these cells. Over the last decades, different experimental approaches have been developed to identify photoreceptor enriched genes. Recent progress in RNA analysis technology has generated large amounts of gene expression data relevant to retinal development. This paper assesses a machine learning methodology for supporting the identification of photoreceptor enriched genes based on expression data. Results Based on the analysis of publicly-available gene expression data from the developing mouse retina generated by serial analysis of gene expression (SAGE, this paper presents a predictive methodology comprising several in silico models for detecting key complex features and relationships encoded in the data, which may be useful to distinguish genes in terms of their functional roles. In order to understand temporal patterns of photoreceptor gene expression during retinal development, a two-way cluster analysis was firstly performed. By clustering SAGE libraries, a hierarchical tree reflecting relationships between developmental stages was obtained. By clustering SAGE tags, a more comprehensive expression profile for photoreceptor cells was revealed. To demonstrate the usefulness of machine learning-based models in predicting functional associations from the SAGE data, three supervised classification models were compared. The results indicated that a relatively simple instance-based model (KStar model performed significantly better than relatively more complex algorithms, e.g. neural networks. To deal with the problem of functional class imbalance occurring in the dataset, two data re

  12. BIM-based Modeling and Data Enrichment of Classical Architectural Buildings

    Directory of Open Access Journals (Sweden)

    Fabrizio Ivan Apollonio

    2012-12-01

    Full Text Available EnIn this paper we presented a BIM-based approach for the documentation of Architectural Heritage. Knowledge of classical architecture is first extracted from the treatises for parametric modeling in object level. Then we established a profile library based on semantic studies to sweep out different objects. Variants grow out from the parametric models by editing or regrouping parameters based on grammars. Multiple data including material, structure and real-life state are enriched with respect to different research motivations. The BIM models are expected to ease the modeling process and provide comprehensive data shared among different platforms for further simulations.ItIn questo articolo è presentata una procedura definita nell'ambito dei sistemi BIM con l'obiettivo di documentare il Patrimonio Architettonico. I dati conoscitivi relativi all'architettura classica sono, in una prima fase, ottenuti dai trattati al fine di modellare in maniera parametrica a livello di oggetti. Successivamente è stata definita una libreria di profili, basata su principi semantici, dalla quale è possibile ottenere oggetti differenti. Dati di natura differente, relativi ad esempio ai materiali, alle strutture, allo stato di fatto, sono implementati in funzione delle differenti esigenze. I modelli BIM hanno la potenzialità di facilitare le procedure di modellazione e di fornire informazioni e dati completi che possono essere condivisi tra piattaforme differenti per ulteriori simulazioni ed analisi.

  13. A fast and scalable content transfer protocol (FSCTP) for VANET based architecture

    Science.gov (United States)

    Santamaria, A. F.; Scala, F.; Sottile, C.; Tropea, M.; Raimondo, P.

    2016-05-01

    In the modern Vehicular Ad-hoc Networks (VANET) based systems even more applications require lot of data to be exchanged among vehicles and infrastructure entities. Due to mobility issues and unplanned events that may occurs it is important that contents should be transferred as fast as possible by taking into account consistence of the exchanged data and reliability of the connections. In order to face with these issues, in this work we propose a new transfer data protocol called Fast and Scalable Content Transfer Protocol (FSCTP). This protocol allows a data transfer by using a bidirectional channel among content suppliers and receivers exploiting several cooperative sessions. Each session will be based on User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) to start and manage data transfer. Often in urban area the VANET scenario is composed of several vehicle and infrastructures points. The main idea is to exploit ad-hoc connections between vehicles to reach content suppliers. Moreover, in order to obtain a faster data transfer, more than one session is exploited to achieve a higher transfer rate. Of course it is important to manage data transfer between suppliers to avoid redundancy and resource wastages. The main goal is to instantiate a cooperative multi-session layer efficiently managed in a VANET environment exploiting the wide coverage area and avoiding common issues known in this kind of scenario. High mobility and unstable connections between nodes are some of the most common issues to address, thus a cooperative work between network, transport and application layers needs to be designed.

  14. Gene-based analysis of regionally enriched cortical genes in GWAS data sets of cognitive traits and psychiatric disorders.

    Directory of Open Access Journals (Sweden)

    Kari M Ersland

    Full Text Available BACKGROUND: Despite its estimated high heritability, the genetic architecture leading to differences in cognitive performance remains poorly understood. Different cortical regions play important roles in normal cognitive functioning and impairment. Recently, we reported on sets of regionally enriched genes in three different cortical areas (frontomedial, temporal and occipital cortices of the adult rat brain. It has been suggested that genes preferentially, or specifically, expressed in one region or organ reflect functional specialisation. Employing a gene-based approach to the analysis, we used the regionally enriched cortical genes to mine a genome-wide association study (GWAS of the Norwegian Cognitive NeuroGenetics (NCNG sample of healthy adults for association to nine psychometric tests measures. In addition, we explored GWAS data sets for the serious psychiatric disorders schizophrenia (SCZ (n = 3 samples and bipolar affective disorder (BP (n = 3 samples, to which cognitive impairment is linked. PRINCIPAL FINDINGS: At the single gene level, the temporal cortex enriched gene RAR-related orphan receptor B (RORB showed the strongest overall association, namely to a test of verbal intelligence (Vocabulary, P = 7.7E-04. We also applied gene set enrichment analysis (GSEA to test the candidate genes, as gene sets, for enrichment of association signal in the NCNG GWAS and in GWASs of BP and of SCZ. We found that genes differentially expressed in the temporal cortex showed a significant enrichment of association signal in a test measure of non-verbal intelligence (Reasoning in the NCNG sample. CONCLUSION: Our gene-based approach suggests that RORB could be involved in verbal intelligence differences, while the genes enriched in the temporal cortex might be important to intellectual functions as measured by a test of reasoning in the healthy population. These findings warrant further replication in independent samples on cognitive traits.

  15. A Handoff-based And Limited Flooding (HALF Routing Protocol in Delay Tolerant Network (DTN

    Directory of Open Access Journals (Sweden)

    Anika Aziz

    2012-05-01

    Full Text Available In a Delay Tolerant Network (DTN, routing protocols are developed to manage the disconnected mobilenodes. We propose a routing protocol named HALF (Handoff-based And Limited Flooding in DTN thatcan work in both infra-structured and infra-structure less networking environment and hence it canimprove the performance of the network significantly. In this paper, it is shown that HALF givessatisfactory delivery ratio and latency under almost all conditions and different network scenarios whencompared to the other existing DTN routing protocols. As the traffic intensity of the network grows fromlow (.2 to high (.75 values, HALF shows about 5% decrease in the delivery ratio compare to muchlarger values showed by the other routing protocols and on the average takes same time to deliver all themessages to their destinations. As the radio range is increased over the range from 10m Bluetooth rangeto 250m WLAN range, due to the increased connectivity, the delivery ratio and the latency are increasedby 4 times and decreased by 5 times respectively.

  16. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV. PMID:27258013

  17. RLT Code Based Handshake-Free Reliable MAC Protocol for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiujuan Du

    2016-01-01

    Full Text Available The characteristics of underwater acoustic channels such as long propagation delay and low bit rate cause the medium access control (MAC protocols designed for radio channels to either be inapplicable or have low efficiency for underwater sensor networks (UWSNs. Meanwhile, due to high bit error, conventional end-to-end reliable transfer solutions bring about too many retransmissions and are inefficient in UWSN. In this paper, we present a recursive LT (RLT code. With small degree distribution and recursive encoding, RLT achieves reliable transmission hop-by-hop while reducing the complexity of encoding and decoding in UWSN. We further propose an RLT code based handshake-free (RCHF reliable MAC protocol. In RCHF protocol, each node maintains a neighbor table including the field of state, and packages are forwarded according to the state of a receiver, which can avoid collisions of sending-receiving and overhearing. The transmission-avoidance time in RCHF decreases data-ACK collision dramatically. Without RTS/CTS handshaking, the RCHF protocol improves channel utilization while achieving reliable transmission. Simulation results show that, compared with the existing reliable data transport approaches for underwater networks, RCHF can improve network throughput while decreasing end-to-end overhead.

  18. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  19. A Wireless Video Transmission Scheme Based on MAC-independent Opportunistic Routing &Encoding Protocol

    Directory of Open Access Journals (Sweden)

    Yong Liu

    2010-11-01

    Full Text Available It is a tremendous challenge to transmit real-time video streams over wireless sensor network because of the poor wireless communication conditions and the high requirements of video transmission. The opportunistic routing protocol can take advantage of the broadcast nature of wireless communication and can improve transfer throughput significantly. But the bigger size of transmission unit also increases the end-to-end delay at the same time. In order to overcome this problem and improve the real-time video transmission quality in wireless video sensor network, we propose a source adaptive frame discard algorithm for MAC-independent Opportunistic Routing & Encoding (MORE Protocol in this paper. In our approach, the historical transmission delay is recorded to estimate current network transmission rate. Based on the video deadline, frames predicted to be delayed are discarded adaptively in the source node to get better overall video quality. In some practice application scenarios, there are usually need to deliver multiple video streams over multi-hop wireless network. It can’t work effectively with the originally MORE protocol in such scenarios. Furthermore, we modify the MORE protocol and design an adaptive scheme to support multiple video streams over multi-hop wireless video sensor network in this paper. The simulation results show that our algorithm can reduce frame loss rate and improve video quality significantly.

  20. DRMR:Dynamic-Ring-Based Multicast Routing Protocol for Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    Yuan Zhoux; Guang-Sheng Li; Yong-Zhao Zhan; Qi-Rong Mao; Yi-Bin Hou

    2004-01-01

    Recently a number of multicast routing protocols for ad hoc networks have been proposed, however, most of them do not provide proper tradeoffs between effectiveness, efficiency and scalability. In this paper, a novel multicast routing protocol is presented for ad hoc networks. The protocol, termed as dynamic-ring-based multicast routing protocol (DRMR), uses the concept of dynamic ring whose radius can be adjusted dynamically and DRMR configures this type of ring for all group member nodes. According to the principle of zone routing, two nodes whose rings overlap can create route to each other, thus, when the ring graph composed of all rings is connected, each member node has one or more routes to others. DRMR uses the method of expanding ring search (ERS) to maintain the connected ring graph, and also can decrease the radius of the ring to reduce the overhead. The performances of DRMR were simulated and evaluated with NS2, and results show that DRMR has a high data packet delivery ratio, low control overhead and good scalability.

  1. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Directory of Open Access Journals (Sweden)

    Abdulaziz Al-Nahari

    Full Text Available Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV, which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  2. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  3. Gossip-Based Topology Management Protocol for Self-Organizing Overlays

    Institute of Scientific and Technical Information of China (English)

    Chen Nao; Hu Ruimin; Zhu Yongqiong

    2011-01-01

    Gossip-based protocols have attracted more and more attention because of their simplicity and reliability.They can be applied to large-scale overlays for solving problems such as topology management,information dissemination,and aggregation.However,previous works sample nodes by their indegrees,without considering the differences in capability among nodes,and result in losing global load balancing.This paper proposes a load balancing gossip protocol for self-organizing overlays-LBTMP (Load-Balancing Topology Management Protocol),which takes into account the differences in capability among nodes and real loads.The novel protocol takes remainder service ability as the determinant for node selection metric,making light loading nodes from local neighbor view as returned samples preferentially.In the meantime,LBTMP selects light loading nodes preferentially for topology information exchange,which can diffuse light loading nodes over the whole overlay more quickly.Simulations show that returned sample node selection is biased to light loading nodes in a global view,and the overlay tends to load balancing.

  4. IJS: An Intelligent Junction Selection Based Routing Protocol for VANET to Support ITS Services.

    Science.gov (United States)

    Bhoi, Sourav Kumar; Khilar, Pabitra Mohan

    2014-01-01

    Selecting junctions intelligently for data transmission provides better intelligent transportation system (ITS) services. The main problem in vehicular communication is high disturbances of link connectivity due to mobility and less density of vehicles. If link conditions are predicted earlier, then there is a less chance of performance degradation. In this paper, an intelligent junction selection based routing protocol (IJS) is proposed to transmit the data in a quickest path, in which the vehicles are mostly connected and have less link connectivity problem. In this protocol, a helping vehicle is set at every junction to control the communication by predicting link failures or network gaps in a route. Helping vehicle at the junction produces a score for every neighboring junction to forward the data to the destination by considering the current traffic information and selects that junction which has minimum score. IJS protocol is implemented and compared with GyTAR, A-STAR, and GSR routing protocols. Simulation results show that IJS performs better in terms of average end-to-end delay, network gap encounter, and number of hops.

  5. An Improved Energy-Efficient BBO-Based PEGASIS Protocol in Wireless Sensors Network

    Directory of Open Access Journals (Sweden)

    Bipandeep Singh

    2014-03-01

    Full Text Available The energy efficiency in the WSN is one of the very important Performance Indicator. Sensor network is a distributed event-based system that differs from traditional communication network. Sensor webs consisting of nodes with limited battery power and wireless communications are deployed to collect useful information from the field. PEGASIS (Power-Efficient Gathering in Sensor Information System is chain based protocol which is used to construct chain of sensor nodes. In the proposed work BBO is implemented along with PEGASIS to get the shortest chain for every round. Moreover to construct chain, energy of each sensor has been taken into account to bring a balance of energy consumption between nodes. Compared with PEGASIS, this PEG-BBO gives better results. Simulation results show that proposed protocol significantly prolongs the network lifetime.

  6. Spatial Correlation-Based MAC Protocol for Event-Driven Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Guoqiang Zheng

    2011-01-01

    Full Text Available Wireless sensor networks is highly spatial correlated. Recently it has been proposed to select a subset of sensors nodes to transmit their data so as to prevent transmission of redundant data. In this paper, we investigate the ways of selecting sensor nodes and develop a novel spatial correlation-based Medium Access Control (MAC protocol for event-driven wireless sensor networks, referred as SCMAC. Based on a theoretical framework, SCMAC adopts priority node selection algorithm and collision avoidance mechanism so that transmission of redundant data is prevented when contending for the shared channel, while SCMAC prioritizes the transmission of route-thru packets. Simulation results show that our protocol achieves higher performance than CC-MAC in the aspect of energy consumption, transmission latency, packet delivery rate, packet drop rate and reconstruction distortion.

  7. A local energy consumption prediction-based clustering protocol for wireless sensor networks.

    Science.gov (United States)

    Yu, Jiguo; Feng, Li; Jia, Lili; Gu, Xin; Yu, Dongxiao

    2014-12-03

    Clustering is a fundamental and effective technique for utilizing sensor nodes' energy and extending the network lifetime for wireless sensor networks. In this paper, we propose a novel clustering protocol, LECP-CP (local energy consumption prediction-based clustering protocol), the core of which includes a novel cluster head election algorithm and an inter-cluster communication routing tree construction algorithm, both based on the predicted local energy consumption ratio of nodes. We also provide a more accurate and realistic cluster radius to minimize the energy consumption of the entire network. The global energy consumption can be optimized by the optimization of the local energy consumption, and the energy consumption among nodes can be balanced well. Simulation results validate our theoretical analysis and show that LECP-CP has high efficiency of energy utilization, good scalability and significant improvement in the network lifetime.

  8. Industrial WSN Based on IR-UWB and a Low-Latency MAC Protocol

    Science.gov (United States)

    Reinhold, Rafael; Underberg, Lisa; Wulf, Armin; Kays, Ruediger

    2016-07-01

    Wireless sensor networks for industrial communication require high reliability and low latency. As current wireless sensor networks do not entirely meet these requirements, novel system approaches need to be developed. Since ultra wideband communication systems seem to be a promising approach, this paper evaluates the performance of the IEEE 802.15.4 impulse-radio ultra-wideband physical layer and the IEEE 802.15.4 Low Latency Deterministic Network (LLDN) MAC for industrial applications. Novel approaches and system adaptions are proposed to meet the application requirements. In this regard, a synchronization approach based on circular average magnitude difference functions (CAMDF) and on a clean template (CT) is presented for the correlation receiver. An adapted MAC protocol titled aggregated low latency (ALL) MAC is proposed to significantly reduce the resulting latency. Based on the system proposals, a hardware prototype has been developed, which proves the feasibility of the system and visualizes the real-time performance of the MAC protocol.

  9. Coefficient of Restitution based Cross Layer Interference Aware Routing Protocol in Wireless Mesh Networks

    OpenAIRE

    V, Sarasvathi; Saha, Snehanshu; N.Ch.S.N.Iyengar; Koti, Mahalaxmi

    2015-01-01

    In Multi-Radio Multi-Channel (MRMC) Wireless Mesh Networks (WMN), Partially Overlapped Channels (POC) has been used to increase the parallel transmission. But adjacent channel interference is very severe in MRMC environment; it decreases the network throughput very badly. In this paper, we propose a Coefficient of Restitution based Cross layer Interference aware Routing protocol (CoRCiaR) to improve TCP performance in Wireless Mesh Networks. This approach comprises of two-steps: Initially, th...

  10. Dental care protocol based on visual supports for children with autism spectrum disorders

    OpenAIRE

    2015-01-01

    Background Subjects with Autism Spectrum Disorders (ASDs) have often difficulties to accept dental treatments. The aim of this study is to propose a dental care protocol based on visual supports to facilitate children with ASDs to undergo to oral examination and treatments. Material and Methods 83 children (age range 6-12 years) with a signed consent form were enrolled; intellectual level, verbal fluency and cooperation grade were evaluated. Children were introduced into a four stages path in...

  11. The Predigest Project of TCP/IP Protocol Communication System Based on DSP Technology and Ethernet

    Science.gov (United States)

    hong-you, Wang; san-ping, Zhao

    The paper introduce a predigest project of TCP/IP based on DSP CMOS chip TMS320F2407 and Ethernet interface. The system design the Network Interface Controller using TMS320F2407and TRL8019AS,it simplify TCP/IP, achieve simple protocol stack in DSP, and achieve Data transmission by software program. The experiment indicated that, the communication system constructed by TMS320F2407andTRL8019AS is low cast, simple and reliable.

  12. Chemical Bum from Vinegar Following an Internet-based Protocol for Self-removal of Nevi

    OpenAIRE

    2015-01-01

    “Natural home remedies” for nevi removal found on the Internet can be ineffective, or worse, dangerous. Children and teens, in particular, may be more likely to attempt self-treatment in order to avoid discussing their concerns with their parents. Here, the authors report a case of an adolescent who presented with a chemical burn after following an Internet-based protocol for nevi removal using apple cider vinegar.

  13. Chemical Burn from Vinegar Following an Internet-based Protocol for Self-removal of Nevi.

    Science.gov (United States)

    Feldstein, Stephanie; Afshar, Maryam; Krakowski, Andrew C

    2015-06-01

    "Natural home remedies" for nevi removal found on the Internet can be ineffective, or worse, dangerous. Children and teens, in particular, may be more likely to attempt self-treatment in order to avoid discussing their concerns with their parents. Here, the authors report a case of an adolescent who presented with a chemical burn after following an Internet-based protocol for nevi removal using apple cider vinegar.

  14. Chemical Bum from Vinegar Following an Internet-based Protocol for Self-removal of Nevi

    Science.gov (United States)

    Feldstein, Stephanie; Afshar, Maryam

    2015-01-01

    “Natural home remedies” for nevi removal found on the Internet can be ineffective, or worse, dangerous. Children and teens, in particular, may be more likely to attempt self-treatment in order to avoid discussing their concerns with their parents. Here, the authors report a case of an adolescent who presented with a chemical burn after following an Internet-based protocol for nevi removal using apple cider vinegar. PMID:26155328

  15. Region Based Energy Balanced Inter-cluster communication Protocol for Sensor networks

    OpenAIRE

    Sharma, Rohini; Loboyal, D. K.

    2015-01-01

    Wireless sensor networks faces unbalanced energy consumption problem over time. Clustering provides an energy efficient method to improve lifespan of the sensor network. Cluster head collects data from other nodes and transmits it towards the sink node. Cluster heads which are far-off from the sink, consumes more power in transmission of information towards the sink. We propose Region Based Energy Balanced Inter-cluster communication protocol (RBEBP) to improve lifespan of the sensor network....

  16. Use of clomiphene-based stimulation protocol in oocyte donors: A comparative study

    Directory of Open Access Journals (Sweden)

    Aparna Singh

    2016-01-01

    Full Text Available INTRODUCTION: This study was undertaken to compare between clomiphene citrate (CC and gonadotropin-releasing hormone antagonist-based protocols in donor-recipient cycles in terms of parameters of ovarian stimulation and obstetric outcome. MATERIALS AND METHODS: Two hundred and three fertile oocyte donors were stimulated using two different protocols: Clomiphene based (n = 103 and antagonist based (n = 100. Donors in the one group were stimulated from day 1 or 2 of spontaneous or withdrawal bleeds with CC (50 mg/day and recombinant follicle-stimulating hormone (FSH till the day of trigger while donors in the other group were stimulated using recombinant FSH from day 1 or 2, and the antagonist was added as per flexible antagonist protocol. When >3 follicles were >17 mm in diameter, trigger was given with 2 mg leuprolide intramuscular. Transvaginal oocyte retrieval was done after 34 h of trigger. RESULTS: There was no significant difference in between the two groups in terms of age, antral follicle count, starting dose of gonadotropins, total dose required, duration of stimulation, number of follicles retrieved, mature follicles, and fertilization rate. The serum estradiol levels were significantly raised in the clomiphene group (P < 0.001. Pregnancy rate was similar in both the groups. The clinical pregnancy rate was 65.94% in the clomiphene group and 57.46% in the antagonist group. The live birth rate per cycle started was 47.8% in the clomiphene group and 39.55% in the antagonist group. There was one case of ectopic pregnancy in the antagonist group. CONCLUSION: Controlled ovarian stimulation using clomiphene and gonadotropin is a viable option for donor oocyte cycles. The cost and number of injections used per cycle can be reduced by using the clomiphene-based protocols.

  17. Coexistence of WiFi and WiMAX Systems Based on PS-Request Protocols

    OpenAIRE

    Ho Young Hwang; Young-uk Chung; Yong-Hoon Choi; Jongwoo Kim; Suwon Park; Seung Hyong Rhee

    2011-01-01

    We introduce both the coexistence zone within the WiMAX frame structure and a PS-Request protocol for the coexistence of WiFi and WiMAX systems sharing a frequency band. Because we know that the PS-Request protocol has drawbacks, we propose a revised PS-Request protocol to improve the performance. Two PS-Request protocols are based on the time division operation (TDO) of WiFi system and WiMAX system to avoid the mutual interference, and use the vestigial power management (PwrMgt) bit within t...

  18. 一种基于PKI的密钥%An Internet Key Exchange Protocol Based on Public Key Infrastructure

    Institute of Scientific and Technical Information of China (English)

    朱建明; 马建峰

    2004-01-01

    Internet key exchange (IKE) is an automated key exchange mechanism that is used to facilitate the transfer of IPSec security associations (SAs).Public key infrastructure (PKI) is considered as a key element for providing security to new distributed communication networks and services.In this paper, we concentrate on the properties of the protocol of Phase 1 IKE.After investigating IKE protocol and PKI technology, we combine IKE protocol and PKI and present an implementation scheme of the IKE based on PKI.Then, we give a logic analysis of the proposed protocol with the BAN-logic and discuss the security of the protocol.The result indicates that the protocol is correct and satisfies the security requirements of Internet key exchange.

  19. Self-adaptive trust based ABR protocol for MANETs using Q-learning.

    Science.gov (United States)

    Kumar, Anitha Vijaya; Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation.

  20. Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning

    Directory of Open Access Journals (Sweden)

    Anitha Vijaya Kumar

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation.

  1. Mechanisms for a reliable timer-based protocol. [Packet-switched network

    Energy Technology Data Exchange (ETDEWEB)

    Fletcher, J.G.; Watson, R.W.

    1977-12-08

    Timer-based protocol mechanisms are developed for reliable and efficient transmission of both single-message and message-stream traffic; that is, correct data delivery is assured in the face of lost, damaged, duplicate, and out-of-sequence packets. The protocol mechanisms seem particularly useful in a high-speed local network environment. Current reliable protocol design approaches are not well suited for single-message modes of communication appropriate, for example, to distributed network operating systems. The timer intervals that must be maintained for sender and receiver are developed along with the rules for timer operation, packet acceptance, packet creation, and connection opening and closing. The underlying assumptions about network characteristics required for the timer-based approach to work correctly are discussed, particularly, that maximum packet lifetime can be bounded. The timer-based mechanisms are compared with mechanisms designed to deal with the same problems by using the exchange of multiple messages to open and close logical connections or virtual circuits. 5 figures.

  2. Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning

    Science.gov (United States)

    Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation. PMID:25254243

  3. Exercise-based cardiac rehabilitation for adults after Heart valve surgery (protocol)

    DEFF Research Database (Denmark)

    Lærum Sibilitz, Kristine; Berg, Selina Kikkenborg; Tang, Lars Hermann

    2013-01-01

    This is the protocol for a review and there is no abstract. The objectives are as follows: To assess the benefits and harms of exercise-based intervention programmes (exercise-based interventions alone or in combination with psycho-educational components), compared to no intervention, or treatment...... as usual, in adults who have had heart valve surgery. In this review we will focus on programmes that include an exercise-based intervention with, or without, another rehabilitation component (such as a psycho-educational component)....

  4. A Simple Battery Aware Gossip Based Sleep Protocol for Densely Deployed Ad-hoc and Sensor Networks

    CERN Document Server

    Shukla, Ashish

    2010-01-01

    Conserving power in mobile ad-hoc and sensor networks is a big challenge. Most of the nodes in these networks, in general, are battery powered, therefore, an efficient power saving protocol is required to extend the lifetime of such networks. A lot of work has been done and several protocols have been proposed to address this problem. Gossip based protocols, which are based on the results of percolation theory, significantly reduce power consumption with very little implementation overhead. However, not much work has been done to make gossiping battery aware. In this paper we introduce a simple gossip based battery aware sleep protocol. The protocol allows low battery nodes to sleep more, therefore, improves overall network lifetime.

  5. Facilitators and barriers to the successful implementation of a protocol to detect child abuse based on parental characteristics

    NARCIS (Netherlands)

    Diderich, H.M.; Dexhesne, M.; Fekkes, M.; Verkerk, P.H.; Pannebakker, F.D.; Klein Velderman, M.; Sorensna, P.J.G.; Buitendijk, S.E.; Oudesluys-Murphy, A.M.

    2014-01-01

    To determine the critical facilitating and impeding factors underlying successful implementation of a method to detect child abuse based on parental rather than child characteristics known as the Hague Protocol. The original implementation region of the protocol (The Hague) was compared to a new imp

  6. Missed Cases in the Detection of Child Abuse Based on Parental Characteristics in the Emergency Department (the Hague Protocol)

    NARCIS (Netherlands)

    Diderich, H.M.; Verkerk, P.H.; Oudesluys-Murphy, A.M.; Dechesne, M.; Buitendijk, S.E.; Fekkes, M.

    2015-01-01

    Introduction We aimed to assess the number of “missed cases” in the detection of child abuse based on the Hague Protocol. This protocol considers 3 parental characteristics of ED adult patients to identify child abuse: (1) domestic violence, (2) intoxication, and (3) suicide attempt or auto-mutilati

  7. Feasibility study of an alkaline-based chemical treatment for the purification of polyhydroxybutyrate produced by a mixed enriched culture

    NARCIS (Netherlands)

    Jiang, Y.; Mikova, G.; Kleerebezem, R.; Van der Wielen, L.A.M.; Cuellar Soares, M.C.

    2015-01-01

    This study focused on investigating the feasibility of purifying polyhydroxybutyrate (PHB) from mixed culture biomass by alkaline-based chemical treatment. The PHB-containing biomass was enriched on acetate under non-sterile conditions. Alkaline treatment (0.2 M NaOH) together with surfactant SDS (0

  8. Inquiry-Based Science and Technology Enrichment Program for Middle School-Aged Female Students

    Science.gov (United States)

    Kim, Hanna

    2016-04-01

    This study investigates the effects of an intensive 1-week Inquiry-Based Science and Technology Enrichment Program (InSTEP) designed for middle school-aged female students. InSTEP uses a guided/open inquiry approach that is deepened and redefined as eight sciences and engineering practices in the Next Generation Science Standards, which aimed at increasing female students' interest in science and science-related careers. This study examined the effectiveness of InSTEP on 123 female students' pre-assessment and post-assessment changes in attitudes toward science and content knowledge of selected science concepts. An attitude survey, a science content test with multiple-choice questions, written assignments, and interviews to collect data were all used to measure students' attitudes and content knowledge. A within-group, repeated measure design was conducted, and the results indicated that at the post-intervention level, InSTEP increased the participants' positive attitudes toward science, science-related careers, and content knowledge of selected science concepts.

  9. Optimal Relay Selection using Efficient Beaconless Geographic Contention-Based Routing Protocol in Wireless Adhoc Networks

    Directory of Open Access Journals (Sweden)

    G. Srimathy

    2012-04-01

    Full Text Available In Wireless Ad hoc network, cooperation of nodes can be achieved by more interactions at higher protocol layers, particularly the MAC (Medium Access Control and network layers play vital role. MAC facilitates a routing protocol based on position location of nodes at network layer specially known as Beacon-less geographic routing (BLGR using Contention-based selection process. This paper proposes two levels of cross-layer framework -a MAC network cross-layer design for forwarder selection (or routing and a MAC-PHY for relay selection. CoopGeo; the proposed cross-layer protocol provides an efficient, distributed approach to select next hops and optimal relays to form a communication path. Wireless networks suffers huge number of communication at the same time leads to increase in collision and energy consumption; hence focused on new Contention access method that uses a dynamical change of channel access probability which can reduce the number of contention times and collisions. Simulation result demonstrates the best Relay selection and the comparative of direct mode with the cooperative networks. And Performance evaluation of contention probability with Collision avoidance.

  10. Cryptanalysis on Identity-based Authenticated Key Agreement Protocols from Pairings

    Directory of Open Access Journals (Sweden)

    Mengbo Hou

    2010-07-01

    Full Text Available Two-party authenticated key agreement protocol is used to authenticate entities and establish session keys in an open network in order to provide secure communications between two parties. Several security attributes are highly desired for such protocols, such as perfect forward secrecy (the corruption of long-term keys of all the entities should not compromise any session key, PKG forward secrecy (the corruption of the PKG's master key in the ID-based system should not compromise the established session keys, and known session-key specific temporary information secrecy (The exposure of private temporary information should not compromise the secrecy of generated session keys. In 2005, Choie et al. proposed three identity-based authenticated key agreement protocols from pairings. Our analysis shows that they all didn't provide protection against known session-key specific temporary information attack and some of them are vulnerable against man-in-the-middle attack, such as the key replicating attack. We analyze some of the attacks under the BR93 security model.

  11. Research of RFID Certification Security Protocol based on Hash Function and DES Algorithm

    Directory of Open Access Journals (Sweden)

    bin Xu

    2013-10-01

    Full Text Available RFID has been more and more attention and application by people, but the existence of security and privacy problems worthy of attention is concern. The certification process analysis of several typical security protocols is based on existing RFID authentication protocol. It proposed an improved bidirectional authentication algorithm. The use of one-way HASH function can solve the security problem of RFID. The protocol has anti-replay, impedance analysis, forgery, and tracking performance, and is suitable for the distributed system. With the development of computer and Internet is widely used in various industries, interaction of high-speed information transfer process. The problem of information security is concern. The paper produce and use all kinds of algorithms based on hash function firstly. Then as information on a solid safety lock, MD5, SHA-1 file verification, encryption, digital signature, PKI building has security full of all kinds of information. Finally, it can effectively prevent the attack, ensuring the authenticity of the information not to be modified or leaks

  12. Optimal hop position-based minimum energy routing protocol for underwater acoustic sensor networks

    Directory of Open Access Journals (Sweden)

    K.S. Geethu

    2015-05-01

    Full Text Available Development of energy-efficient routing protocols is a major concern in the design of underwater acoustic sensor networks (UASNs since UASN nodes are typically powered by batteries, which are difficult to replace or recharge in aquatic environments. This study proposes an optimal hop position-based energy-efficient routing protocol for UASNs. Initially, the authors present an analytical model to compute the total energy consumption in a multi-hop UASN for deep water scenario, taking into account dependence of usable bandwidth on transmission distance and propagation characteristics of underwater acoustic channel. They derive analytical solution for the optimal hop distance that minimises total energy consumption in the network. They then propose an energy-efficient routing protocol that relies on the computation of optimal hop distance. In their routing scheme, selection of forwarding nodes are based on their depth, residual energy and closeness to the computed optimal hop position corresponding to source node. Simulation results show that total energy consumption of the network gets reduced drastically, leading to improvement in network lifetime. Moreover, the proposed routing scheme makes use of courier nodes to handle coverage-hole problem. The efficient movement of courier nodes improves packet delivery ratio and network throughput.

  13. A BROADCAST BASED ROUTING PROTOCOL FOR INTER-CLUSTER DATA DISSEMINATION IN VEHICULAR COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Auxeeliya Jesudoss

    2014-01-01

    Full Text Available Vehicular communication is one of the fast growing and promising technologies for a safe and comfortable driving environment. These technologies do not end up with economic and safety ramifications, but also extended with other informational and entertainment oriented services. Data are being propagated multi-hop between source and destination vehicles for many real-life applications. Clustering is one of the effective and scalable solutions for data dissemination in wireless ad hoc networks. Though many cluster-based methods have been proposed for multi-hop data delivery in vehicular ad hoc networks, most of them do not consider the real-time changes in the network topology or imposes large penalties in routing such as unstable clusters, broken links, updating route tables. In order to address these issues, we propose a broadcast based routing protocol for inter-cluster data dissemination in this study that works on real-time vehicle information. Unlike, most existing routing algorithms, it only uses hello messages to obtain routing information without many other control messages. In addition, it alleviates the storage of routing information in every node, which largely reduces the overheads in routing. We performed extensive simulation to demonstrate the effectiveness and efficiency of the proposed routing protocol. Results show that the proposed protocol outperforms other approaches in terms of average delay, average delivery ratio and average number of hops.

  14. Priority Based Congestion Control Dynamic Clustering Protocol in Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Jayakumari, R Beulah; Senthilkumar, V Jawahar

    2015-01-01

    Wireless sensor network is widely used to monitor natural phenomena because natural disaster has globally increased which causes significant loss of life, economic setback, and social development. Saving energy in a wireless sensor network (WSN) is a critical factor to be considered. The sensor nodes are deployed to sense, compute, and communicate alerts in a WSN which are used to prevent natural hazards. Generally communication consumes more energy than sensing and computing; hence cluster based protocol is preferred. Even with clustering, multiclass traffic creates congested hotspots in the cluster, thereby causing packet loss and delay. In order to conserve energy and to avoid congestion during multiclass traffic a novel Priority Based Congestion Control Dynamic Clustering (PCCDC) protocol is developed. PCCDC is designed with mobile nodes which are organized dynamically into clusters to provide complete coverage and connectivity. PCCDC computes congestion at intra- and intercluster level using linear and binary feedback method. Each mobile node within the cluster has an appropriate queue model for scheduling prioritized packet during congestion without drop or delay. Simulation results have proven that packet drop, control overhead, and end-to-end delay are much lower in PCCDC which in turn significantly increases packet delivery ratio, network lifetime, and residual energy when compared with PASCC protocol.

  15. Priority Based Congestion Control Dynamic Clustering Protocol in Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    R. Beulah Jayakumari

    2015-01-01

    Full Text Available Wireless sensor network is widely used to monitor natural phenomena because natural disaster has globally increased which causes significant loss of life, economic setback, and social development. Saving energy in a wireless sensor network (WSN is a critical factor to be considered. The sensor nodes are deployed to sense, compute, and communicate alerts in a WSN which are used to prevent natural hazards. Generally communication consumes more energy than sensing and computing; hence cluster based protocol is preferred. Even with clustering, multiclass traffic creates congested hotspots in the cluster, thereby causing packet loss and delay. In order to conserve energy and to avoid congestion during multiclass traffic a novel Priority Based Congestion Control Dynamic Clustering (PCCDC protocol is developed. PCCDC is designed with mobile nodes which are organized dynamically into clusters to provide complete coverage and connectivity. PCCDC computes congestion at intra- and intercluster level using linear and binary feedback method. Each mobile node within the cluster has an appropriate queue model for scheduling prioritized packet during congestion without drop or delay. Simulation results have proven that packet drop, control overhead, and end-to-end delay are much lower in PCCDC which in turn significantly increases packet delivery ratio, network lifetime, and residual energy when compared with PASCC protocol.

  16. A web product data management system based on Simple Object Access Protocol

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which includes three tiers: the user services tier, the business services tier, and the data services tier. The client service component uses the serverside technology, and Extensible Markup Language (XML) web service which uses SOAP as the communication protocol is chosen as the business service component. To illustrate how to build a web-based PDM system using the proposed architecture,a case PDM system which included three logical tires was built. To use the security and central management features of the database, a stored procedure was recommended in the data services tier. The business object was implemented as an XML web service so that client could use standard internet protocols to communicate with the business object from any platform. In order to satisfy users using all sorts of browser, the server-side technology and Microsoft ASP.NET was used to create the dynamic user interface.

  17. A Network Coding Based Hybrid ARQ Protocol for Underwater Acoustic Sensor Networks

    Science.gov (United States)

    Wang, Hao; Wang, Shilian; Zhang, Eryang; Zou, Jianbin

    2016-01-01

    Underwater Acoustic Sensor Networks (UASNs) have attracted increasing interest in recent years due to their extensive commercial and military applications. However, the harsh underwater channel causes many challenges for the design of reliable underwater data transport protocol. In this paper, we propose an energy efficient data transport protocol based on network coding and hybrid automatic repeat request (NCHARQ) to ensure reliability, efficiency and availability in UASNs. Moreover, an adaptive window length estimation algorithm is designed to optimize the throughput and energy consumption tradeoff. The algorithm can adaptively change the code rate and can be insensitive to the environment change. Extensive simulations and analysis show that NCHARQ significantly reduces energy consumption with short end-to-end delay. PMID:27618044

  18. An evaluation of the hemiplegic subject based on the Bobath approach. Part II: The evaluation protocol.

    Science.gov (United States)

    Corriveau, H; Guarna, F; Dutil, E; Riley, E; Arsenault, A B; Drouin, G

    1988-01-01

    A protocol of evaluation of the hemiplegic patient based on the Bobath approach to treatment is presented. Six parameters are evaluated: sensorium, muscle tone, reflex activity, active movement, postural reactions and pain. The first and last of these are included because of their possible effects on the motor recovery process of the hemiplegic patient. The other four are directly borrowed from the Bobath modality of treatment. For each of these parameters, the procedures are given for its evaluation along with its respective rating scales. These scales are of an ordinal nature ranging from 0 to 3. It is suggested that this new evaluation protocol is fully compatible with the therapeutic modality developed by Bobath and as well is adequate to quantify patient progress in the principle aspects treated by this well used rehabilitation approach.

  19. A Network Coding Based Hybrid ARQ Protocol for Underwater Acoustic Sensor Networks.

    Science.gov (United States)

    Wang, Hao; Wang, Shilian; Zhang, Eryang; Zou, Jianbin

    2016-01-01

    Underwater Acoustic Sensor Networks (UASNs) have attracted increasing interest in recent years due to their extensive commercial and military applications. However, the harsh underwater channel causes many challenges for the design of reliable underwater data transport protocol. In this paper, we propose an energy efficient data transport protocol based on network coding and hybrid automatic repeat request (NCHARQ) to ensure reliability, efficiency and availability in UASNs. Moreover, an adaptive window length estimation algorithm is designed to optimize the throughput and energy consumption tradeoff. The algorithm can adaptively change the code rate and can be insensitive to the environment change. Extensive simulations and analysis show that NCHARQ significantly reduces energy consumption with short end-to-end delay.

  20. A Network Coding Based Hybrid ARQ Protocol for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hao Wang

    2016-09-01

    Full Text Available Underwater Acoustic Sensor Networks (UASNs have attracted increasing interest in recent years due to their extensive commercial and military applications. However, the harsh underwater channel causes many challenges for the design of reliable underwater data transport protocol. In this paper, we propose an energy efficient data transport protocol based on network coding and hybrid automatic repeat request (NCHARQ to ensure reliability, efficiency and availability in UASNs. Moreover, an adaptive window length estimation algorithm is designed to optimize the throughput and energy consumption tradeoff. The algorithm can adaptively change the code rate and can be insensitive to the environment change. Extensive simulations and analysis show that NCHARQ significantly reduces energy consumption with short end-to-end delay.

  1. On-demand multicast routing protocol based on node classification in MANET

    Institute of Scientific and Technical Information of China (English)

    DENG Xia; SUN Li-min; WANG Jian-xin; LUO Yu-hong; CHEN Jian-er

    2006-01-01

    An improved on-demand multicast routing protocol(ODMRP), node classification on-demand multicast routing protocol(NC-ODMRP), which is based on node classification in mobile ad hoc networks was proposed. NCODMRP classifies nodes into such three categories as ordinary node, forwarding group(FG) node, neighbor node of FG node according to their history forwarding information. The categories are distinguished with different weights by a weight table in the nodes. NC-ODMRP chooses the node with the highest weight as an FG node during the setup of forwarding group, which reduces a lot of redundant FG nodes by sharing more FG nodes between different sender and receiver pairs. The simulation results show that NC-ODMRP can reduce more than 20% FG number of ODMRP, thus enhances nearly 14% data forwarding efficiency and 12% energy consumption efficiency when the number of multicast senders is more than 5.

  2. GEAMS: a Greedy Energy-Aware Multipath Stream-based Routing Protocol for WMSNs

    CERN Document Server

    Medjiah, Samir; Krief, Francine; 10.1109/GIIS.2009.5307078

    2012-01-01

    Because sensor nodes operate on power limited batteries, sensor functionalities have to be designed carefully. In particular, designing energy-efficient packet forwarding is important to maximize the lifetime of the network and to minimize the power usage at each node. This paper presents a Geographic Energy-Aware Multipath Stream-based (GEAMS) routing protocol for WMSNs. GEAMS routing decisions are made online, at each forwarding node in such a way that there is no need to global topology knowledge and maintenance. GEAMS routing protocol performs load-balancing to minimize energy consumption among nodes using twofold policy: (1) smart greedy forwarding and (2) walking back forwarding. Performances evaluations of GEAMS show that it can maximize the network lifetime and guarantee quality of service for video stream transmission in WMSNs.

  3. A QoS Routing Protocol based on Available Bandwidth Estimation for Wireless Ad Hoc Networks

    CERN Document Server

    Kaaniche, Heni; Frikha, Mounir; Kamoun, Farouk

    2011-01-01

    At the same time as the emergence of multimedia in mobile Ad hoc networks, research for the introduction of the quality of service (QoS) has received much attention. However, when designing a QoS solution, the estimation of the available resources still represents one of the main issues. This paper suggests an approach to estimate available resources on a node. This approach is based on the estimation of the busy ratio of the shared canal. We consider in our estimation the several constraints related to the Ad hoc transmission mode such as Interference phenomena. This approach is implemented on the AODV routing protocol. We call AODVwithQOS our new routing protocol. We also performed a performance evaluation by simulations using NS2 simulator. The results confirm that AODVwithQoS provides QoS support in ad hoc wireless networks with good performance and low overhead.

  4. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    Science.gov (United States)

    Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Ding, Qing-Yan; Zhang, Shu-Hui

    2016-06-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. Supported by the National Natural Science Foundation of China under Grant Nos. 61572297, 61303199, 61272514, and 61373131, the Shandong Provincial Natural Science Foundation of China under Grant Nos. ZR2013FM025, ZR2013FQ001, ZR2014FM003, and ZY2015YL018, the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China under Grant Nos. BS2015DX006 and BS2014DX007, the National Development Foundation for Cryptological Research, China under Grant No. MMJJ201401012, the Priority Academic Program Development of Jiangsu Higher Education Institutions and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Funds, and the Shandong Academy of Sciences Youth Fund Project, China under Grant Nos. 2015QN003 and 2013QN007

  5. Performance Analysis of AODV Routing Protocol for Wireless Sensor Network based Smart Metering

    Science.gov (United States)

    >Hasan Farooq, Low Tang Jung,

    2013-06-01

    Today no one can deny the need for Smart Grid and it is being considered as of utmost importance to upgrade outdated electric infrastructure to cope with the ever increasing electric load demand. Wireless Sensor Network (WSN) is considered a promising candidate for internetworking of smart meters with the gateway using mesh topology. This paper investigates the performance of AODV routing protocol for WSN based smart metering deployment. Three case studies are presented to analyze its performance based on four metrics of (i) Packet Delivery Ratio, (ii) Average Energy Consumption of Nodes (iii) Average End-End Delay and (iv) Normalized Routing Load.

  6. Enchytraeus albidus microarray: enrichment, design, annotation and database (EnchyBASE.

    Directory of Open Access Journals (Sweden)

    Sara C Novais

    Full Text Available Enchytraeus albidus (Oligochaeta is an ecologically relevant species used as standard test organisms for risk assessment. Effects of stressors in this species are commonly determined at the population level using reproduction and survival as endpoints. The assessment of transcriptomic responses can be very useful e.g. to understand underlying mechanisms of toxicity with gene expression fingerprinting. In the present paper the following is being addressed: 1 development of suppressive subtractive hybridization (SSH libraries enriched for differentially expressed genes after metal and pesticide exposures; 2 sequencing and characterization of all generated cDNA inserts; 3 development of a publicly available genomic database on E. albidus. A total of 2100 Expressed Sequence Tags (ESTs were isolated, sequenced and assembled into 1124 clusters (947 singletons and 177 contigs. From these sequences, 41% matched known proteins in GenBank (BLASTX, e-value ≤ 10(-5 and 37% had at least one Gene Ontology (GO term assigned. In total, 5.5% of the sequences were assigned to a metabolic pathway, based on KEGG. With this new sequencing information, an Agilent custom oligonucleotide microarray was designed, representing a potential tool for transcriptomic studies. EnchyBASE (http://bioinformatics.ua.pt/enchybase/ was developed as a web freely available database containing genomic information on E. albidus and will be further extended in the near future for other enchytraeid species. The database so far includes all ESTs generated for E. albidus from three cDNA libraries. This information can be downloaded and applied in functional genomics and transcription studies.

  7. Enrichment of putative human epidermal stem cells based on cell size and collagen type IV adhesiveness

    Institute of Scientific and Technical Information of China (English)

    Juxue Li; Enkui Duan; Chenglin Miao; Weixiang Guo; Liwei Jia; Jiaxi Zhou; Baohua Ma; Sha Peng; Shuang Liu; Yujing Cao

    2008-01-01

    The enrichment and identification of human epidermal stem cells (EpSCs) are of paramount importance for both basic research and clinical application. Although several approaches for the enrichment of EpSCs have been established, enriching a pure population of viable EpSCs is still a challenging task. An improved approach is worth developing to enhance the purity and viability of EpSCs. Here we report that cell size combined with collagen type IV adhesiveness can be used in an improved approach to enrich pure and viable human EpSCs. We separated the rapidly adherent keratinocytes into three populations that range in size from 5-7 μm (population A), to 7-9 μm (population B), to >9 μm (population C) in diameter, and found that human putative EpSCs could be further enriched in population A with the smallest size. Among the three populations, population A displayed the highest density of βl-integrin receptor, contained the highest percentage of cells in G0/G1 phase, showed the highest nucleus to cytoplasm ratio, and possessed the highest colony formation efficiency (CFE). When injected into murine blastocysts, these cells participated in multi-tissue formation. More significantly, compared with a previous approach that sorted putative EpSCs according to pl-integrin antibody staining, the viability of the EpSCs enriched by the improved approach was significantly enhanced. Our results provide a putative strategy for the enrichment of human EpSCs, and encourage further study into the role of cell size in stem cell biology.

  8. 一种基于AODV的备用路由协议%A new Alternate Routing Protocol Based On AODV Protocol

    Institute of Scientific and Technical Information of China (English)

    潘有芬; 黄波; 赵春霞

    2012-01-01

    This paper introduced the Ad Hoc network and AODV routing protocol and proposed an optimization method based on studying its inadequacies. This method compared the average speed of the routing nodes and selected the minimum average speed routing as an alternate routing When the primary route fails, start the alternative route. The average delay, drop ratio and network throughput were compared by simulating new routing protocol and the AODV routing protocol through NS-2. Results indicated that the optimized protocol decreased the expense of network and showed better performance than AODV routing protocol.%简要介绍了移动AdHoc网络和AODV路由协议,并在对AODV路由协议进行了研究的基础上针对AODV路由协议的不足之处提出了一种优化方法。此方法比较了路由节点的平均速度,选取平均速度小的路由为备用路由。当主路由失效后,就启动备用路由。通过NS-2对改进的路由协议与AODV路由协议的仿真模拟,比较了平均端到端时延、丢包率、网络吞吐量这三个参数,验证了修改后的路由协议减少了网络开销,能更好的提高网络的性能。

  9. Protein expression and isotopic enrichment based on induction of the Entner-Doudoroff pathway in Escherichia coli

    Energy Technology Data Exchange (ETDEWEB)

    Refaeli, Bosmat [School of Chemistry, Raymond and Beverly Sackler Faculty of Exact Sciences, Tel Aviv University, Ramat Aviv 69978, Tel Aviv (Israel); Goldbourt, Amir, E-mail: amirgo@post.tau.ac.il [School of Chemistry, Raymond and Beverly Sackler Faculty of Exact Sciences, Tel Aviv University, Ramat Aviv 69978, Tel Aviv (Israel)

    2012-10-12

    Highlights: Black-Right-Pointing-Pointer The Entner-Doudoroff pathway is induced during protein expression in E. coli. Black-Right-Pointing-Pointer 1-{sup 13}C-gluconate and {sup 15}NH{sub 4}Cl provide a carbonyl-amide protein backbone labeling scheme. Black-Right-Pointing-Pointer The enrichment pattern is determined by nuclear magnetic resonance. -- Abstract: The Entner-Doudoroff pathway is known to exist in many organisms including bacteria, archea and eukarya. Although the common route for carbon catabolism in Escherichia coli is the Embden-Meyerhof-Parnas pathway, it was shown that gluconate catabolism in E. coli occurs via the Entner-Doudoroff pathway. We demonstrate here that by supplying BL21(DE3) competent E.coli cells with gluconate in a minimal growth medium, protein expression can be induced. Nuclear magnetic resonance data of over-expressed ubiquitin show that by using [1-{sup 13}C]-gluconate as the only carbon source, and {sup 15}N-enriched ammonium chloride, sparse isotopic enrichment in the form of a spin-pair carbonyl-amide backbone enrichment is obtained. The specific amino acid labeling pattern is analyzed and is shown to be compatible with Entner-Doudoroff metabolism. Isotopic enrichment serves as a key factor in the biophysical characterization of proteins by various methods including nuclear magnetic resonance, mass spectrometry, infrared spectroscopy and more. Therefore, the method presented here can be applied to study proteins by obtaining sparse enrichment schemes that are not based on the regular glycolytic pathway, or to study the Entner-Doudoroff metabolism during protein expression.

  10. A Schedule-based Multi-channel MAC Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ilyoung Chong

    2010-10-01

    Full Text Available Due to the half-duplex property of the sensor radio and the broadcast nature of wireless medium, limited bandwidth remains a pressing issue for wireless sensor networks (WSNs. The design of multi-channel MAC protocols has attracted the interest of many researchers as a cost effective solution to meet the higher bandwidth demand for the limited bandwidth in WSN. In this paper, we present a scheduled-based multi-channel MAC protocol to improve network performance. In our protocol, each receiving node selects (schedules some timeslot(s, in which it may receive data from the intending sender(s. The timeslot selection is done in a conflict free manner, where a node avoids the slots that are already selected by others in its interference range. To minimize the conflicts during timeslot selection, we propose a unique solution by splitting the neighboring nodes into different groups, where nodes of a group may select the slots allocated to that group only. We demonstrate the effectiveness of our approach thorough simulations in terms of performance parameters such as aggregate throughput, packet delivery ratio, end-to-end delay, and energy consumption.

  11. Performance Evaluation of Mesh based Multicast Reactive Routing Protocol under Black Hole Attack

    CERN Document Server

    Anita, E A Mary

    2009-01-01

    A mobile ad-hoc network is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. The wireless and dynamic nature of ad-hoc networks makes them vulnerable to attacks especially in routing protocols. Providing security in mobile ad-hoc networks has been a major issue over the recent years. One of the prominent mesh base reactive multicast routing protocols used in ad-hoc networks is On Demand Multicast Routing protocol (ODMRP). The security of ODMRP is compromised by a primary routing attack called black hole attack. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. This paper discusses the impact of black hole attack on ODMRP under various scenarios. The performance is evaluated using metrics such as packet delivery ratio and end to end delay for various numbers of senders and receivers via...

  12. Design and Performance Evaluation of a Distributed OFDMA-Based MAC Protocol for MANETs

    Directory of Open Access Journals (Sweden)

    Jaesung Park

    2014-01-01

    Full Text Available In this paper, we propose a distributed MAC protocol for OFDMA-based wireless mobile ad hoc multihop networks, in which the resource reservation and data transmission procedures are operated in a distributed manner. A frame format is designed considering the characteristics of OFDMA that each node can transmit or receive data to or from multiple nodes simultaneously. Under this frame structure, we propose a distributed resource management method including network state estimation and resource reservation processes. We categorize five types of logical errors according to their root causes and show that two of the logical errors are inevitable while three of them are avoided under the proposed distributed MAC protocol. In addition, we provide a systematic method to determine the advertisement period of each node by presenting a clear relation between the accuracy of estimated network states and the signaling overhead. We evaluate the performance of the proposed protocol in respect of the reservation success rate and the success rate of data transmission. Since our method focuses on avoiding logical errors, it could be easily placed on top of the other resource allocation methods focusing on the physical layer issues of the resource management problem and interworked with them.

  13. Novel Routing Protocol Based on Periodic Route Discovery for Mobile Adhoc Networks

    Directory of Open Access Journals (Sweden)

    V.Jai KumarAssociate

    2016-12-01

    Full Text Available A group of mobile devices called as nodes, without any centralized network, communicates with each other over multi-hop links is called as an Ad-hoc Network (MANET. The military battle-field scenarios, Post-disaster rescue efforts, sensor networks, and entrepreneurs in a conference are some of the examples of mobile ad-hoc networks. Since there is no infrastructure in the network, the routing should be handled at every node. To improve the life time of network different routing protocols are consider. In present routing protocols of ad hoc networks, routing is an act of moving information from a source to destination in an internetwork. Route is selected in the route discovery phase until all the packets are sent out. Due to the continuous flow of packets in a selected route leads to the route failure. In order to reduce this problem we consider PRD-based MMBCR and considering the percentage of the optimum value for periodic route discovery. In our research we are going to analyze the performance of different routing protocols like DSR, MMBCR to get maximum optimum value using Network Simulator Software.

  14. A Zigbee and Bluetooth Protocol Converter Based on Multi-sinks Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Chunhong Guo

    2014-07-01

    Full Text Available A Zigbee and Bluetooth converter is designed in this paper. A multi-sinks wireless sensor network is used to solve the notable problems appeared in the single node wireless sensor network. These problems are solved in converter system such as data transmission reliability and node energy consumption imbalance and so on. The converter system can be better adapted to the large-scale, high-density development trend of network layout. Zigbee technology has low power consumption, low cost. And Bluetooth technology shows outstanding advantages in terms of terminal access. This paper attempts to combine the advantages of two wireless technology, and design a point-to-many method of Zigbee and Bluetooth protocol converter. Then apply the Zigbee and Bluetooth protocol of converter to the multi-sinks wireless sensor networks. At the sensor nodes, it forms a network based on the Zigbee protocol. At the converter nodes, it communicates with Bluetooth devices through point-to-many method. The experiment results show that the point-to-many method of Zigbee and Bluetooth system can convert data effectively, and improve the data transmission reliably of the wireless sensor network. It has important values in the application of wireless sensor networks.

  15. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    Science.gov (United States)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  16. Analysis of 100Base-VG demand priority protocol: effects on real-time communications

    Science.gov (United States)

    Kadambi, Jayant; Barilovits, Stephen

    1994-04-01

    Real-time applications require not only high bandwidths, low access delays, high reliability (low loss rates) but guarantees on the upper or lower bounds of all three. Guarantees, in addition to allowing real-time applications to be notified of their exact Quality of Service (QoS) actually improve the QoS that can be provided. The client's QoS varies based upon system and network load and may be adjusted based on the total offered load, the available bandwidth and delay characteristics of the network. These requirements for guarantees in delay and bandwidth have stimulated the need for new network architectures that consist of network protocols that provide the underlying support for guarantees in medium access delay and bandwidth. 100Base-VG is a data link layer 100 Mbps LAN protocol that uses a preemptive round robin scheme to provide system connectivity to a workgroup. In this paper, we analyze the performance of 100Base-VG using a simple analytical and simulation model. Expressions for network utilization, throughput and access delay are derived. From these, we show that 100Base-VG provides the basic characteristics required by a real-time network architecture at the data link layer to support guarantees for delay, delay jitter and throughput.

  17. Performance Evaluation of Ant-Based Routing Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Adamu Murtala Zungeru

    2012-05-01

    Full Text Available High efficient routing is an important issue in the design of limited energy resource Wireless Sensor Networks (WSNs. Due to the characteristic of the environment at which the sensor node is to operate, coupled with severe resources; on-board energy, transmission power, processing capability, and storage limitations, prompt for careful resource management and new routing protocol so as to counteract the differences and challenges. To this end, we present an Improved Energy-Efficient Ant-Based Routing (IEEABR Algorithm in wireless sensor networks. Compared to the state-of-the-art Ant-Based routing protocols; Basic Ant-Based Routing (BABR Algorithm, Sensor-driven and Cost-aware ant routing (SC, Flooded Forward ant routing (FF, Flooded Piggybacked ant routing (FP, and Energy-Efficient Ant-Based Routing (EEABR, the proposed IEEABR approach has advantages in terms of reduced energy usage which can effectively balance the WSN node€™s power consumption, and high energy efficiency. The performance evaluations for the algorithms on a real application are conducted in a well known WSN MATLAB-based simulator (RMASE using both static and dynamic scenario.

  18. Enhanced Temporal Resolution with Ion Channel-Functionalized Sensors Using a Conductance-Based Measurement Protocol.

    Science.gov (United States)

    Agasid, Mark T; Comi, Troy J; Saavedra, S Scott; Aspinwall, Craig A

    2017-01-17

    The binding of a target analyte to an ion channel (IC), which is readily detected electrochemically in a label-free manner with single-molecule selectivity and specificity, has generated widespread interest in using natural and engineered ICs as transducers in biosensing platforms. To date, the majority of developments in IC-functionalized sensing have focused on IC selectivity or sensitivity or development of suitable membrane environments and aperture geometries. Comparatively little work has addressed analytical performance criteria, particularly criteria required for temporal measurements of dynamic processes. We report a measurement protocol suitable for rapid, time-resolved monitoring (≤30 ms) of IC-modulated membrane conductance. Key features of this protocol include the reduction of membrane area and the use of small voltage steps (10 mV) and short duration voltage pulses (10 ms), which have the net effect of reducing the capacitive charging and decreasing the time required to achieve steady state currents. Application of a conductance protocol employing three sequential, 10 ms voltage steps (-10 mV, -20 mV, -30 mV) in an alternating, pyramid-like arrangement enabled sampling of membrane conductance every 30 ms. Using this protocol, dynamic IC measurements on black lipid membranes (BLMs) functionalized with gramicidin A were conducted using a fast perfusion system. BLM conductance decreased by 76 ± 7.5% within 30 ms of switching from solutions containing 0 to 1 M Ca(2+), which demonstrates the feasibility of using this approach to monitor rapid, dynamic chemical processes. Rapid conductance measurements will be broadly applicable to IC-based sensors that undergo analyte-specific gating.

  19. Leader-Following Consensus Stability of Discrete-Time Linear Multiagent Systems with Observer-Based Protocols

    Directory of Open Access Journals (Sweden)

    Bingbing Xu

    2013-01-01

    Full Text Available We consider the leader-following consensus problem of discrete-time multiagent systems on a directed communication topology. Two types of distributed observer-based consensus protocols are considered to solve such a problem. The observers involved in the proposed protocols include full-order observer and reduced-order observer, which are used to reconstruct the state variables. Two algorithms are provided to construct the consensus protocols, which are based on the modified discrete-time algebraic Riccati equation and Sylvester equation. In light of graph and matrix theory, some consensus conditions are established. Finally, a numerical example is provided to illustrate the obtained result.

  20. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...... of communication protocols. With it, partners can suggest a new protocol by sending its specification. After formally verifying the specification, each partner generates an implementation, which can then be used for establishing communication. We also present a practical realisation of the Protocol Implementation...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....

  1. Integrating human impacts and ecological integrity into a risk-based protocol for conservation planning.

    Science.gov (United States)

    Mattson, Kimberly M; Angermeier, Paul L

    2007-01-01

    Conservation planning aims to protect biodiversity by sustainng the natural physical, chemical, and biological processes within representative ecosystems. Often data to measure these components are inadequate or unavailable. The impact of human activities on ecosystem processes complicates integrity assessments and might alter ecosystem organization at multiple spatial scales. Freshwater conservation targets, such as populations and communities, are influenced by both intrinsic aquatic properties and the surrounding landscape, and locally collected data might not accurately reflect potential impacts. We suggest that changes in five major biotic drivers-energy sources, physical habitat, flow regime, water quality, and biotic interactions-might be used as surrogates to inform conservation planners of the ecological integrity of freshwater ecosystems. Threats to freshwater systems might be evaluated based on their impact to these drivers to provide an overview of potential risk to conservation targets. We developed a risk-based protocol, the Ecological Risk Index (ERI), to identify watersheds with least/most risk to conservation targets. Our protocol combines risk-based components, specifically the frequency and severity of human-induced stressors, with biotic drivers and mappable land- and water-use data to provide a summary of relative risk to watersheds. We illustrate application of our protocol with a case study of the upper Tennessee River basin, USA. Differences in risk patterns among the major drainages in the basin reflect dominant land uses, such as mining and agriculture. A principal components analysis showed that localized, moderately severe threats accounted for most of the threat composition differences among our watersheds. We also found that the relative importance of threats is sensitive to the spatial grain of the analysis. Our case study demonstrates that the ERI is useful for evaluating the frequency and severity of ecosystem-wide risk, which can

  2. Integrating human impacts and ecological integrity into a risk-based protocol for conservation planning

    Science.gov (United States)

    Mattson, K.M.; Angermeier, P.L.

    2007-01-01

    Conservation planning aims to protect biodiversity by sustainng the natural physical, chemical, and biological processes within representative ecosystems. Often data to measure these components are inadequate or unavailable. The impact of human activities on ecosystem processes complicates integrity assessments and might alter ecosystem organization at multiple spatial scales. Freshwater conservation targets, such as populations and communities, are influenced by both intrinsic aquatic properties and the surrounding landscape, and locally collected data might not accurately reflect potential impacts. We suggest that changes in five major biotic drivers-energy sources, physical habitat, flow regime, water quality, and biotic interactions-might be used as surrogates to inform conservation planners of the ecological integrity of freshwater ecosystems. Threats to freshwater systems might be evaluated based on their impact to these drivers to provide an overview of potential risk to conservation targets. We developed a risk-based protocol, the Ecological Risk Index (ERI), to identify watersheds with least/most risk to conservation targets. Our protocol combines risk-based components, specifically the frequency and severity of human-induced stressors, with biotic drivers and mappable land- and water-use data to provide a summary of relative risk to watersheds. We illustrate application of our protocol with a case study of the upper Tennessee River basin, USA. Differences in risk patterns among the major drainages in the basin reflect dominant land uses, such as mining and agriculture. A principal components analysis showed that localized, moderately severe threats accounted for most of the threat composition differences among our watersheds. We also found that the relative importance of threats is sensitive to the spatial grain of the analysis. Our case study demonstrates that the ERI is useful for evaluating the frequency and severity of ecosystemwide risk, which can

  3. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

    Science.gov (United States)

    He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk

    2014-10-01

    The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

  4. Security bound of two-bases quantum key-distribution protocols using qudits

    CERN Document Server

    Nikolopoulos, G M; Nikolopoulos, Georgios M.; Alber, Gernot

    2005-01-01

    We investigate the security bounds of quantum cryptographic protocols using $d$-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the BB84 quantum key distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.

  5. Research on an E-mail Encryption Protocol Based on Quantum Teleportation

    Science.gov (United States)

    Shufen, Xiao; Yumin, Dong; Hongyang, Ma; Libo, Chen

    2016-11-01

    With the rapid development of information technology (IT), E-mail has become an important communication tool between human beings. Meanwhile, E-mail safety becomes increasingly important because of its universal applications. In order to overcome shortages of classical E-mail encryption, an E-mail encryption protocol based on quantum teleportation was proposed. It makes quantum encryption of E-mails during sending and receiving processes by taking advantages of entanglement and nonclonability of quantum, thus ensuring safety and reliability of E-mail transmission.

  6. Research on an E-mail Encryption Protocol Based on Quantum Teleportation

    Science.gov (United States)

    Shufen, Xiao; Yumin, Dong; Hongyang, Ma; Libo, Chen

    2016-07-01

    With the rapid development of information technology (IT), E-mail has become an important communication tool between human beings. Meanwhile, E-mail safety becomes increasingly important because of its universal applications. In order to overcome shortages of classical E-mail encryption, an E-mail encryption protocol based on quantum teleportation was proposed. It makes quantum encryption of E-mails during sending and receiving processes by taking advantages of entanglement and nonclonability of quantum, thus ensuring safety and reliability of E-mail transmission.

  7. A Network-Coding Based Event Diffusion Protocol for Wireless Mesh Networks

    Science.gov (United States)

    Beraldi, Roberto; Alnuweiri, Hussein

    Publish/subscribe is a well know and powerful distributed programming paradigm with many potential applications. In this paper we consider the central problem of any pub/sub implementation, namely the problem of event dissemination, in the case of a Wireless Mesh Network. We propose a protocol based on non-trivial forwarding mechanisms that employ network coding as a central tool for supporting adaptive event dissemination while exploiting the broadcast nature of wireless transmissions. Our results show that network coding provides significant improvements to event diffusion compared to standard blind dissemination solutions, namely flooding and gossiping.

  8. Design and Simulation of Routing-switching Protocol Based on Optical Switch Array

    Institute of Scientific and Technical Information of China (English)

    HE Wei; MAO You-ju; LIU Jiang

    2004-01-01

    An optical routing- switching technology based on optical switch array is proposed. The characteristics of the blocking and nonblocking networks are analyzed and compared, odd- even sorting network is used to realize optical routing- switching, relative routing- switching protocol is designed.Simulation test under load shows that it can reduce a blocking effectively and enhance an efficiency of switching. Further, it can transfer the processing and switching within parallel computer from electric domain to optical domain. It can make parallel computer coordinating computing and processing at much more higher speed, storing and transmitting even more efficiently.

  9. TSH-Based Protocol, Tablet Instability, and Absorption Effects on L-T4 Bioequivalence

    Science.gov (United States)

    DiStefano, Joseph J.

    2009-01-01

    Background FDA Guidance for pharmacokinetic (PK) testing of levothyroxine (L-T4) for interbrand bioequivalence has evolved recently. Concerns remain about efficacy and safety of the current protocol, based on PK analysis following supraphysiological L-T4 dosing in euthyroid volunteers, and recent recalls due to intrabrand manufacturing problems also suggest need for further refinement. We examine these interrelated issues quantitatively, using simulated what-if scenarios testing efficacy of a TSH-based protocol and tablet stability and absorption, to enhance precision of L-T4 bioequivalence methods. Methods We use an updated simulation model of human thyroid hormone regulation quantified and validated from data that span a wide range of normal and abnormal thyroid system function. Bioequivalence: We explored a TSH-based protocol, using normal replacement dosing in simulated thyroidectomized patients, switching brands after 8 weeks of full replacement dosing. We simulated effects of tablet potency differences and intestinal absorption differences on predicted plasma TSH, T4, and triiodothyronine (T3) dynamics. Stability: We simulated effects of potency decay and lot-by-lot differences in realistic scenarios, using actual tablet potency data spanning 2 years, comparing the recently reduced 95–105% FDA-approved potency range with the original 90–110% range. Results A simulated decrease as small as 10–15% in L-T4 or its absorption generated TSH concentrations outside the bioequivalence target range (0.5–2.5 mU/L TSH), whereas T3 and T4 plasma levels were maintained normal. For a 25% reduction, steady-state TSH changed 300% (from 1.5 to 6 mU/L) compared with <25% for both T4 and T3 (both within their reference ranges). Stability: TSH, T4, and T3 remained within normal ranges for most potency decay scenarios, but tablets of the same dose strength and brand were not bioequivalent between lots and between fresh and near-expired tablets. Conclusions A

  10. A hybrid path-oriented code assignment CDMA-based MAC protocol for underwater acoustic sensor networks.

    Science.gov (United States)

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-11-04

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  11. A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huifang Chen

    2013-11-01

    Full Text Available Due to the characteristics of underwater acoustic channel, media access control (MAC protocols designed for underwater acoustic sensor networks (UWASNs are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA CDMA MAC (POCA-CDMA-MAC, is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA or receiver-oriented code assignment (ROCA. Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  12. A combined enrichment/polymerase chain reaction based method for the routine screening of Streptococcus agalactiae in pregnant women

    Directory of Open Access Journals (Sweden)

    F.M. Munari

    2012-03-01

    Full Text Available Group B Streptococcus (GBS is the most common cause of life-threatening infection in neonates. Guidelines from CDC recommend universal screening of pregnant women for rectovaginal GBS colonization. The objective of this study was to compare the performance of a combined enrichment/PCR based method targeting the atr gene in relation to culture using enrichment with selective broth medium (standard method to identify the presence of GBS in pregnant women. Rectovaginal GBS samples from women at ≥36 weeks of pregnancy were obtained with a swab and analyzed by the two methods. A total of 89 samples were evaluated. The prevalence of positive results for GBS detection was considerable higher when assessed by the combined enrichment/PCR method than with the standard method (35.9% versus 22.5%, respectively. The results demonstrated that the use of selective enrichment broth followed by PCR targeting the atr gene is a highly sensitive, specific and accurate test for GBS screening in pregnant women, allowing the detection of the bacteria even in lightly colonized patients. This PCR methodology may provide a useful diagnostic tool for GBS detection and contributes for a more accurate and effective intrapartum antibiotic and lower newborn mortality and morbidity.

  13. A novel hypothesis-unbiased method for Gene Ontology enrichment based on transcriptome data

    Science.gov (United States)

    Fruzangohar, Mario; Ebrahimie, Esmaeil; Adelson, David L.

    2017-01-01

    Gene Ontology (GO) classification of statistically significantly differentially expressed genes is commonly used to interpret transcriptomics data as a part of functional genomic analysis. In this approach, all significantly expressed genes contribute equally to the final GO classification regardless of their actual expression levels. Gene expression levels can significantly affect protein production and hence should be reflected in GO term enrichment. Genes with low expression levels can also participate in GO term enrichment through cumulative effects. In this report, we have introduced a new GO enrichment method that is suitable for multiple samples and time series experiments that uses a statistical outlier test to detect GO categories with special patterns of variation that can potentially identify candidate biological mechanisms. To demonstrate the value of our approach, we have performed two case studies. Whole transcriptome expression profiles of Salmonella enteritidis and Alzheimer’s disease (AD) were analysed in order to determine GO term enrichment across the entire transcriptome instead of a subset of differentially expressed genes used in traditional GO analysis. Our result highlights the key role of inflammation related functional groups in AD pathology as granulocyte colony-stimulating factor receptor binding, neuromedin U binding, and interleukin were remarkably upregulated in AD brain when all using all of the gene expression data in the transcriptome. Mitochondrial components and the molybdopterin synthase complex were identified as potential key cellular components involved in AD pathology. PMID:28199395

  14. twzPEA: A Topology and Working Zone Based Pathway Enrichment Analysis Framework

    Science.gov (United States)

    Sensitive detection of involvement and adaptation of key signaling, regulatory, and metabolic pathways holds the key to deciphering molecular mechanisms such as those in the biomass-to-biofuel conversion process in yeast. Typical gene set enrichment analyses often do not use topology information in...

  15. Highly specific purification of N-glycans using phosphate-based derivatization as an affinity tag in combination with Ti{sup 4+}-SPE enrichment for mass spectrometric analysis

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Ying [Shanghai Cancer Center and Institutes of Biomedical Sciences, Fudan University, Shanghai 200032 (China); Key Laboratory of Glycoconjugates Research Ministry of Public Health, Fudan University, Shanghai 200032 (China); Peng, Ye; Bin, Zhichao [Department of Chemistry, Fudan University, Shanghai 200032 (China); Wang, Huijie [Shanghai Cancer Center and Institutes of Biomedical Sciences, Fudan University, Shanghai 200032 (China); Lu, Haojie, E-mail: luhaojie@fudan.edu.cn [Shanghai Cancer Center and Institutes of Biomedical Sciences, Fudan University, Shanghai 200032 (China); Department of Chemistry, Fudan University, Shanghai 200032 (China); Key Laboratory of Glycoconjugates Research Ministry of Public Health, Fudan University, Shanghai 200032 (China)

    2016-08-31

    N-linked protein glycosylation is involved in regulation of a wide variety of cellular processes and associated with numerous diseases. Highly specific identification of N-glycome remains a challenge while its biological significance is acknowledged. The relatively low abundance of glycan in complex biological mixtures, lack of basic sites for protonation, and suppression by other highly abundant proteins/peptides lead to the particularly poor detection sensitivity of N-glycans in the MS analysis. Therefore, the highly specific purification procedure becomes a crucial step prior to MS analysis of the N-glycome. Herein, a novel N-glycans enrichment approach based on phosphate derivatization combined with Ti{sup 4+}-SPE (solid phase extraction) was developed. Briefly, in this strategy, N-glycans were chemically labeled with a phospho-group at their reducing ends, such that the Ti{sup 4+}-SPE microspheres were able to capture the phospho-containing glycans. The enrichment method was developed and optimized using model oligosaccharides (maltoheptaose DP7 and sialylated glycan A1) and also glycans from a standard glycoprotein (asialofetuin, ASF). This method experimentally showed high derivatization efficiency (almost 100%), excellent selectivity (analyzing DP7 in the digests of bovine serum albumin at a mass ratio of 1:100), high enriching recovery (90%), good reproducibility (CV<15%) as well as high sensitivity (LOD at fmol level). At last, the proposed method was successfully applied in the profiling of N-glycome in human serum, in which a total of 31 N-glycan masses were identified. - Graphical abstract: A selective enrichment method for the N-glycome is reported. N-glycans were chemically labeled with a phosphate derivatization reagent (AMS), then the phospho-containing glycans were enriched using Ti{sup 4+}-microspheres. - Highlights: • A highly specific N-glycans purification method based on phosphate derivatization combined with Ti{sup 4+}-SPE was developed

  16. Fluorescence in situ hybridization-flow cytometry-cell sorting-based method for separation and enrichment of type I and type II methanotroph populations.

    Science.gov (United States)

    Kalyuzhnaya, Marina G; Zabinsky, Rebecca; Bowerman, Sarah; Baker, David R; Lidstrom, Mary E; Chistoserdova, Ludmila

    2006-06-01

    A fluorescence in situ hybridization-flow cytometry (FISH/FC)-based method was optimized using artificial mixtures of pure cultures of methanotrophic bacteria. Traditional oligonucleotide probes targeting 16S rRNAs of type I (MG84/705 probe) and type II (MA450 probe) methanotrophs were labeled with fluorescein or Alexa fluor and used for FISH, followed by fluorescence-activated FC analysis and cell sorting (FACS). The method resulted in efficient separation of target cells (type I or type II methanotrophs) from the artificial mixtures. The method was then applied for detection and enrichment of type I and type II methanotroph populations from a natural sample, Lake Washington sediment. Cells were extracted from the sediment, fixed, and subjected to FISH/FC/FACS. The resulting subpopulations were analyzed by reverse transcriptase PCR surveys of 16S rRNA, pmoA (encoding a subunit of particulate methane monooxygenase), and fae (encoding formaldehyde-activating enzyme) genes. The functional gene analysis indicated specific separation of the type I and type II methanotroph populations. 16S rRNA gene analysis revealed that type I methanotrophs comprised 59% of the subpopulation separated using the type I-specific probe and that type II methanotrophs comprised 47.5% of the subpopulation separated using the type II-specific probe. Our data indicate that the FISH/FC/FACS protocol described can provide significant enrichment of microbial populations of interest from complex natural communities and that these can be used for genetic tests. We further tested the possibility of direct whole-genome amplification (WGA) from limited numbers of sorted cells, using artificial mixtures of microbes whose genome sequences are known. We demonstrated that efficient WGA can be achieved using 10(4) or more cells separated by 16S rRNA-specific FISH/FC/FACS, while fewer cells resulted in less specific WGA.

  17. A Hybrid Routing Algorithm Based on Ant Colony and ZHLS Routing Protocol for MANET

    Science.gov (United States)

    Rafsanjani, Marjan Kuchaki; Asadinia, Sanaz; Pakzad, Farzaneh

    Mobile Ad hoc networks (MANETs) require dynamic routing schemes for adequate performance. This paper, presents a new routing algorithm for MANETs, which combines the idea of ant colony optimization with Zone-based Hierarchical Link State (ZHLS) protocol. Ant colony optimization (ACO) is a class of Swarm Intelligence (SI) algorithms. SI is the local interaction of many simple agents to achieve a global goal. SI is based on social insect for solving different types of problems. ACO algorithm uses mobile agents called ants to explore network. Ants help to find paths between two nodes in the network. Our algorithm is based on ants jump from one zone to the next zones which contains of the proactive routing within a zone and reactive routing between the zones. Our proposed algorithm improves the performance of the network such as delay, packet delivery ratio and overhead than traditional routing algorithms.

  18. Weighted Feature Significance: A Simple, Interpretable Model of Compound Toxicity Based on the Statistical Enrichment of Structural Features

    OpenAIRE

    Huang, Ruili; Southall, Noel; Xia, Menghang; Cho, Ming-Hsuang; Jadhav, Ajit; Nguyen, Dac-Trung; Inglese, James; Tice, Raymond R.; Austin, Christopher P.

    2009-01-01

    In support of the U.S. Tox21 program, we have developed a simple and chemically intuitive model we call weighted feature significance (WFS) to predict the toxicological activity of compounds, based on the statistical enrichment of structural features in toxic compounds. We trained and tested the model on the following: (1) data from quantitative high–throughput screening cytotoxicity and caspase activation assays conducted at the National Institutes of Health Chemical Genomics Center, (2) dat...

  19. Assessment of High and Low Rate Protocol-based Attacks on Ethernet Networks

    Directory of Open Access Journals (Sweden)

    Mina Malekzadeh

    2015-07-01

    Full Text Available The Internet and Web have significantly transformed the world’s communication system. The capability of the Internet to instantly access information at anytime from anywhere has brought benefit for a wide variety of areas including business, government, education, institutions, medical, and entertainment services. However, the Internet has also opened up the possibilities for hackers to exploit flaws and limitations in the target networks to attack and break in without gaining physical access to the target systems. The OSI layer protocol-based attacks are among them. In this work we investigate feasibility as well as severity of the attacks against three common layering protocols including TCP, UDP, and ICMP on Ethernet-based networks in the real world through a testbed. Then a simulation environment is designed to implement the exact same attacks under similar conditions using NS2 network simulator. The testbed results and simulation results are compared with each other to explore the accuracy of the findings and measure the damages the attacks caused to the network.

  20. ERROR COUNTER-BASED NEGATIVE ACKNOWLEDGEMENT MODE IN CCSDS FILE DELIVERY PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    Xiao Shijie; Yang Mingchuan; Guo Qing

    2011-01-01

    Deep space communication has its own features such as long propagation delays,heavy noise,asymmetric link rates,and intermittent connectivity in space,therefore TCP/IP protocol cannot perform as well as it does in terrestrial communications.Accordingly,the Consultative Committee for Space Data Systems (CCSDS) developed CCSDS File Delivery Protocol (CFDP),which sets standards of efficient file delivery service capable of transferring files to and from mass memory located in the space segment.In CFDP,four optional acknowledge modes are supported to make the communication more reliable.In this paper,we gave a general introduction of typical communication process in CFDP and analysis of its four Negative Acknowledgement (NAK) modes on the respect of file delivery delay and times of retransmission.We found out that despite the shortest file delivery delay,immediate NAK mode suffers from the problem that frequent retransmission may probably lead to network congestion.Thus,we proposed a new mode,the error counter-based NAK mode.By simulation of the case focused on the link between a deep space probe on Mars and a terrestrial station on Earth,we concluded that error counter-based NAK mode has successfully reduced the retransmission times at negligible cost of certain amount of file delivery delay.

  1. A Cluster Based Routing Protocol in Wireless Sensor Network for Energy Consumption

    Directory of Open Access Journals (Sweden)

    M.Shanthi

    2014-01-01

    Full Text Available Wireless sensor network (WSN is a new and fast advancing technology, which is opening up many opportunities in the field of remote sensing and data monitoring. Even though the advances in embedded systems, the energy consumption is still open issue in WSNs. Recently there has been growing interest in the applications of sensor networks. The radio transmission and reception consumes a lot of energy, one of the important issues in wireless sensor network is the inherent limited battery power within network sensor nodes. Since sensors are generally constrained in on-board energy supply, efficient management of the network is crucial in extending the life of the sensor. In addition to maximizing the lifespan of sensor nodes, it is preferable to distribute the energy dissipated throughout the wireless sensor network in order to maximize overall network performance. In this paper, the focus is mainly driven over the survey of the hierarchical cluster-based available routings in Wireless Sensor Network for energy consumption. Low-Energy Adaptive Clustering Hierarchy (LEACH protocol is one of the best hierarchical protocols utilizing the probabilistic model to manage the energy consumption of WSN. Simulation results, shows the energy consumption over time of three nodes with distance to the Base Station.

  2. A Semantics-Based Approachfor Achieving Self Fault-Tolerance of Protocols

    Institute of Scientific and Technical Information of China (English)

    李腊元; 李春林

    2000-01-01

    The cooperation of different processes may be lost by mistake when a protocol is executed. The protocol cannot be normally operated under this condition. In this paper, the self fault-tolerance of protocols is discussed, and a semanticsbased approach for achieving self fault-tolerance of protocols is presented. Some main characteristics of self fault-tolerance of protocols concerning liveness, nontermination and infinity are also presented. Meanwhile, the sufficient and necessary conditions for achieving self fault-tolerance of protocols are given. Finally, a typical protocol that does not satisfy the self fault-tolerance is investigated, and a new redesign version of this existing protocol using the proposed approach is given.

  3. 一种基于RSL的协议形式化描述技术的研究%Research on Formal Description Techniques of Protocols Based on RSL

    Institute of Scientific and Technical Information of China (English)

    赵静; 屈玉贵; 赵保华

    2003-01-01

    This paper presents a formal technique of protocols based on RSL,which can efficiently connect the formaldescription ,validation,implementation and testing of protocols. It mainly discusses the formal description of protocolsbased on RSL,and also provides an algorithm about this. Finally,taking the protocol AB as an example,a formal de-scription based on RSL is given.

  4. Power Management Based Grid Routing Protocol for IEEE 802.11 Based MANET

    Institute of Scientific and Technical Information of China (English)

    XU Li; ZHENG Bao-yu; YANG Zhen

    2004-01-01

    MANET ( Mobile Ad Hoc Network ) is a collection of wireless mobile nodes forming a temporary communication network without the aid of any established infrastructure or centralized administration. The lifetime of a MANET depends on the battery resources of the mobile nodes. So energy consumption may one of important design criterions for MANET. With changing the idle model to sleep model in the grid environment, this paper proposes a new energy-aware routing protocol. Performance simulation results show that the proposed strategy can dynamic balance the traffic load inside the whole network, extend the lifetime of a MANET, and without decreasing the throughput ratio.

  5. A Survey of RFID Authentication Protocols Based on Hash-Chain Method

    CERN Document Server

    Syamsuddin, Irfan; Chang, Elizabeth; Han, Song; 10.1109/ICCIT.2008.314

    2010-01-01

    Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article is a survey to closely observe those protocols in terms of its focus and limitations.

  6. Kernel-Based Semantic Relation Detection and Classification via Enriched Parse Tree Structure

    Institute of Scientific and Technical Information of China (English)

    Guo-Dong Zhou; Qiao-Ming Zhu

    2011-01-01

    This paper proposes a tree kernel method of semantic relation detection and classification (RDC) between named entities. It resolves two critical problems in previous tree kernel methods of RDC. First, a new tree kernel is presented to better capture the inherent structural information in a parse tree by enabling the standard convolution tree kernel with context-sensitiveness and approximate matching of sub-trees. Second, an enriched parse tree structure is proposed to well derive necessary structural information, e.g., proper latent annotations, from a parse tree. Evaluation on the ACE RDC corpora shows that both the new tree kernel and the enriched parse tree structure contribute significantly to RDC and our tree kernel method much outperforms the state-of-the-art ones.

  7. Recent developments of nanoparticle-based enrichment methods for mass spectrometric analysis in proteomics

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    In proteome research, rapid and effective separation strategies are essential for successful protein identification due to the broad dynamic range of proteins in biological samples. Some important proteins are often expressed in ultra low abundance, thus making the pre-concentration procedure before mass spectrometric analysis prerequisite. The main purpose of enrichment is to isolate target molecules from complex mixtures to reduce sample complexity and facilitate the subsequent analyzing steps. The introduction of nanoparticles into this field has accelerated the development of enrichment methods. In this review, we mainly focus on recent developments of using different nanomaterials for pre-concentration of low-abundance peptides/ proteins, including those containing post-translational modifications, such as phosphorylation and glycosylation, prior to mass spectrometric analysis.

  8. A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE 802.15.4

    OpenAIRE

    2009-01-01

    Recently, wireless network industry for the ubiquitous generation is growing quickly. Especially, IEEE 802.15.4 is one of special issues of the networking technology for sensor network. Then, many researchers are studying it for enhanced performance. But many researchers are not focusing on developing routing protocol. So we had proposed improved AODV routing protocol in previous research. But it had studied about performance analysis based on IEEE 802.11. In this paper, we proposed improved ...

  9. Evaluation of reverse transcription-PCR protocols based on the fusion gene for diagnosis of bovine respiratory syncytial virus infections

    OpenAIRE

    Selim A.; Gaede W.

    2013-01-01

    Bovine respiratory syncytial virus (BRSV) is a pneumovirus in the family paramyxoviridae, is an important cause of acute respiratory disease in postweaning calves and feedlot cattle. The real-time reverse transcriptase PCR protocols were developed to detect BRSV infection in infected animals. The sensitivity of RT-PCR protocols based on fusion gene were evaluated using different Mastermixes such as Qiagen One Step RT-PCR (Qiagen) for conventional RT-PCR, Su...

  10. multi-protocol dimming System Based on ARM Technology%基于ARM技术的多协议调光系统

    Institute of Scientific and Technical Information of China (English)

    李南安; 梁芳芳

    2012-01-01

    In order to meet the dimming system networked and multi-protocol trends,and some suggestions of multi-protocol dimming System based on the ARM technology were put forward.Used the embedded Linux operating system and industrial ARM9 development platform,through designing the realized system,the equipment demand of dimming market was realized effectively,it enriched the corporate products and the product adaptability was enhanced.%为了满足调光系统的网络化和多协议趋势,提出了一种基于ARM技术的多协议调光系统。采用嵌入式linux操作系统和工业化的工业级ARM9开发平台。所设计实现的系统有效的实现了调光市场的设备需求,丰富了公司的产品和增强了产品适应性。

  11. Time-Based CSMA Protocol for Alleviating Collision Problem in RFID System

    Directory of Open Access Journals (Sweden)

    Poornima.R

    2013-04-01

    Full Text Available Radio Frequency Identification (RFID System admits rapid identification of entities by itself in the discipline of pervasive computing. RFID system comprises readers and tags. Readers arecommunicating with the tag by broadcasting RF signals. In existing RFID system channel assignment, tag identification and collision is a vital issue. Henceforth efforts are requisite to minimize these issues. This work evaluating the throughput of the RFID system by incorporating time into Carrier Sense Multiple Access (CSMA protocol. Time based CSMA (TCSMA depends on CSMA below low contention and TDMA below high contention in RFID system. The performance can be measured by Mat lab simulator. Time Based CSMA improves the tag read rate and also reduces the collision problem when compared to the conventional algorithm.

  12. Quantum Chemical-Based Protocol for the Rational Design of Covalent Inhibitors.

    Science.gov (United States)

    Schirmeister, Tanja; Kesselring, Jochen; Jung, Sascha; Schneider, Thomas H; Weickert, Anastasia; Becker, Johannes; Lee, Wook; Bamberger, Denise; Wich, Peter R; Distler, Ute; Tenzer, Stefan; Johé, Patrick; Hellmich, Ute A; Engels, Bernd

    2016-07-13

    We propose a structure-based protocol for the development of customized covalent inhibitors. Starting from a known inhibitor, in the first and second steps appropriate substituents of the warhead are selected on the basis of quantum mechanical (QM) computations and hybrid approaches combining QM with molecular mechanics (QM/MM). In the third step the recognition unit is optimized using docking approaches for the noncovalent complex. These predictions are finally verified by QM/MM or molecular dynamic simulations. The applicability of our approach is successfully demonstrated by the design of reversible covalent vinylsulfone-based inhibitors for rhodesain. The examples show that our approach is sufficiently accurate to identify compounds with the desired properties but also to exclude nonpromising ones.

  13. A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation

    Institute of Scientific and Technical Information of China (English)

    LI Jian; SONG Dan-Jie; GUO Xiao-Jing; JING Bo

    2012-01-01

    In order to transmit secure messages,a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented.The five-particle cluster state is used to detect eavesdroppers,and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol.In the security analysis,the entropy theory method is introduced,and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced.If the eavesdroppers intend to obtain all the information,the detection rate of the original ping-pong protocol is 50%; the second protocol,using two particles of the Einstein-PodolskyRosen pair as detection particles,is also 50%; while the presented protocol is 89%.Finally,the security of the proposed protocol is discussed,and the analysis results indicate that the protocol in this paper is more secure than the other two.

  14. Improving the efficiency of single and multiple teleportation protocols based on the direct use of partially entangled states

    Energy Technology Data Exchange (ETDEWEB)

    Fortes, Raphael; Rigolin, Gustavo, E-mail: rigolin@ifi.unicamp.br

    2013-09-15

    We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The three techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols.

  15. Gene-Based Analysis of Regionally Enriched Cortical Genes in GWAS Data Sets of Cognitive Traits and Psychiatric Disorders

    DEFF Research Database (Denmark)

    Ersland, Kari M; Christoforou, Andrea; Stansberg, Christine;

    2012-01-01

    the regionally enriched cortical genes to mine a genome-wide association study (GWAS) of the Norwegian Cognitive NeuroGenetics (NCNG) sample of healthy adults for association to nine psychometric tests measures. In addition, we explored GWAS data sets for the serious psychiatric disorders schizophrenia (SCZ) (n......Despite its estimated high heritability, the genetic architecture leading to differences in cognitive performance remains poorly understood. Different cortical regions play important roles in normal cognitive functioning and impairment. Recently, we reported on sets of regionally enriched genes...... in three different cortical areas (frontomedial, temporal and occipital cortices) of the adult rat brain. It has been suggested that genes preferentially, or specifically, expressed in one region or organ reflect functional specialisation. Employing a gene-based approach to the analysis, we used...

  16. A Composed Protocol of Quantum Identity Authentication Plus Quantum Key Distribution Based on Squeezed States

    Institute of Scientific and Technical Information of China (English)

    张盛; 王剑; 唐朝京; 张权

    2011-01-01

    It is established that a single quantum cryptography protocol usually cooperates with other cryptographic systems, such as an authentication system, in the real world. However, few protocols have been proposed on how to combine two or more quantum protocols. To fill this gap, we propose a composed quantum protocol, containing both quantum identity authentication and quantum key distribution, using squeezed states. Hence, not only the identity can be verified, but also a new private key can be generated by our new protocol. We also analyze the security under an optimal attack, and the efficiency, which is defined by the threshold of the tolerant error rate, using Gaussian error function.

  17. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  18. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Institute of Scientific and Technical Information of China (English)

    谢琪; 胡斌; 陈克非; 刘文浩; 谭肖

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency.

  19. Sleeping Cluster based Medium Access Control Layer Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    T. R. Rangaswamy

    2012-01-01

    Full Text Available Wireless sensor networks play a vital role in remote area applications, where human intervention is not possible. In a Wireless Sensor Network (WSN each and every node is strictly an energy as well as bandwidth constrained one. Problem statement: In a standard WSN, most of the routing techniques, move data from multiple sources to a single fixed base station. Because of the greater number of computational tasks, the existing routing protocol did not address the energy efficient problem properly. In order to overcome the problem of energy consumption due to more number of computational tasks, a new method is developed. Approach: The proposed algorithm divides the sensing field into three active clusters and one sleeping cluster. The cluster head selection is based on the distance between the base station and the normal nodes. The Time Division Multiple Access (TDMA mechanism is used to make the cluster remain in the active state as well as the sleeping state. In an active cluster 50% of nodes will be made active and the remaining 50% be in sleep state. A sleeping cluster will be made active after a period of time and periodically changes its functionality. Results: Due to this periodic change of state, energy consumption is minimized. The performance of the Low Energy Adaptive and Clustering Hierarchy (LEACH algorithm is also analyzed, using a network simulator NS2 based on the number of Cluster Heads (CH, Energy consumption, Lifetime and the number of nodes alive. Conclusion: The simulation studies were carried out using a network simulation tool NS2, for the proposed method and this is compared with the performance of the existing protocol. The superiority of the proposed method is highlighted.

  20. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  1. A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states

    Science.gov (United States)

    Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Niu, Xin-Xin; Yang, Yi-Xian

    2015-05-01

    Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. Project supported by the National Natural Science Foundation of China (Grant Nos. 61303199, 61272514, 61170272, 61121061, and 61411146001), the Shandong Provincial Natural Science Foundation of China (Grant Nos. ZR2013FM025, ZR2013FQ001, and ZR2014FM003), the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China (Grant Nos. BS2013DX010 and BS2014DX007), the Program for New Century Excellent Talents in Universities, China (Grant No. NCET-13-0681), the National Development Foundation for Cryptological Research, China (Grant No. MMJJ201401012), the Fok Ying Tong Education Foundation, China (Grant No. 131067), and the Shandong Academy of Sciences Youth Fund Project, China (Grant No. 2013QN007).

  2. Minimum Expected Delay-Based Routing Protocol (MEDR for Delay Tolerant Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Haigang Gong

    2010-09-01

    Full Text Available It is a challenging work to develop efficient routing protocols for Delay Tolerant Mobile Sensor Networks (DTMSNs, which have several unique characteristics such as sensor mobility, intermittent connectivity, energy limit, and delay tolerability. In this paper, we propose a new routing protocol called Minimum Expected Delay-based Routing (MEDR tailored for DTMSNs. MEDR achieves a good routing performance by finding and using the connected paths formed dynamically by mobile sensors. In MEDR, each sensor maintains two important parameters: Minimum Expected Delay (MED and its expiration time. According to MED, messages will be delivered to the sensor that has at least a connected path with their hosting nodes, and has the shortest expected delay to communication directly with the sink node. Because of the changing network topology, the path is fragile and volatile, so we use the expiration time of MED to indicate the valid time of the path, and avoid wrong transmissions. Simulation results show that the proposed MEDR achieves a higher message delivery ratio with lower transmission overhead and data delivery delay than other DTMSN routing approaches.

  3. A routing protocol based on energy and link quality for Internet of Things applications.

    Science.gov (United States)

    Machado, Kássio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A F; Neto, Augusto; Souza, José Neuman de

    2013-02-04

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  4. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    Directory of Open Access Journals (Sweden)

    Antonio A. F. Loureiro

    2013-02-01

    Full Text Available The Internet of Things (IoT is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  5. Enhanced Direction Based Hazard Routing Protocol for Smooth Movement of Vehicles

    Directory of Open Access Journals (Sweden)

    Needhi Lathar

    2016-02-01

    Full Text Available Vehicular Ad hoc Network involves the movement of vehicles and the communication between them for their security. VANETs have many application areas. One of main applications of VANETs is to improve the driving safety. In various safety related applications, vehicular nodes constantly communicate with roadside equipments. Road Side Units (RSUs can sense the real time information about road conditions, animals straying and road blocks and passes all this hazardous related information to the vehicles approaching in its range. These alert messages enable the driver to take timely decisions in preventing from accidents or delays in information delivery. In this paper, Enhanced Direction based Hazard Routing Protocol and Ad Hoc On-demand Distance Vector protocols are used to avoid prevent vehicles from collision and to increase the coverage range of VANETs. These issues are resolved by bypass routing and a synchronized clock maintained with the RSUs respectively. To solve the issues and make the system more reliable we propose the roadside wireless sensor nodes along with vehicular nodes in the network. The RSUs are fixed at some distances and communicate with wireless sensors attached at vehicular nodes.

  6. Validation of a novel cognitive bias task based on difference in quantity of reinforcement for assessing environmental enrichment.

    Science.gov (United States)

    Keen, Heidi A; Nelson, O Lynne; Robbins, Charles T; Evans, Marc; Shepherdson, David J; Newberry, Ruth C

    2014-05-01

    Cognitive bias tasks purport to assess affective states via responses to ambiguous stimuli. We hypothesized that a novel cognitive bias task based on positive reinforcement using quantity differences would detect changes in affect in captive grizzly bears (Ursus arctos horribilis). We trained bears (n = 8) to respond differently (nose or paw touch) to two stimuli (light or dark gray cue cards), with responses counterbalanced across bears. The two cues signaled a small or large food reward, respectively. Responses to ambiguous probe stimuli (i.e., shades of gray) intermediate to the trained stimuli were classified as either 'optimistic,' appropriate for the larger reward, or 'pessimistic,' appropriate for the smaller reward. In Experiment 1, we explored the contrast in reward size necessary to detect a change in response across probe stimuli (large reward, 3 or 6 apple slices: small reward, 1 slice). We observed a change in response across probe stimuli, with no difference in response between reward-value groups, indicating that a contrast of 3:1 apple slices was sufficient to affect responses. In Experiment 2, we investigated cognitive bias after 2.1 h of exposure to enrichment items varying in attractiveness. Results were unaffected by enrichment type or time spent interacting with enrichments, indicating that the task failed to demonstrate criterion validity for comparing mood following exposure to different enrichment items. However, greater time spent pacing prior to testing was associated with 'optimistic' judgments. The data provide some support for use of cognitive bias tasks based on quantity differences in animal welfare assessments involving captive wildlife.

  7. L-Lactate-selective microbial sensor based on flavocytochrome b2-enriched yeast cells using recombinant and nanotechnology approaches.

    Science.gov (United States)

    Karkovska, Maria; Smutok, Oleh; Stasyuk, Nataliya; Gonchar, Mykhailo

    2015-11-01

    In the recent years, nanotechnology is the most developing branch due to a wide variety of potential applications in biomedical, biotechnological and agriculture fields. The binding nanoparticles with various biological molecules makes them attractive candidates for using in sensor technologies. The particularly actual is obtaining the bionanomembranes based on biocatalytic elements with improved sensing characteristics. The aim of this investigation is to study the properties of microbial L-lactate-selective sensor based on using the recombinant Hansenula polymorpha yeast cells overproducing flavocytochrome b2 (FC b2), as well as additionally enriched by the enzyme bound with gold nanoparticles (FC b2-nAu). Although, the high permeability of the living cells to nanoparticles is being intensively studied (mostly for delivery of drugs), the idea of using both recombinant technology and nanotechnology to increase the amount of the target enzyme in the biosensing layer is really novel. The FC b2-nAu-enriched living and permeabilized yeast cells were used for construction of a bioselective membrane of microbial L-lactate-selective amperometric biosensor. Phenazine methosulphate was served as a free defusing electron transfer mediator which provides effective electron transfer from the reduced enzyme to the electrode surface. It was shown that the output to L-lactate of FC b2-nAu-enriched permeabilized yeast cells is 2.5-fold higher when compared to the control cells. The obtained results confirm that additional enrichment of the recombinant yeast cell by the enzyme bound with nanoparticles improves the analytical parameters of microbial sensor.

  8. An Energy Efficient and Secure Clustering Protocol for Military based WSN

    Directory of Open Access Journals (Sweden)

    Prachi

    2017-01-01

    Full Text Available Less contiguous nature of military applications demands for surveillance of widespread areas that are indeed harder to monitor. Unlike traditional Wireless Sensor Networks (WSNs, a military based large size sensor network possesses unique requirements/challenges in terms of self-configuration, coverage, connectivity and energy dissipation. Taking this aspect into consideration, this paper proposes a novel, efficient and secure clustering method for military based applications. In any clustering based approach, one of the prime concerns is appropriate selection of Cluster Heads and formation of balanced clusters. This paper proposes and analyzes two schemes, Average Energy based Clustering (AEC and Threshold Energy based Clustering (TEC. In AEC, a node is elected as Cluster Head (CH if its residual energy is above the average energy of its cluster whereas in case of TEC, a node is elected as Cluster Head if its residual energy is above the threshold energy. Further, both AEC and TEC choose nodes as CHs if their distance lies within safety zone of the Base Station. In this paper, aim is to come up with a solution that not only conserves energy but balance load while electing safe nodes as CHs. The performance of proposed protocols was critically evaluated in terms of network lifetime, average residual energy of nodes and uniformity in energy dissipation of nodes. Results clearly demonstrated that AEC is successful in incorporating security whilst increasing overall lifetime of network, load balance and uniform energy dissipation.

  9. Direction based Hazard Routing Protocol (DHRP) for disseminating road hazard information using road side infrastructures in VANETs.

    Science.gov (United States)

    Berlin, M A; Anand, Sheila

    2014-01-01

    This paper presents Direction based Hazard Routing Protocol (DHRP) for disseminating information about fixed road hazards such as road blocks, tree fall, boulders on road, snow pile up, landslide, road maintenance work and other obstacles to the vehicles approaching the hazardous location. The proposed work focuses on dissemination of hazard messages on highways with sparse traffic. The vehicle coming across the hazard would report the presence of the hazard. It is proposed to use Road Side fixed infrastructure Units for reliable and timely delivery of hazard messages to vehicles. The vehicles can then take appropriate safety action to avoid the hazardous location. The proposed protocol has been implemented and tested using SUMO simulator to generate road traffic and NS 2.33 network simulator to analyze the performance of DHRP. The performance of the proposed protocol was also compared with simple flooding protocol and the results are presented.

  10. 基于Spi演算的安全协议验证%VERIFYING SECURITY PROTOCOLS BASED ON SPI CALCULUS

    Institute of Scientific and Technical Information of China (English)

    郑清雄

    2011-01-01

    在安全协议的各种验证方法中,进程代数方法依托完善的进程演算理论得到了很好的应用.Spi演算在PI演算的基础上扩充了密码操作原语来刻画安全协议,并使用测试等价验证安全属性.讨论了利用Spi演算进行验证的过程,并对经典NSSK协议进行分析.%Among several authentication methods for security protocols, process algebra approach which relies on a sound theory of concurrent process calculus has been well applied.The Spi calculus depicts security protocols as an extension of the pi calculus by enriching its cryptographic primitives, and uses testing equivalence to verify security properties.The process of authentication with Spi calculus is discussed in the paper, the analysis on classical NSSK protocol is carried out using this approach as well.

  11. Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment

    Directory of Open Access Journals (Sweden)

    Byunggil Lee

    2014-01-01

    Full Text Available International Association of Lighthouse Authorities (IALA is developing the standard intersystem VTS exchange format (IVEF protocol for exchange of navigation and vessel information between VTS systems and between VTS and vessels. VTS (vessel traffic system is an important marine traffic monitoring system which is designed to improve the safety and efficiency of navigation and the protection of the marine environment. And the demand of Inter-VTS networking has been increased for realization of e-Navigation as shore side collaboration for maritime safety. And IVEF (inter-VTS data exchange format for inter-VTS network has become a hot research topic of VTS system. Currently, the IVEF developed by the International Association of Lighthouse Authorities (IALA does not include any highly trusted certification technology for the connectors. The output of standardization is distributed as the IALA recommendation V-145, and the protocol is implemented with an open source. The IVEF open source, however, is the code used to check the functions of standard protocols. It is too slow to be used in the field and requires a large memory. And the vessel traffic information requires high security since it is highly protected by the countries. Therefore, this paper suggests the authentication protocol to increase the security of the VTS systems using the main certification server and IVEF.

  12. Deterministic Secure Quantum Communication and Authentication Protocol based on Extended GHZ-W State and Quantum One-time Pad

    Science.gov (United States)

    Li, Na; Li, Jian; Li, Lei-Lei; Wang, Zheng; Wang, Tao

    2016-08-01

    A deterministic secure quantum communication and authentication protocol based on extended GHZ-W state and quantum one-time pad is proposed. In the protocol, state | φ -> is used as the carrier. One photon of | φ -> state is sent to Alice, and Alice obtains a random key by measuring photons with bases determined by ID. The information of bases is secret to others except Alice and Bob. Extended GHZ-W states are used as decoy photons, the positions of which in information sequence are encoded with identity string ID of the legal user, and the eavesdropping detection rate reaches 81%. The eavesdropping detection based on extended GHZ-W state combines with authentication and the secret ID ensures the security of the protocol.

  13. Enrichment of steroid hormones in water with porous and hydrophobic polymer-based SPE followed by HPLC-UV determination.

    Science.gov (United States)

    Hu, Yinfen; Zhang, Man; Tong, Changlun; Wu, Jianmin; Liu, Weiping

    2013-10-01

    There have been great concerns about the persistence of steroid hormones in surface water. Since the concentrations of these compounds in water samples are usually at a trace level, the efficient enrichment of steroid hormones is vital for further analysis. In this work, a porous and hydrophobic polymer was synthesized and characterized. The composition of solvent used as porogen in the synthetic process was shown to have an effect on the morphology of the polymer, which was successfully used as an SPE sorbent for simultaneously enriching steroid hormones in surface water samples. The recoveries of the steroid hormones on the custom-made polymer ranged from 93.4 to 106.2%, whereas those on commercialized ENVI-18, LC-18, and Oasis HLB ranged from 54.8 to 104.9, 66 to 93.6, and 77.2 to 106%, respectively. Five types of steroid hormones were simultaneously measured using HPLC-UV after they were enriched by the custom-made sorbent. Based on these findings, the SPE-HPLC method was developed. The LODs of this method for estriol, estradiol, estrone, androstenedione, progesterone were 0.07, 0.43, 0.61, 0.27, and 0.42 μg/L, respectively, while precision and reproducibility RSDs were <6.40 and 7.49%, respectively.

  14. Potential seaweed-based food ingredients to inhibit lipid oxidation in fish-oil-enriched mayonnaise

    DEFF Research Database (Denmark)

    Honold, Philipp; Jacobsen, Charlotte; Jónsdóttir, Rósa

    2016-01-01

    and their partitioning between water and octanol. Additionally, the antioxidant activity of the extracts was evaluated in a fish-oil-enriched mayonnaise. Acetone and ethanol were found to extract the highest amount of phenolic compounds and carotenoids. Water used as extraction solvent, extracted some phenolic compounds...... but also higher amount of metals and chlorophyll derivates. It was proposed that extracts with high phenolic content and low iron content, such as the acetone and ethanol extract, would have the highest potential as antioxidants in foods. This was confirmed in the storage trial, where these extracts showed...

  15. Virtual Environment: assistance in nursing care for the deaf based on the protocol of Primary Care

    Directory of Open Access Journals (Sweden)

    Silvia Cristina Martini Rodrigues

    2014-08-01

    Full Text Available Objective: Presenting a Virtual Environment (VE based on the Protocol of Treatment of Hypertension and Diabetes Mellitus type 2, used in Primary Care for evaluation of dietary habits in nursing consultations. Method: An experimental study applied by two nurses and a nurse manager, in a sample of 30 deaf patients aged between 30 and 60 years. The environment was built in Visual Basic NET and offered eight screens about feeding containing food pictures, videos in Libras (Brazilian sign language and audio. The analysis of the VE was done through questionnaires applied to patients and professionals by the Poisson statistical test. Results: The VE shows the possible diagnostics in red, yellow, green and blue colors, depending on the degree of patients’ need. Conclusion: The environment obtained excellent acceptance by patients and nurses, allowing great interaction between them, even without an interpreter. The time in consultation was reduced to 15 minutes, with the preservation of patient privacy.

  16. Architecture Design and Experimental Platform Demonstration of Optical Network based on OpenFlow Protocol

    Science.gov (United States)

    Xing, Fangyuan; Wang, Honghuan; Yin, Hongxi; Li, Ming; Luo, Shenzi; Wu, Chenguang

    2016-02-01

    With the extensive application of cloud computing and data centres, as well as the constantly emerging services, the big data with the burst characteristic has brought huge challenges to optical networks. Consequently, the software defined optical network (SDON) that combines optical networks with software defined network (SDN), has attracted much attention. In this paper, an OpenFlow-enabled optical node employed in optical cross-connect (OXC) and reconfigurable optical add/drop multiplexer (ROADM), is proposed. An open source OpenFlow controller is extended on routing strategies. In addition, the experiment platform based on OpenFlow protocol for software defined optical network, is designed. The feasibility and availability of the OpenFlow-enabled optical nodes and the extended OpenFlow controller are validated by the connectivity test, protection switching and load balancing experiments in this test platform.

  17. Comprehensive Protocols for CRISPR/Cas9-based Gene Editing in Human Pluripotent Stem Cells.

    Science.gov (United States)

    Santos, David P; Kiskinis, Evangelos; Eggan, Kevin; Merkle, Florian T

    2016-08-17

    Genome editing of human pluripotent stem cells (hPSCs) with the CRISPR/Cas9 system has the potential to revolutionize hPSC-based disease modeling, drug screening, and transplantation therapy. Here, we aim to provide a single resource to enable groups, even those with limited experience with hPSC culture or the CRISPR/Cas9 system, to successfully perform genome editing. The methods are presented in detail and are supported by a theoretical framework to allow for the incorporation of inevitable improvements in the rapidly evolving gene-editing field. We describe protocols to generate hPSC lines with gene-specific knock-outs, small targeted mutations, or knock-in reporters. © 2016 by John Wiley & Sons, Inc.

  18. A Secure Time-Stamp Based Concurrency Control Protocol For Distributed Databases

    Directory of Open Access Journals (Sweden)

    Shashi Bhushan

    2007-01-01

    Full Text Available In distributed database systems the global database is partitioned into a collection of local databases stored at different sites. In this era of growing technology and fast communication media, security has an important role to play. In this paper we presented a secure concurrency control protocol (SCCP based on the timestamp ordering, which provides concurrency control and maintains security. We also implemented SCCP and a comparison of SCCP is presented in three cases (High, Medium and Low security levels. In this experiment, It is observed that throughput of the system decreases as the security level of the transaction increases, i.e., there is tradeoff between the security level and the throughput of the system.

  19. Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues

    CERN Document Server

    Headayetullah, Md; 10.5121/ijcsit.2010.2306

    2010-01-01

    Improved interoperability between public and private organizations is of key significance to make digital government newest triumphant. Digital Government interoperability, information sharing protocol and security are measured the key issue for achieving a refined stage of digital government. Flawless interoperability is essential to share the information between diverse and merely dispersed organisations in several network environments by using computer based tools. Digital government must ensure security for its information systems, including computers and networks for providing better service to the citizens. Governments around the world are increasingly revolving to information sharing and integration for solving problems in programs and policy areas. Evils of global worry such as syndrome discovery and manage, terror campaign, immigration and border control, prohibited drug trafficking, and more demand information sharing, harmonization and cooperation amid government agencies within a country and acros...

  20. User profile based proportional share scheduling and mac protocol for manets

    CERN Document Server

    Monisha, J Hannah; 10.5121/ijdps.2012.3123

    2012-01-01

    Quality of Service(QoS) in Mobile Ad Hoc Networks (MANETs) though a challenge, becomes a necessity because of its applications in critical scenarios. Providing QoS for users belonging to various profiles and playing different roles, becomes the need of the hour. In this paper, we propose proportional share scheduling and MAC protocol (PS2-MAC) model. It classifies users based on their profile as High Profiled users (HP), Medium Profiled users (MP) and Low profiled users (LP) and assigns proportional weights. Service Differentiation for these three service classes is achieved through, rationed dequeuing algorithm, variable inter frame space, proportionate prioritized backoff timers and enhanced RTS/CTS control packets. Differentiated services is simulated in ns2 and results show that 9.5% control overhead is reduced in our proposed scheme than the existing scheme and results also justify that, differentiated services have been achieved for the different profiles of users with proportionate shares and thereby r...

  1. Protocol for the prevention and management of complications related to ADM implant-based breast reconstructions

    Directory of Open Access Journals (Sweden)

    Citron, Isabelle

    2016-01-01

    Full Text Available Acellular dermal matrix (ADM implant-based reconstructions have transformed direct-to-implant breast reconstruction (DTI. But like all surgery, it is not deplete of complications such as seroma, infections and wound healing problems. These are cited with varying frequencies in the literature. With increased experience and through a series of measures instituted to minimize complications, we have been able to improve outcomes for our patients. We report our technical refinements for prevention of ADM reconstruction associated complications including patient selection, implant selection, drains, dressing and our post operative antibiotic regime. We also outline our protocol for the management of ADM associated complications including seroma, simple and complex infection and red breast syndrome, such that the sequelae of complications are minimized and patients achieve a better long-term outcome.

  2. An Energy Efficient Unequal Cluster Based Routing Protocol For WSN With Non-Uniform Node Distribution

    Directory of Open Access Journals (Sweden)

    Dhanoop K Dhanpal

    2015-05-01

    Full Text Available Abstract Clustering is an efficient method for increasing the lifetime of wireless sensor network systems. The current clustering algorithms generate clusters of almost equal size. This will cause hot spot problem in multi-hop sensor networks. In this paper an energy efficient varying sized clustering algorithm EEVSCA and routing protocol are introduced for non-uniform node distributed wireless sensor network system. EEVSCA helps for the construction of clusters of varying size at the same time unequal cluster based routing algorithm forces each cluster head to choose node with higher energy as their next hop. The unequal size of clusters can balance the energy consumption among clusters. Theoretical analysis and simulation results show that EECSVA balance energy consumption well among the cluster heads and increase the network lifetime effectively.

  3. Reliable beacon transmission based MAC protocol for LR-WPANs over WLAN interferences

    Institute of Scientific and Technical Information of China (English)

    Ji-Hoon PARK; Byung-Seo KIM

    2014-01-01

    The use of IEEE 802.15.4 standard based application systems has been rapidly increasing, for example, in medical services, sensor networks, public safety systems, and home automation systems. However, issues arise from the fact that IEEE 802.15.4 standard based low rate wireless personal area networks (LR-WPANs) use the same frequency bands as wireless local area networks (WLANs), and they interfere with each other. Based on past research on this issue, the interference has a more serious impact on LR-WPANs’ performance than on WLANs’ performance. In this paper we propose a method to improve LR-WPANs’ performance while coexisting with WLANs, which is called the reliable beacon transmission based medium access control (MAC) protocol. Since the reliability of a beacon frame is important, in this method, only the beacon frame is transmitted in interference-free channels, and the data packets are transmitted in interfered channels instead of abandoning the channels altogether. This method increases the reliability of beacon frames as well as overall channel utilizations. The effectiveness of the proposed method was evaluated through extensive simulations, and this paper proves that this method improves the performance of IEEE 802.15.4 based wireless sensor networks (WSNs) over WLANs’ interferences.

  4. Interprofessional primary care protocols: a strategy to promote an evidence-based approach to teamwork and the delivery of care.

    Science.gov (United States)

    Goldman, Joanne; Meuser, Jamie; Lawrie, Lynne; Rogers, Jess; Reeves, Scott

    2010-11-01

    Primary care reform involving interprofessional team-based care is a global phenomenon. In Ontario, Canada, 150 Family Health Teams (FHTs) have been approved in the past few years. The transition to a FHT is complex involving many changes and the processes for collaborative teamwork are not clearly delineated. To support the transition to team-based care in FHTs, a project was undertaken to develop and implement a series of interprofessional protocols in four clinical areas. These interprofessional protocols would contain relevant and evidence-based resources to support both a team and evidence-based approach to care. This paper reports on a qualitative study to examine the process of interprofessional protocol development and pilot implementation. Adopting an exploratory case study approach (Robson, 2002 ), 36 interviews were conducted with health professionals and community group members who participated in the creation and piloting of the protocols, and with project managers. In addition, observational and documentary data were gathered on the protocol development and implementation processes. The findings from the protocol development stage demonstrate the value of the focus on evidence and team, the process of assessing and targeting FHT needs, inter-organizational and interprofessional sharing, the importance of facilitation and support, and expectations for implementation. The findings from the pilot implementation stage report on the importance of champions and leaders, the implementation strategies used, FHT and organizational factors affecting implementation, and outcomes achieved. Findings are discussed in relation to the knowledge translation and interprofessional literature. Research is ongoing to examine the effectiveness of dissemination of the protocols to FHTs across the province of Ontario and its impact on health care outcomes.

  5. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

    Science.gov (United States)

    Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram

    2017-04-01

    Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.

  6. Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks

    CERN Document Server

    Ahvar, Ehsan; Piran, Mohammad Jalil

    2011-01-01

    Many energy-aware routing protocols have been proposed for wireless sensor networks. Most of them are only energy savers and do not take care about energy balancing. The energy saver protocols try to decrease the energy consumption of the network as a whole; however the energy manager protocols balance the energy consumption in the network to avoid network partitioning. This means that energy saver protocols are not necessarily energy balancing and vice versa. However, the lifetime of wireless sensor network is strictly depending on energy consumption; therefore, energy management is an essential task to be considered. This paper proposes an energy aware routing protocol, named FEAR, which considers energy balancing and energy saving. It finds a fair trade-off between energy balancing and energy saving by fuzzy set concept. FEAR routing protocol is simulated and evaluated by Glomosim simulator.

  7. AR-RBFS: Aware-Routing Protocol Based on Recursive Best-First Search Algorithm for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farzad Kiani

    2016-01-01

    Full Text Available Energy issue is one of the most important problems in wireless sensor networks. They consist of low-power sensor nodes and a few base station nodes. They must be adaptive and efficient in data transmission to sink in various areas. This paper proposes an aware-routing protocol based on clustering and recursive search approaches. The paper focuses on the energy efficiency issue with various measures such as prolonging network lifetime along with reducing energy consumption in the sensor nodes and increasing the system reliability. Our proposed protocol consists of two phases. In the first phase (network development phase, the sensors are placed into virtual layers. The second phase (data transmission is related to routes discovery and data transferring so it is based on virtual-based Classic-RBFS algorithm in the lake of energy problem environments but, in the nonchargeable environments, all nodes in each layer can be modeled as a random graph and then begin to be managed by the duty cycle method. Additionally, the protocol uses new topology control, data aggregation, and sleep/wake-up schemas for energy saving in the network. The simulation results show that the proposed protocol is optimal in the network lifetime and packet delivery parameters according to the present protocols.

  8. Towards a protocol for validating satellite-based Land Surface Temperature: Application to AATSR data

    Science.gov (United States)

    Ghent, Darren; Schneider, Philipp; Remedios, John

    2013-04-01

    Land surface temperature (LST) retrieval accuracy can be challenging as a result of emissivity variability and atmospheric effects. Surface emissivities can be highly variable owing to the heterogeneity of the land; a problem which is amplified in regions of high topographic variance or for larger viewing angles. Atmospheric effects caused by the presence of aerosols and by water vapour absorption can give a bias to the underlying LST. Combined, atmospheric effects and emissivity variability can result in retrieval errors of several degrees. If though these are appropriately handled satellite-derived LST products can be used to improve our ability to monitor and to understand land surface and climate change processes, such as desertification, urbanization, deforestation and land/atmosphere coupling. Here we present validation of an improved LST data record from the Advanced Along-Track Scanning Radiometer (AATSR) and illustrate the improvements in accuracy and precision compared with the standard ESA LST product. Validation is a critical part of developing any satellite product, although over the land heterogeneity ensures this is a challenging undertaking. A substantial amount of previous effort has gone into the area of structuring and standardizing calibration and validation approaches within the field of Earth Observation. However, no unified approach for accomplishing this for LST has yet to be practised by the LST community. Recent work has attempted to address this situation with the development of a protocol for validating LST (Schneider et al., 2012) under the auspices of ESA and the support of the wider LST community. We report here on a first application of this protocol to satellite LST data. The approach can briefly be summarised thus: in situ validation is performed where ground-based observations are available - being predominantly homogeneous sites; heterogeneous pixels are validated by way of established radiometric-based techniques (Wan and Li

  9. Base station MAC with APRMA protocol for broadband multimedia ATM in micro/pico-cellular mobile networks

    DEFF Research Database (Denmark)

    Le, Khanh Hoang; Nielsen, Søren Nørskov; Dittmann, Lars

    1998-01-01

    The concept for a wireless ATM access system that enables seamless mobile connectivity to the B-ISDN is presented. It is based on small, low cost and intelligent base stations running a medium access control (MAC) protocol using adaptive packet reservation multiple access (APRMA). Both the princi...

  10. A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme

    Science.gov (United States)

    Xu, Shu-Jiang; Chen, Xiu-Bo; Niu, Xin-Xin; Yang, Yi-Xian

    2013-05-01

    By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail.

  11. A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme

    Institute of Scientific and Technical Information of China (English)

    XU Shu-Jiang; CHEN Xiu-Bo; NIU Xin-Xin; YANG Yi-Xian

    2013-01-01

    By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol,we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information.On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent,a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security.The performance,including the imperceptibility,capacity and security of the proposed protocol are analyzed in detail.

  12. Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation

    DEFF Research Database (Denmark)

    Simonsen, Kent Inge; Kristensen, Lars Michael

    2014-01-01

    protocols. Furthermore, we perform formal verification of the CPN model prior to code generation, and test the implementation for interoperability against the Autobahn WebSocket test-suite resulting in 97% and 99% success rate for the client and server implementation, respectively. The tests show...... with pragmatic annotations for automated code generation of protocol software. The contribution of this paper is an application of the approach as implemented in the PetriCode tool to obtain protocol software implementing the IETF WebSocket protocol. This demonstrates the scalability of our approach to real...

  13. Cryptanalysis and Improvement for the Quantum Private Comparison Protocol Based on Triplet Entangled State and Single-Particle Measurement

    Science.gov (United States)

    Ting, Xu; Tian-Yu, Ye

    2017-03-01

    Quantum private comparison (QPC) aims to accomplish the equality comparison of secret inputs from two users on the basis of not leaking their contents out. Recently, Chen et al. proposed the QPC protocol based on triplet GHZ state and single-particle measurement (Optics Communications 283, 1561-1565 (2010)). In this paper, they suggested the standard model of a semi-honest third party (TP) for the first time, and declared that their protocol is secure. Subsequently, Lin et al. pointed out that in Chen et al.'s protocol, one user can extract the other user's secret without being discovered by performing the intercept-resend attack, and suggested two corresponding improvements (Optics Communications 284, 2412-2414 (2011)). However, Yang et al. first pointed out that the model of TP adopted by both Chen et al.'s protocol and Lin et al.'s improved protocols is unreasonable, and thought that a practical TP may also try any possible means to steal the users' secrets except being corrupted by the adversary including the dishonest user (Quantum Inf Process 12, 877-885 (2013). In this paper, after taking the possible attacks from TP into account, we propose the eavesdropping strategy of TP toward Lin et al.'s improved protocols and suggest two feasible solutions accordingly.

  14. Comparison of protocols for walking and running kinematics based on skin surface markers and rigid clusters of markers.

    Science.gov (United States)

    Miana, A N; Prudêncio, M V; Barros, R M L

    2009-11-01

    The purpose of this study was to compare the two main types of marker sets for human body representation based on rigid clusters of markers and skin surface markers for measuring kinematics during walking and running. Velocity, body segment, and joint angle were considered in the comparison of both protocols. Six male athletes were studied during treadmill gait at 1.4 and 5.5 m/s and recorded with 8 high speed video cameras. The subjects used simultaneously both protocols in the same walking and running cycles, in order to compare the variability in the determination of the joint centers' positions and the joint angles calculated from each protocol. The three-way ANOVA results showed that the variability of the inter-markers distance in the skin surface protocol was higher than that in the rigid clusters of markers, as reported in the literature. However, no statistical differences between the protocols were found in the variability of the determination of the joint centers' positions. Therefore no advantage was verified to rigid cluster protocols even for the upper body segments. Another conclusion is that increases in velocity produced increases in variability of the joint centers' distances and increases in the maximum differences between the joint angles.

  15. Resynchronization with unknown pregnancy status using progestin-based timed artificial insemination protocol in beef cattle.

    Science.gov (United States)

    Sá Filho, M F; Marques, M O; Girotto, R; Santos, F A; Sala, R V; Barbuio, J P; Baruselli, P S

    2014-01-15

    Two experiments were designed to evaluate the use of resynchronization (RESYNCH) protocols using a progestin-based timed artificial insemination (TAI) protocol in beef cattle. In experiment 1, 475 cyclic Nelore heifers were resynchronized 22 days after the first TAI using two different inducers of new follicular wave emergence (estradiol benzoate [EB; n = 241] or GnRH [n = 234]) with the insertion of a norgestomet ear implant. At ear implant removal (7 days later), a pregnancy test was performed, and nonpregnant heifers received a dose of prostaglandin plus 0.5 mg of estradiol cypionate, with a timed insemination 48 hours later. The pregnancy rate after the first TAI was similar (P = 0.97) between treatments (EB [41.9%] vs. GnRH [41.5%]). However, EB-treated heifers (49.3%) had a greater (P = 0.04) pregnancy per AI (P/AI) after the resynchronization than the GnRH-treated heifers (37.2%). In experiment 2, the pregnancy loss in 664 zebu females (344 nonlactating cows and 320 cyclic heifers) between 30 and 60 days after resynchronization was evaluated. Females were randomly assigned to one of two groups (RESYNCH 22 days after the first TAI [n = 317] or submitted only to natural mating [NM; n = 347]). Females from the NM group were maintained with bulls from 15 to 30 days after the first TAI. The RESYNC-treated females were resynchronized 22 days after the first TAI using 1 mg of EB on the first day of the resynchronization, similar to experiment 1. No difference was found in P/AI (NM [57.1%] vs. RESYNC [61.5%]; P = 0.32) or pregnancy loss (NM [2.0%] vs. RESYNC [4.1%]; P = 0.21) after the first TAI. Moreover, the overall P/AI after the RESYNCH protocol was 47.5%. Thus, the administration of 1 mg of EB on day 22 after the first TAI, when the pregnancy status was undetermined, promotes a higher P/AI in the resynchronized TAI than the use of GnRH. Also, the administration of 1 mg of EB 22 days after the TAI did not affect the preestablished pregnancy.

  16. Application of Condition-Based Monitoring Techniques for Remote Monitoring of a Simulated Gas Centrifuge Enrichment Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hooper, David A [ORNL; Henkel, James J [ORNL; Whitaker, Michael [ORNL

    2012-01-01

    This paper presents research into the adaptation of monitoring techniques from maintainability and reliability (M&R) engineering for remote unattended monitoring of gas centrifuge enrichment plants (GCEPs) for international safeguards. Two categories of techniques are discussed: the sequential probability ratio test (SPRT) for diagnostic monitoring, and sequential Monte Carlo (SMC or, more commonly, particle filtering ) for prognostic monitoring. Development and testing of the application of condition-based monitoring (CBM) techniques was performed on the Oak Ridge Mock Feed and Withdrawal (F&W) facility as a proof of principle. CBM techniques have been extensively developed for M&R assessment of physical processes, such as manufacturing and power plants. These techniques are normally used to locate and diagnose the effects of mechanical degradation of equipment to aid in planning of maintenance and repair cycles. In a safeguards environment, however, the goal is not to identify mechanical deterioration, but to detect and diagnose (and potentially predict) attempts to circumvent normal, declared facility operations, such as through protracted diversion of enriched material. The CBM techniques are first explained from the traditional perspective of maintenance and reliability engineering. The adaptation of CBM techniques to inspector monitoring is then discussed, focusing on the unique challenges of decision-based effects rather than equipment degradation effects. These techniques are then applied to the Oak Ridge Mock F&W facility a water-based physical simulation of a material feed and withdrawal process used at enrichment plants that is used to develop and test online monitoring techniques for fully information-driven safeguards of GCEPs. Advantages and limitations of the CBM approach to online monitoring are discussed, as well as the potential challenges of adapting CBM concepts to safeguards applications.

  17. Dynamic Subchannel Assignment-Based Cross-Layer MAC and Network Protocol for Multihop Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Khanh Nguyen Quang

    2013-01-01

    Full Text Available The paper presents a dynamic subchannel assignment algorithm based on orthogonal frequency division multiple access technology operating in the time division duplexing and a new cross-layer design based on a proposed routing protocol jointed with the MAC protocol. The proposed dynamic sub-channel assignment algorithm provides a new interference avoidance mechanism which solves several drawbacks of existing radio resource allocation techniques in wireless networks using OFDMA/TDD, such as the hidden node and exposed node problems, mobility, and cochannels interference in frequency (CCI. Besides, in wireless networks, when a route is established, the radio resource allocation problems may decrease the end to end performance proportionally with the length of each route. The contention at MAC layer may cause the routing protocol at network layer to respond by finding new routes and routing table updates. The proposed routing protocol is jointed with the MAC protocol based on dynamic sub-channel assignment to ensure that the quality of service in multihop ad hoc networks is significantly improved.

  18. Study of accent-based music speech protocol development for improving voice problems in stroke patients with mixed dysarthria.

    Science.gov (United States)

    Kim, Soo Ji; Jo, Uiri

    2013-01-01

    Based on the anatomical and functional commonality between singing and speech, various types of musical elements have been employed in music therapy research for speech rehabilitation. This study was to develop an accent-based music speech protocol to address voice problems of stroke patients with mixed dysarthria. Subjects were 6 stroke patients with mixed dysarthria and they received individual music therapy sessions. Each session was conducted for 30 minutes and 12 sessions including pre- and post-test were administered for each patient. For examining the protocol efficacy, the measures of maximum phonation time (MPT), fundamental frequency (F0), average intensity (dB), jitter, shimmer, noise to harmonics ratio (NHR), and diadochokinesis (DDK) were compared between pre and post-test and analyzed with a paired sample t-test. The results showed that the measures of MPT, F0, dB, and sequential motion rates (SMR) were significantly increased after administering the protocol. Also, there were statistically significant differences in the measures of shimmer, and alternating motion rates (AMR) of the syllable /K$\\inve$/ between pre- and post-test. The results indicated that the accent-based music speech protocol may improve speech motor coordination including respiration, phonation, articulation, resonance, and prosody of patients with dysarthria. This suggests the possibility of utilizing the music speech protocol to maximize immediate treatment effects in the course of a long-term treatment for patients with dysarthria.

  19. An Improved Location aided Cluster Based Routing Protocol with Intrusion Detection System in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S. Mangai

    2011-01-01

    Full Text Available Problem statement: Routing and security are the main challenges for ad hoc networks due to dynamic topology as well as resource constraints. A designed protocol must provide scalable routing with better security. Lack of any central coordination and shared wireless medium makes them more vulnerable to attacks than wired networks. And also resource constraints such as limited energy and size also play an important role in the protocols designed for security. Approach: In this study, Improved Location aided Cluster based Routing Protocol (ILCRP for GPS enabled MANETs was analysed in MANETs with malicious nodes and an Intrusion Detection System was used to increase the packet delivery ratio. ILCRP makes use of location aided routing in the presence of cluster based routing Protocol. Results: Use of location information with security against attacks results in high packet delivery ratio for the cluster based routing protocol. Simulations are performed using NS2 by varying the number of nodes. Conclusion: The results illustrate ILCRP provides higher delivery ratio with IDS.

  20. A reliable transmission protocol for ZigBee-based wireless patient monitoring.

    Science.gov (United States)

    Chen, Shyr-Kuen; Kao, Tsair; Chan, Chia-Tai; Huang, Chih-Ning; Chiang, Chih-Yen; Lai, Chin-Yu; Tung, Tse-Hua; Wang, Pi-Chung

    2012-01-01

    Patient monitoring systems are gaining their importance as the fast-growing global elderly population increases demands for caretaking. These systems use wireless technologies to transmit vital signs for medical evaluation. In a multihop ZigBee network, the existing systems usually use broadcast or multicast schemes to increase the reliability of signals transmission; however, both the schemes lead to significantly higher network traffic and end-to-end transmission delay. In this paper, we present a reliable transmission protocol based on anycast routing for wireless patient monitoring. Our scheme automatically selects the closest data receiver in an anycast group as a destination to reduce the transmission latency as well as the control overhead. The new protocol also shortens the latency of path recovery by initiating route recovery from the intermediate routers of the original path. On the basis of a reliable transmission scheme, we implement a ZigBee device for fall monitoring, which integrates fall detection, indoor positioning, and ECG monitoring. When the triaxial accelerometer of the device detects a fall, the current position of the patient is transmitted to an emergency center through a ZigBee network. In order to clarify the situation of the fallen patient, 4-s ECG signals are also transmitted. Our transmission scheme ensures the successful transmission of these critical messages. The experimental results show that our scheme is fast and reliable. We also demonstrate that our devices can seamlessly integrate with the next generation technology of wireless wide area network, worldwide interoperability for microwave access, to achieve real-time patient monitoring.

  1. Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations

    Science.gov (United States)

    Chamberlain, jim; Bradford, Bob; Best, Susan; Nichols, Kelvin

    2002-01-01

    Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to per orm scientific experiments on-board ISS. The deployment of reliable high-speed Internet Protocol (IP)-based networks promises to greatly enhance telescience capabilities. These networks are now being used to cost-effectively extend the reach of remote mission support systems. They reduce the need for dedicated leased lines and travel while improving distributed workgroup collaboration capabilities. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing mission voice communications system used by researchers at their remote sites. The Internet Voice Distribution System (IVoDS) connects remote researchers to mission support "loopsll or conferences via NASA networks and Internet 2. Researchers use NODS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the ;capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors & Technology, First Virtual Communications, Lockheed-Martin, and VoIP Group. NODS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is being performed in parallel with IVoDS deployment for a next-generation system to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data/application-sharing capabilities are being investigated. IVoDS technology is also being considered for mission support systems for programs such as Space Launch Initiative and Homeland Defense.

  2. Game-theory Model based on Carrier Sense Multiple Access Protocol in Wireless Network

    Directory of Open Access Journals (Sweden)

    Jun Tian

    2014-06-01

    Full Text Available In order to solve game-theory model problem based on carrier sense multiple access protocol with collision avoidance in wireless network, a game-theory-based general and compatible modeling process is proposed, where the transmission probability of a node in a slot time is regarded as mixed game and network performance parameter M is taken as revenue function of game so as to build M rounds non-cooperative mixed strategy game with N gamers. After performing M rounds game, it will acquire M Nash-equilibria which is not equal to each other, and then these Nash-equilibria are taken as the input of single objective programming model with many constraints so as to obtain compromise equilibria. Finally, a minimum contention window based on compromise equilibria is designed. The throughput and successful transmission rate are analyzed through the simulation, and the simulation experiment results show our proposed modeling process has the more throughputs and the lower drop performance than the existing methods.

  3. A Joint Beamforming based SDMA Protocol for IEEE 802.11n Downlink

    Directory of Open Access Journals (Sweden)

    Cheng Guo

    2015-09-01

    Full Text Available To support space division multiple access (SDMA in the IEEE 802.11n downlink, a joint beamforming based MAC protocol, J-MAC is presented in this paper. An access point (AP follows J-MAC, which employs multiple array antennas, and user equipments (UEs follow the IEEE 802.11x standard which employ omni-directional MIMO antennas. J-MAC maintains full compatibility with 802.11x, and UEs do not change any more. In J-MAC, firstly, the AP achieves the weight vector for the array antenna-based beamforming, and updates it periodically. Secondly, before transmitting any data-frame, the AP achieves the weight vector for the MIMO-based beamforming, which should be updated in each transmission. Finally, after getting the joint beamforming, the AP transmits its data-frames to multiple UEs simultaneously. Simulation results show that J-MAC can support the joint beamforming effectively and provide much higher network throughput, lower delay, jitter and packet-loss-rate than DCF does.

  4. E-APSAR:Enhanced Anonymous Position Based Security Aware Routing Protocol For Manets

    Directory of Open Access Journals (Sweden)

    Priyanka Malgi

    2014-03-01

    Full Text Available In the past few years, we have seen a rapid expansion in the field of mobile computing due to the pro- liferation of inexpensive, widely available wireless devices or networks.However, all these networks are conventional wireless networks as they require a fixed network infrastructure with cen- tralised administration for their operation, potentially consuming a lot of time and money for set-up and maintenance.Drawbacks of conventional wireless networks are driving a new alternative way for mobile communication, in which mobile devices form a selfcreating, self-organising and self-administering wireless network, called a mobile ad hoc network.In mobile ad-hoc networking (MANETs, nodes communicate to each other based on public identities. In this paper,for a position based routing[22] an innovative packet forwarding mechanism is proposed in which source node generates route request packet and broadcast packet to other neighbor nodes to locate destination by implementing black hole attack[8]. Proposed E-APSAR (Enhanced Anonymous Position Based security aware routing protocol is implemented on NS-2 and results shown significant improvement over original DSR in terms of various performance metrics. It has been found that on dense network certain numbers of malicious nodes are supportive to reducing communication overhead and because of density negative effect of malicious attacks which is proposed E-APSAR that is able to reduce. Hence result shows proposed E-APSAR will be helpful to decrease communication overhead.

  5. Hybrid CDN structure with a P2P based streaming protocol

    CERN Document Server

    Pushp, Saumay

    2010-01-01

    Over the last decade, internet has seen an exponential increase in its growth.With more and more people using it, efficient data delivery over the internet has become a key issue. Peer-to-peer (P2P)/seed sharing based networks have several desirable features for content distribution, such as low costs, scalability, and fault tolerance. While the invention of each of such specialized systems has improved the user experience, some fundamental shortcomings of these systems have often been neglected. These shortcomings of content distribution systems have become severe bottlenecks in scalability of the internet.In order to combine the desired features of classical Content Distribution Networks (CDNs) and P2P/seed sharing based networks, we propose a hybrid CDN structure with a P2P/seed sharing based streaming protocol in the access network . In this work, we focus on the problem of data redundancy (at each node) and show how severely it impacts the network economics and the experience of end-user and hence leads ...

  6. An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions

    Science.gov (United States)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    Secure channels can be realized by an authenticated key exchange (AKE) protocol that generates authenticated session keys between the involving parties. In [32], Shin et al., proposed a new kind of AKE (RSA-AKE) protocol whose goal is to provide high efficiency and security against leakage of stored secrets as much as possible. Let us consider more powerful attacks where an adversary completely controls the communications and the stored secrets (the latter is denoted by “replacement” attacks). In this paper, we first show that the RSA-AKE protocol [32] is no longer secure against such an adversary. The main contributions of this paper are as follows: (1) we propose an RSA-based leakage-resilient AKE (RSA-AKE2) protocol that is secure against active attacks as well as replacement attacks; (2) we prove that the RSA-AKE2 protocol is secure against replacement attacks based on the number theory results; (3) we show that it is provably secure in the random oracle model, by showing the reduction to the RSA one-wayness, under an extended model that covers active attacks and replacement attacks; (4) in terms of efficiency, the RSA-AKE2 protocol is comparable to [32] in the sense that the client needs to compute only one modular multiplication with pre-computation; and (5) we also discuss about extensions of the RSA-AKE2 protocol for several security properties (i.e., synchronization of stored secrets, privacy of client and solution to server compromise-impersonation attacks).

  7. Advantages of a TDMA based, energy-efficient, self-organizing MAC protocol for WSNs

    NARCIS (Netherlands)

    Hoesel, van L.F.W.; Nieberg, T.; Kip, H.J.; Havinga, P.J.M.

    2004-01-01

    The paper presents EMACs, a medium access protocol especially designed for wireless sensor networks. The medium access protocol consists of a fully distributed and self-organizing TDMA scheme, in which each active node periodically listens to the channel and broadcasts a short control message. This

  8. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten; Kobayashi, Naoki; Sun, Yunde

    2011-01-01

    Gordon and Jeffrey developed a type system for verification of asymmetric and symmetric cryptographic protocols. We propose a modified version of Gordon and Jeffrey's type system and develop a type inference algorithm for it, so that protocols can be verified automatically as they are, without any...

  9. Energy-Efficient Reservation-Based Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kohvakka Mikko

    2010-01-01

    Full Text Available In Wireless Sensor Networks (WSNs, a robust and energy-efficient Medium Access Control (MAC protocol is required for high energy efficiency in harsh operating conditions, where node and link failures are common. This paper presents the design of a novel MAC protocol for low-power WSNs. The developed MAC protocol minimizes the energy overhead of idle time and collisions by strict frame synchronization and slot reservation. It combines a dynamic bandwidth adjustment mechanism, multi-cluster-tree network topology, and a network channel allowing rapid and low-energy neighbor discoveries. The protocol achieves high scalability by employing frequency and time division between clusters. Performance analysis shows that the MAC protocol outperforms current state-of-the-art protocols in energy efficiency, and the energy overhead compared to an ideal MAC protocol is only 2.85% to 27.1%. The high energy efficiency is achieved in both leaf and router nodes. The models and the feasibility of the protocol were verified by simulations and with a full-scale prototype implementation.

  10. Energy efficient TDMA-based MAC protocol associated with GAF for wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    XIAO Xiao; ZHENG Bao-yu; YAN Zhen-ya; CHEN Chao

    2007-01-01

    The design of media access control (MAC) protocol for wireless sensor networks (WSNs) with the idea of cross layer attracts more and more attention. People can improve the MAC protocol by obtaining certain information regarding the network layer and physical layer. This article synthesizes and optimizes certain cross-layer protocols which have existed. On the basis of the routing, topology information in the network layer, and transmission power information in the physical layer, the time slot assignment algorithm has been improved in the MAC layer.By using geographical adaptive fidelity algorithm (GAF) to divide the grids, controlling of transmission power and scheduling the work/sleep duty cycle for sensor nodes, a new MAC protocol has been proposed to decrease energy consumption and enlarge the lifetime of WSNs. Simulation results show that the MAC protocol functions well.

  11. Analysis and Improvement of RFID Protocol Based on PUF%基于PUF的RFID协议分析与改进

    Institute of Scientific and Technical Information of China (English)

    马昌社; 王涛; 王立斌

    2011-01-01

    This paper analyses a low-cost RFID protocol based on Physical Unclonable Function(PUF). The protocol cannot guarantee the claimed privacy and is not scalable. Concretely, any adversary is able to trace the same tag by replaying the protocol messages and its computational complexity and communication overhead of identifying a tag are both linear to the number of tags. Furthermore, a new PUF based RFID protocol is proposed which beats down the protocol from both security and efficiency.%对一个基于PUF构造的低成本RFID安全协议进行分析,发现该协议不能保护标签的隐私性,即任何一个攻击者通过重放协议消息就可以跟踪同一个标签.并且由于识别标签的时间复杂度和通信复杂度都与标签个数呈线性关系,因此协议不具有扩展性.为此,提出一个改进的RFID协议,使得协议在效率和安全性两方面得到改善.

  12. A Gossip-based Energy Efficient Protocol for Robust In-network Aggregation in Wireless Sensor Networks

    Science.gov (United States)

    Fauji, Shantanu

    We consider the problem of energy efficient and fault tolerant in--network aggregation for wireless sensor networks (WSNs). In-network aggregation is the process of aggregation while collecting data from sensors to the base station. This process should be energy efficient due to the limited energy at the sensors and tolerant to the high failure rates common in sensor networks. Tree based in--network aggregation protocols, although energy efficient, are not robust to network failures. Multipath routing protocols are robust to failures to a certain degree but are not energy efficient due to the overhead in the maintenance of multiple paths. We propose a new protocol for in-network aggregation in WSNs, which is energy efficient, achieves high lifetime, and is robust to the changes in the network topology. Our protocol, gossip--based protocol for in-network aggregation (GPIA) is based on the spreading of information via gossip. GPIA is not only adaptive to failures and changes in the network topology, but is also energy efficient. Energy efficiency of GPIA comes from all the nodes being capable of selective message reception and detecting convergence of the aggregation early. We experimentally show that GPIA provides significant improvement over some other competitors like the Ridesharing, Synopsis Diffusion and the pure version of gossip. GPIA shows ten fold, five fold and two fold improvement over the pure gossip, the synopsis diffusion and Ridesharing protocols in terms of network lifetime, respectively. Further, GPIA retains gossip's robustness to failures and improves upon the accuracy of synopsis diffusion and Ridesharing.

  13. Cross-layer cluster-based energy-efficient protocol for wireless sensor networks.

    Science.gov (United States)

    Mammu, Aboobeker Sidhik Koyamparambil; Hernandez-Jayo, Unai; Sainz, Nekane; de la Iglesia, Idoia

    2015-04-09

    Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs). One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE) can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs) and a cluster head (CH). The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH) and hybrid energy-efficient distributed clustering (HEED).

  14. A CROSS-LAYERED PATH STABILITY BASED ROUTING PROTOCOL FOR WiMAX NETWORKS

    Directory of Open Access Journals (Sweden)

    M. Deva Priya

    2013-01-01

    Full Text Available In IEEE 802.16, a Subscriber Station (SS is battery powered with limited capacity. A SS can be made to operate for longer durations by deploying power saving features or by using relay stations. Multi-hop communication conserves power, but finding an optimal path to the destination is monotonous. Path stability indicates how stable a path is and how long it can support communication. Identifying stable paths helps in reducing the control traffic, number of connection disruptions and also in conserving power. In this study, Greedy Perimeter Stateless Routing (GPSR and Link-St Ability and Energy aware Routing (LAER designed for Mobile Ad hoc NET works (MANETs are implemented for WiMAX networks and their performance is evaluated. Further, a novel Cross-layered Path Stability based Routing protocol (CPSR is proposed to find a stable path based on Residual Energy (RE, Received Signal Strength Indicator (RSSI and Signal-to-Noise Ratio (SNR. The total energy consumed is minimized, thus maximizing the network lifetime.

  15. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  16. BIOTECHNOLOGY AS A USEFUL TOOL FOR NUTRITIONAL IMPROVEMENT OF CEREAL-BASED MATERIALS ENRICHED WITH POLYUNSATURATED FATTY ACIDS AND PIGMENTS

    Directory of Open Access Journals (Sweden)

    M. Čertík

    2008-09-01

    Full Text Available Cereals represent a major food supply for humanity. Although these sources are rich in proteins and carbohydrates, many of them are deficient in several essential nutrients, such as polyunsaturated fatty acids (PUFAs and carotenoid pigments. One possible approach how to enhance the content of PUFAs or carotenoids in cereal diet is based on biotechnological transformation of cereal materials by solid state fermentations. This technique is powerful tool for effective valorisation of these resources to various types of value-added bioproducts with demanded properties and functions. Selected filamentous Mucorales fungi were applied for conversion of numerous agroindustrial substrates to bioproducts enriched with PUFAs, such as gamma-linolenic acid (GLA, dihomo-gamma-linolenic acid (DGLA, arachidonic acid (AA and eicosapentaenoic acid (EPA. On the other hand, a range of yeast species utilizing agroindustrial substrates were employed for formation of carotenoids, such as β-carotene, torulene, torularhodine and astaxanthin. Such naturally prepared cereal based bioproducts enriched with either PUFAs or carotenoid pigments may be used as an inexpensive food and feed supplement. The work was supported by grant VEGA No. 1/0747/08 from the Grant Agency of Ministry of Education, Slovak Republic.

  17. Cluster Based Location-Aided Routing Protocol for Large Scale Mobile Ad Hoc Networks

    Science.gov (United States)

    Wang, Yi; Dong, Liang; Liang, Taotao; Yang, Xinyu; Zhang, Deyun

    Routing algorithms with low overhead, stable link and independence of the total number of nodes in the network are essential for the design and operation of the large-scale wireless mobile ad hoc networks (MANET). In this paper, we develop and analyze the Cluster Based Location-Aided Routing Protocol for MANET (C-LAR), a scalable and effective routing algorithm for MANET. C-LAR runs on top of an adaptive cluster cover of the MANET, which can be created and maintained using, for instance, the weight-based distributed algorithm. This algorithm takes into consideration the node degree, mobility, relative distance, battery power and link stability of mobile nodes. The hierarchical structure stabilizes the end-to-end communication paths and improves the networks' scalability such that the routing overhead does not become tremendous in large scale MANET. The clusterheads form a connected virtual backbone in the network, determine the network's topology and stability, and provide an efficient approach to minimizing the flooding traffic during route discovery and speeding up this process as well. Furthermore, it is fascinating and important to investigate how to control the total number of nodes participating in a routing establishment process so as to improve the network layer performance of MANET. C-LAR is to use geographical location information provided by Global Position System to assist routing. The location information of destination node is used to predict a smaller rectangle, isosceles triangle, or circle request zone, which is selected according to the relative location of the source and the destination, that covers the estimated region in which the destination may be located. Thus, instead of searching the route in the entire network blindly, C-LAR confines the route searching space into a much smaller estimated range. Simulation results have shown that C-LAR outperforms other protocols significantly in route set up time, routing overhead, mean delay and packet

  18. Reverse Query Tree approach to cope with Id distribution problem in Tree-based tag anti-collision protocols of RFID

    Directory of Open Access Journals (Sweden)

    Milad HajMirzaei

    2013-09-01

    Full Text Available Tag collision is one of the most important issues in RFID systems and many tag anti-collision protocols were proposed in literature. But some kind of these protocols like Tree-based protocols (specifically Query tree which its performance depends on tag id length and construction, have some issues like id distribution. In this paper we discuss about Query tree protocol which may influenced by id distribution. Then we propose a novel type of this protocol called Reverse Query tree to solve it.

  19. New Procedure to Obtain Polyphenol-Enriched Grapes Based on the Use of Chemical Elicitors.

    Science.gov (United States)

    Flores, Gema; Del Castillo, Maria Luisa Ruiz

    2016-09-01

    The effect of the postharvest treatment of methyl jasmonate enantiomers in conjunction with ethanol on bioformation of resveratrol and quercetin glycosides in grapes was evaluated. The antioxidant activity of treated grape extracts as compared with untreated extracts was also assayed. Exogenous (-)-methyl jasmonate in combination with ethanol induced a significant increase in the levels of resveratrol (from 27 to 39 μg g(-1)), quercetin-3-O-glucoside (from 59 to 136 μg g(-1)), quercetin-3-O-galactoside (from 398 to 807 μg g(-1)) and quercetin-3-O-rutinoside (from 23 to 43 μg g(-1)). (+)-Methyl jasmonate with ethanol also resulted in increase of quercetin-3-O-glucoside and quercetin-3-O-rutinoside. However, no (+)-methyl jasmonate effect was observed for resveratrol and quercetin-3-O-galactoside. Both (-)- and (+)-methyl jasmonate treatments provided with extracts with higher antioxidant activity. From the results found in the present work postharvest treatment with (-)-methyl jasmonate in conjunction with ethanol is proposed as a mean to obtain polyphenol-enriched grape extracts with improved antioxidant properties. The procedure here developed is proposed as a mean to obtain functional grapes. Extracts obtained from grapes treated with (-)-methyl jasmonate with ethanol can be particularly useful for industry due to their high antioxidant capacity.

  20. Development of functional milk desserts enriched with resistant starch based on consumers' perception.

    Science.gov (United States)

    Ares, Florencia; Arrarte, Eloísa; De León, Tania; Ares, Gastón; Gámbaro, Adriana

    2012-10-01

    Sensory characteristics play a key role in determining consumers' acceptance of functional foods. In this context, the aim of the present work was to apply a combination of sensory and consumer methodologies to the development of chocolate milk desserts enriched with resistant starch. Chocolate milk desserts containing modified waxy maize starch were formulated with six different concentrations of two types of resistant starch (which are part of insoluble dietary fiber). The desserts were evaluated by trained assessors using Quantitative Descriptive Analysis. Moreover, consumers scored their overall liking and willingness to purchase and answered an open-ended question. Resistant starch caused significant changes in the sensory characteristics of the desserts and a significant decrease in consumers' overall liking and willingness to purchase. Consumer data was analyzed applying survival analysis on overall liking scores, considering the risk on consumers liking and willing to purchase the functional products less than their regular counterparts. The proposed methodologies proved to be useful to develop functional foods taking into account consumers' perception, which could increase their success in the market.

  1. WIRELESS ADHOC MULTI ACCESS NETWORKS OPTIMIZATION USING OSPF ROUTING PROTOCOL BASED ON CISCO DEVICES

    Directory of Open Access Journals (Sweden)

    Mohamed E. Khedr

    2015-03-01

    Full Text Available One of the most attractive field for research for researchers and authors so the Wireless adhoc networks. So, this paper will describe the background and basic features of Open Short Path First (OSPF routing protocol due to multi-access networks. Explaining and practice on the OSPF configuration commands. Describe, modify and calculate the metric (Cost used by OSPF due to adhoc networks. Illustrating the Election parameters made by DR/BDR (Designated and Back Designated Routers used in multi-access wireless networks. This paper will use OSPF routing protocol because of its average administrative distance with all routing protocols.

  2. SCPS-TP, TCP, and Rate-Based Protocol Evaluation. Revised

    Science.gov (United States)

    Tran, Diepchi T.; Lawas-Grodek, Frances J.; Dimond, Robert P.; Ivancic, William D.

    2005-01-01

    Tests were performed at Glenn Research Center to compare the performance of the Space Communications Protocol Standard Transport Protocol (SCPS TP, otherwise known as "TCP Tranquility") relative to other variants of TCP and to determine the implementation maturity level of these protocols, particularly for higher speeds. The testing was performed over reasonably high data rates of up to 100 Mbps with delays that are characteristic of near-planetary environments. The tests were run for a fixed packet size, but for variously errored environments. This report documents the testing performed to date.

  3. Prophylactic aortic root surgery in patients with Marfan syndrome : 10 years' experience with a protocol based on body surface area

    NARCIS (Netherlands)

    Aalberts, Jan J. J.; van Tintelen, J. Peter; Hillege, Hans L.; Boonstra, Piet W.; van den Berg, Maarten P.; Waterbolk, T

    2008-01-01

    Background: Current guidelines recommending prophylactic aortic root replacement in Marfan syndrome are based on absolute diameters of the aortic root. However, aortic root diameter is a function of body surface area (BSA). Here, we report our experience with a protocol for prophylactic aortic root

  4. Demonstration of Model Assisted Reliability Assessment Protocol on a Proposed Low Frequency Vibration Based Damage Sensing Case

    Science.gov (United States)

    2011-09-01

    demonstration and broad use of the methodology and protocol. INTRODUCTION The successful deployment of systems for health monitoring of...based damage detection method. An ETrema brand Terfenol-D magnetostrictive actuator was used for band-limited pseudo-random excitation up to 1200 Hz

  5. Detecting child abuse based on parental characteristics: Does The Hague Protocol cause parents to avoid the Emergency Department?

    NARCIS (Netherlands)

    Diderich, H.M.; Fekkes, M.; Dechesne, M.; Buitendijk, S.E.; Oudesluys-Murphy, A.M.

    2015-01-01

    Objectives: The Hague Protocol is used by professionals at the adult Emergency Departments (ED) in The Netherlands to detect child abuse based on three parental characteristics: (1) domestic violence, (2) substance abuse or (3) suicide attempt or self-harm. After detection, a referral is made to the

  6. A TCP/IP-based constant-bit-rate file transfer protocol and its extension to multipoint data delivery

    Energy Technology Data Exchange (ETDEWEB)

    Yamanaka, Kenjiro, E-mail: yamanaka@nii.ac.jp [National Institute of Informatics, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo (Japan); Urushidani, Shigeo [National Institute of Informatics, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo (Japan); Nakanishi, Hideya; Yamamoto, Takashi; Nagayama, Yoshio [National Institute of Fusion Science, 322-6 Orochi, Toki, Gifu (Japan)

    2014-05-15

    We present a new TCP/IP-based file transfer protocol which enables high-speed daisy-chain transfer. By using this protocol, we can send a file to a series of destination hosts simultaneously because intermediate hosts relay received file fragments to the next host. We achieved daisy-chain file transfer from Japan to Europe via USA at about 800 Mbps by using a prototype. The experimental result is also reported. A total link length of a data delivery network can be reduced by daisy chaining, so it enables cost-effective international data sharing.

  7. Comparison of Protocols for Walking and Running Kinematics Based on Skin Surface Markers and Rigid Clusters of Markers

    OpenAIRE

    Miana, AN; Prudencio, MV; Barros, RML

    2009-01-01

    The purpose of this study was to compare the two main types of marker sets for human body representation based on rigid clusters of markers and skin surface markers for measuring kinematics during walking and running. Velocity, body segment, and joint angle were considered in the comparison of both protocols. Six male athletes were Studied during treadmill gait at 1.4 and 5.5 m/s and recorded with 8 high speed video cameras. The subjects used simultaneously both protocols in the same walking ...

  8. 基于分布式网络的SOAP协议%SOAP Protocol Based on the Distributed Network

    Institute of Scientific and Technical Information of China (English)

    沈苗箭; 范剑波; 张森

    2001-01-01

    The article discusses the base concept of SOAP protocol and the way it overcomes the limitation of current technology (CORBA and DCOM). Then it narrates some rules of SOAP protocol and focuses on connecting SOAP to ORPC concept.%讨论了SOAP协议的基础,以及它克服现存技术(如CORBA和DCOM)的许多缺陷的方法。随后讲述一些SOAP编码规则,并把焦点放在SOAP是怎样映射到存在的ORPC概念上的。

  9. Experimental performance study of wireless ad hoc system utilizing 802.11a standard base on different routing protocols

    Science.gov (United States)

    Zhong, Xiao F.; Wang, You-Zheng; Mei, Shunliang; Wang, Jing

    2002-08-01

    The wireless ad hoc network technology provides a flexible infrastructure for next generation mobile telecommunication. In this paper, the performances of the networks based on IEEE802.11a standard, including packets successful delivery rate, average end-to-end delay and system throughput, have been studied with different routing protocols (AODV, WRP, and FISHEYE) using GloMoSim to evaluate the effects of various factors, such as node mobility, node density, and node radio transmission range. The simulation results show that adaptive routing protocol will be more suitable for the variation ad hoc network and the results are helpful for the optimum design and deployment of an actual network.

  10. NONH:A New Cache—Based Coherence Protocol for Linked List Structure DSM System and Its Performance Evaluation

    Institute of Scientific and Technical Information of China (English)

    房至一; 鞠九滨

    1996-01-01

    The management of memory coherence is an important problem in distributed shared memory(DSM)system.In a cache-based coherence DSM system using linked list structure,the key to maintaining the coherence and improving system performance is how to manage the owner in the linked list.This paper presents the design of a new management protocol-NONH(New-Owner New-Head)and its performance evaluation.The analysis results show that this protocol can improve the scalability and performence of a coherent DSM system using linked list.It is also suitable for managing the cache coherency in tree-like hierarchical architecture.

  11. Assessing the Fecal Microbiota: An Optimized Ion Torrent 16S rRNA Gene-Based Analysis Protocol

    Science.gov (United States)

    Foroni, Elena; Duranti, Sabrina; Turroni, Francesca; Lugli, Gabriele Andrea; Sanchez, Borja; Martín, Rebeca; Gueimonde, Miguel; van Sinderen, Douwe; Margolles, Abelardo; Ventura, Marco

    2013-01-01

    Assessing the distribution of 16S rRNA gene sequences within a biological sample represents the current state-of-the-art for determination of human gut microbiota composition. Advances in dissecting the microbial biodiversity of this ecosystem have very much been dependent on the development of novel high-throughput DNA sequencing technologies, like the Ion Torrent. However, the precise representation of this bacterial community may be affected by the protocols used for DNA extraction as well as by the PCR primers employed in the amplification reaction. Here, we describe an optimized protocol for 16S rRNA gene-based profiling of the fecal microbiota. PMID:23869230

  12. Assessing the fecal microbiota: an optimized ion torrent 16S rRNA gene-based analysis protocol.

    Directory of Open Access Journals (Sweden)

    Christian Milani

    Full Text Available Assessing the distribution of 16S rRNA gene sequences within a biological sample represents the current state-of-the-art for determination of human gut microbiota composition. Advances in dissecting the microbial biodiversity of this ecosystem have very much been dependent on the development of novel high-throughput DNA sequencing technologies, like the Ion Torrent. However, the precise representation of this bacterial community may be affected by the protocols used for DNA extraction as well as by the PCR primers employed in the amplification reaction. Here, we describe an optimized protocol for 16S rRNA gene-based profiling of the fecal microbiota.

  13. Protocol Improvements for Low Concentration DNA-Based Bioaerosol Sampling and Analysis.

    Directory of Open Access Journals (Sweden)

    Irvan Luhung

    Full Text Available As bioaerosol research attracts increasing attention, there is a need for additional efforts that focus on method development to deal with different environmental samples. Bioaerosol environmental samples typically have very low biomass concentrations in the air, which often leaves researchers with limited options in choosing the downstream analysis steps, especially when culture-independent methods are intended.This study investigates the impacts of three important factors that can influence the performance of culture-independent DNA-based analysis in dealing with bioaerosol environmental samples engaged in this study. The factors are: 1 enhanced high temperature sonication during DNA extraction; 2 effect of sampling duration on DNA recoverability; and 3 an alternative method for concentrating composite samples. In this study, DNA extracted from samples was analysed using the Qubit fluorometer (for direct total DNA measurement and quantitative polymerase chain reaction (qPCR.The findings suggest that additional lysis from high temperature sonication is crucial: DNA yields from both high and low biomass samples increased up to 600% when the protocol included 30-min sonication at 65°C. Long air sampling duration on a filter media was shown to have a negative impact on DNA recoverability with up to 98% of DNA lost over a 20-h sampling period. Pooling DNA from separate samples during extraction was proven to be feasible with margins of error below 30%.

  14. Design, Implementation, and Study Protocol of a Kindergarten-Based Health Promotion Intervention

    Science.gov (United States)

    Wartha, Olivia; Dreyhaupt, Jens; Lämmle, Christine; Friedemann, Eva-Maria; Kelso, Anne; Kutzner, Claire; Hermeling, Lina

    2017-01-01

    Inactivity and an unhealthy diet amongst others have led to an increased prevalence of overweight and obesity even in young children. Since most health behaviours develop during childhood health promotion has to start early. The setting kindergarten has been shown as ideal for such interventions. “Join the Healthy Boat” is a kindergarten-based health promotion programme with a cluster-randomised study focussing on increased physical activity, reduced screen media use, and sugar-sweetened beverages, as well as a higher fruit and vegetable intake. Intervention and materials were developed using Bartholomew's Intervention Mapping approach considering Bandura's social-cognitive theory and Bronfenbrenner's ecological framework for human development. The programme is distributed using a train-the-trainer approach and currently implemented in 618 kindergartens. The effectiveness of this one-year intervention with an intervention and a control group will be examined in 62 kindergartens using standardised protocols, materials, and tools for outcome and process evaluation. A sample of 1021 children and their parents provided consent and participated in the intervention. Results of this study are awaited to give a better understanding of health behaviours in early childhood and to identify strategies for effective health promotion. The current paper describes development and design of the intervention and its implementation and planned evaluation. Trial Registration. The study is registered at the German Clinical Trials Register (DRKS), Freiburg University, Germany, ID: DRKS00010089. PMID:28303253

  15. A Multipath Routing Protocol Based on Clustering and Ant Colony Optimization for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jing Yang

    2010-05-01

    Full Text Available For monitoring burst events in a kind of reactive wireless sensor networks (WSNs, a multipath routing protocol (MRP based on dynamic clustering and ant colony optimization (ACO is proposed.. Such an approach can maximize the network lifetime and reduce the energy consumption. An important attribute of WSNs is their limited power supply, and therefore some metrics (such as energy consumption of communication among nodes, residual energy, path length were considered as very important criteria while designing routing in the MRP. Firstly, a cluster head (CH is selected among nodes located in the event area according to some parameters, such as residual energy. Secondly, an improved ACO algorithm is applied in the search for multiple paths between the CH and sink node. Finally, the CH dynamically chooses a route to transmit data with a probability that depends on many path metrics, such as energy consumption. The simulation results show that MRP can prolong the network lifetime, as well as balance of energy consumption among nodes and reduce the average energy consumption effectively.

  16. Design, Implementation, and Study Protocol of a Kindergarten-Based Health Promotion Intervention

    Directory of Open Access Journals (Sweden)

    Susanne Kobel

    2017-01-01

    Full Text Available Inactivity and an unhealthy diet amongst others have led to an increased prevalence of overweight and obesity even in young children. Since most health behaviours develop during childhood health promotion has to start early. The setting kindergarten has been shown as ideal for such interventions. “Join the Healthy Boat” is a kindergarten-based health promotion programme with a cluster-randomised study focussing on increased physical activity, reduced screen media use, and sugar-sweetened beverages, as well as a higher fruit and vegetable intake. Intervention and materials were developed using Bartholomew’s Intervention Mapping approach considering Bandura’s social-cognitive theory and Bronfenbrenner’s ecological framework for human development. The programme is distributed using a train-the-trainer approach and currently implemented in 618 kindergartens. The effectiveness of this one-year intervention with an intervention and a control group will be examined in 62 kindergartens using standardised protocols, materials, and tools for outcome and process evaluation. A sample of 1021 children and their parents provided consent and participated in the intervention. Results of this study are awaited to give a better understanding of health behaviours in early childhood and to identify strategies for effective health promotion. The current paper describes development and design of the intervention and its implementation and planned evaluation. Trial Registration. The study is registered at the German Clinical Trials Register (DRKS, Freiburg University, Germany, ID: DRKS00010089.

  17. Maintaining communication link based on AODV routing protocol in mobile robot networks

    Science.gov (United States)

    Hu, Hui; Jiang, Hong

    2007-12-01

    Wired computer networks are vital in modern life. However, these networks are extremely vulnerable to disaster or attack in emergency situations. Therefore, how to maintain communication link under emergency situations is very important. In this paper, we utilize a series of autonomous mobile slave robots which follow behind the lead robot and automatically stop where needed to maintain an ad hoc network for guaranteeing a link between the lead robot and its remote monitor/control station. To accomplish this target, an efficient communication protocol limitation mobile robots broadcast based on AODV (LMRB-AODV) is proposed for deployment in multi-robot system. After then the lead robot could carry service traffics to the monitor station under emergency situations through the communication link. At any instance, the lead robot has the ability to reclaim the relay robot(s) which are unneeded in the network to rejoin the convoy behind the lead robot and use it to extend the range of wireless communication when the radio frequency (RF) shortcuts are detected by the lead robot. All relay deployment and reclaiming strategy functions occur without the operator's involvement. Finally, we provide a comparative study of their performance in a number of different simulation environments. The results show that the proposed scheme is very efficient in maintaining communication link in wireless network.

  18. A simple TALEN-based protocol for efficient genome-editing in Drosophila.

    Science.gov (United States)

    Zhang, Xu; Ferreira, Irene R S; Schnorrer, Frank

    2014-08-15

    Drosophila is a well-established genetic model organism: thousands of point mutations, deficiencies or transposon insertions are available from stock centres. However, to date, it is still difficult to modify a specific gene locus in a defined manner. A potential solution is the application of transcription activator-like effector nucleases (TALENs), which have been used successfully to mutate genes in various model organisms. TALENs are constructed by fusion of TALE proteins to the endonuclease FokI, resulting in artificial, sequence-specific endonucleases. They induce double strand breaks, which are either repaired by error-prone non-homologous end joining (NHEJ) or homology directed repair (HDR). We developed a simple TALEN-based protocol to mutate any gene of interest in Drosophila within approximately 2 months. We inject mRNA coding for two TALEN pairs targeting the same gene into embryos, employ T7 endonuclease I screening of pooled F1 flies to identify mutations and generate a stable mutant stock in the F3 generation. We illustrate the efficacy of our strategy by mutating CG11617, a previously uncharacterized putative transcription factor with an unknown function in Drosophila. This demonstrates that TALENs are a reliable and efficient strategy to mutate any gene of interest in Drosophila.

  19. A Multipath Routing Protocol Based on Clustering and Ant Colony Optimization for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jing Yang

    2009-10-01

    Full Text Available For monitoring burst events in a kind of reactive wireless sensor networks (WSNs, a multipath routing protocol (MRP based on dynamic clustering and ant colony optimization (ACO is proposed.. Such an approach can maximize the network lifetime and reduce the energy consumption. An important attribute of WSNs is its limited power supply, and therefore in MRP, some metrics (such as energy consumption of communication among nodes, residual energy, path length are considered as very important criteria while designing routing. Firstly, a cluster head (CH is selected among nodes located in the event area according to some parameters, such as residual energy. Secondly, an improved ACO algorithm is applied in search for multiple paths between the CH and sink node. Finally, the CH dynamically chooses a route to transmit data with a probability that depends on many path metrics, such as energy consumption. The simulation results show that MRP can prolong the network lifetime, as well as balance energy consumption among nodes and reduce the average energy consumption effectively.

  20. A simulation based QoS review of multipath routing protocols for MANET

    Directory of Open Access Journals (Sweden)

    P.Periyasamy

    2012-11-01

    Full Text Available A MANET is an interconnection of mobile devices by wireless links forming a dynamic topology without much physical network infrastructure such as routers, servers, access points/cables or centralized administration. The multipath routing protocols establish efficient communication within the network by discovering multiple routes between a pair of source and destination in order to have load balancing to satisfy Quality of Service (QoS requirements. In this paper, the QoS comparison of three multipath routing protocols are carried out in terms of five scenario patterns such as RWM, RPGM, MGM, GMM, and PMM in two different traffic patterns such as CBR and TCP using NS2 and Bonn Motion. The multipath routing protocols AOMDV, OLSR and ZRP have been selected for simulation due to their edges over other protocols in various aspects.

  1. Protocol for the application of cooperative MIMO based on clustering in sparse wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    WANG Qing-hua; QU Yu-gui; LIN Zhi-ting; BAI Rong-gang; ZHAO Bao-hua; PAN Quan-ke

    2007-01-01

    Wireless sensor networks (WSN) using cooperative multiple-input multiple-output (MIMO) communication are effective tools to collect data in several environments. However, how to apply cooperative MIMO in WSN remains a critical challenge, especially in sparse WSN. In this article, a novel clustering scheme is proposed for the application of cooperative MIMO in sparse WSN by extending the traditional low-energy adaptive clustering hierarchy (LEACH) protocol. This clustering scheme solves the problem that the cluster heads (CH) cannot find enough secondary cluster heads (SCH), which are used to cooperate and inform multiple-antenna transmitters with CHs. On the basis of this protocol, the overall energy consumption of the networks model is developed, and the optimal number of CHs is obtained. The simulation results show that this protocol is feasible for the sparse WSN. The simulation results also illustrate that this protocol provides significant energy efficiencies, even after allowing for additional overheads.

  2. An ad-hoc opportunistic dissemination protocol for smartphone-based participatory traffic monitoring

    NARCIS (Netherlands)

    Türkes, Okan; Seraj, Fatjon; Scholten, Hans; Meratnia, Nirvana; Havinga, Paul J.M.

    2015-01-01

    This study introduces an ad-hoc opportunistic data dissemination protocol, called VADISS, that facilitates participatory traffic monitoring applications with smartphones. As a ubiquitous alternative to existing vehicular networking methods, VADISS uses the default WiFi interfaces universally adopted

  3. Energy Efficient Routing in Mobile Adhoc Networks based on AODV Protocol

    Directory of Open Access Journals (Sweden)

    Pinki Nayak

    2012-11-01

    Full Text Available Mobile Ad hoc Networks (MANETs suffer from power exhaustion as many nodes use batteries as their source. Energy consumption is one of the most important system design optimization criterion in MANETs. The conventional routing protocols do not consider energy of nodes while selecting routes. So, using the same route for a longer duration leads to partitioning of the network. Therefore, considering energy of the nodes while selecting a route efficiently utilizes the nodal energy and helps prolong the lifetime of the network. This paper attempts to modify the popular on demand routing protocol AODV to make it energy aware. The proposed algorithm also varies the transmission power between two nodes as per their distance. The protocols are simulated using Network Simulator (NS-2.34. The performance of both the protocols is analyzed under various conditions and the proposed scheme shows efficient energy utilization and increased network lifetime

  4. Modified calibration protocol evaluated in a model-based testing of SBR flexibility

    DEFF Research Database (Denmark)

    Corominas, Lluís; Sin, Gürkan; Puig, Sebastià;

    2011-01-01

    operation using fixed phase length and dissolved oxygen set points and two real-time control strategies is compared to find optimal operation under dynamic conditions. The results show that a validated model of high quality is obtained using the updated protocol and that the optimization of the system......The purpose of this paper is to refine the BIOMATH calibration protocol for SBR systems, in particular to develop a pragmatic calibration protocol that takes advantage of SBR information-rich data, defines a simulation strategy to obtain proper initial conditions for model calibration and provides...... statistical evaluation of the calibration outcome. The updated calibration protocol is then evaluated on a case study to obtain a thoroughly validated model for testing the flexibility of an N-removing SBR to adapt the operating conditions to the changing influent wastewater load. The performance of reference...

  5. A NOVEL PFMAC PROTOCOL FOR WIRELESS SENSOR NETWORK BASED ON PREDICTION AND FEEDBACK METHOD

    Institute of Scientific and Technical Information of China (English)

    Liu Yaqiu; Bian Li; Jing Weipeng; Zhang Qianlong

    2011-01-01

    In view of the problem that existing Media Access Control (MAC) protocols can not provide real-time monitor on network conditions,this paper puts forward a new MAC protocol- Predict and Feedback MAC (PFMAC) which can predict the channel's congestion level reasonably.The dominant idea of the new scheme is to record the channel's busy or idle situation in the backoff stage by sending Sensor Nodes (SNs),and according to the congestion level every SN can change the contention window adaptively when send packets successfully to minimize collisions,saving energy and channel resources.The result of simulation shows that compared with other MAC protocols,the PFMAC protocol can improve network throughput and reduce energy consumption in high speed network environment.

  6. Modified calibration protocol evaluated in a model-based testing of SBR flexibility.

    Science.gov (United States)

    Corominas, Lluís; Sin, Gürkan; Puig, Sebastià; Balaguer, Maria Dolors; Vanrolleghem, Peter A; Colprim, Jesús

    2011-02-01

    The purpose of this paper is to refine the BIOMATH calibration protocol for SBR systems, in particular to develop a pragmatic calibration protocol that takes advantage of SBR information-rich data, defines a simulation strategy to obtain proper initial conditions for model calibration and provides statistical evaluation of the calibration outcome. The updated calibration protocol is then evaluated on a case study to obtain a thoroughly validated model for testing the flexibility of an N-removing SBR to adapt the operating conditions to the changing influent wastewater load. The performance of reference operation using fixed phase length and dissolved oxygen set points and two real-time control strategies is compared to find optimal operation under dynamic conditions. The results show that a validated model of high quality is obtained using the updated protocol and that the optimization of the system's performance can be achieved in different manners by implementing the proposed control strategies.

  7. Design of a Medical Triage Evidence-Based Clinical Management Protocol and Implementation of Medical Triage On-Line Training for Use by Mission of Mercy Volunteers.

    Science.gov (United States)

    Allen, Kimberly D; DiBartolo, Mary C; Welsh, Debra L; Brown, Voncelia

    2015-01-01

    Evidence-based protocols in safety net settings can help standardize care practices, increase organizational workflow, and enhance quality outcomes for those receiving services. The purpose of this quality improvement project is two-fold: to design an evidence-based medical triage clinical management protocol, and, to influence adherence to that protocol by safety net medical triage volunteers through an on-line volunteer orientation. Leadership skills were required to help translate evidence-based practice recommendations into useful tools to assist in directing practice. Project outcomes included successful multidisciplinary practice change, significantly improved volunteer knowledge surrounding medical triage protocol parameters, increased organizational workflow, and enhanced quality client outcomes.

  8. SLEPR: a sample-level enrichment-based pathway ranking method -- seeking biological themes through pathway-level consistency.

    Science.gov (United States)

    Yi, Ming; Stephens, Robert M

    2008-09-26

    Analysis of microarray and other high throughput data often involves identification of genes consistently up or down-regulated across samples as the first step in extraction of biological meaning. This gene-level paradigm can be limited as a result of valid sample fluctuations and biological complexities. In this report, we describe a novel method, SLEPR, which eliminates this limitation by relying on pathway-level consistencies. Our method first selects the sample-level differentiated genes from each individual sample, capturing genes missed by other analysis methods, ascertains the enrichment levels of associated pathways from each of those lists, and then ranks annotated pathways based on the consistency of enrichment levels of individual samples from both sample classes. As a proof of concept, we have used this method to analyze three public microarray datasets with a direct comparison with the GSEA method, one of the most popular pathway-level analysis methods in the field. We found that our method was able to reproduce the earlier observations with significant improvements in depth of coverage for validated or expected biological themes, but also produced additional insights that make biological sense. This new method extends existing analyses approaches and facilitates integration of different types of HTP data.

  9. Development of a field sampling method based on magnetic nanoparticles for the enrichment of pesticides in aqueous samples.

    Science.gov (United States)

    Zhang, Lingyi; Sheng, Xiaoling; Zhang, Runsheng; Xiong, Zhichao; Wu, Zhongping; Yan, Songmao; Zhang, Yurong; Zhang, Weibing

    2014-12-07

    A field sampling method based on magnetic core-shell silica nanoparticles was developed for field sampling and the enrichment of low concentrations of pesticides in aqueous samples. The magnetic nanoparticles could be easily extracted from water samples by a custom-made magnetic nanoparticle collector. The recovery of 15 mg of magnetic particles from a 500 mL water sample was 90.8%. Mixtures of seven pesticides spiked into pure water and pond water were used as marker samples to evaluate the field sampling method. The average recoveries at three levels of spiking were in the range 60.0-104.7% with relative standard deviations method has good linearity with a correlation coefficient >0.9990 in the concentration range 0.5-15 μg L(-1). The results of the analysis of a sample of poisoned pond water indicate that this method is fast, convenient and efficient for the field sampling and enrichment of pesticides in aqueous samples.

  10. Performance of microarray and liquid based capture methods for target enrichment for massively parallel sequencing and SNP discovery.

    Directory of Open Access Journals (Sweden)

    Anna Kiialainen

    Full Text Available Targeted sequencing is a cost-efficient way to obtain answers to biological questions in many projects, but the choice of the enrichment method to use can be difficult. In this study we compared two hybridization methods for target enrichment for massively parallel sequencing and single nucleotide polymorphism (SNP discovery, namely Nimblegen sequence capture arrays and the SureSelect liquid-based hybrid capture system. We prepared sequencing libraries from three HapMap samples using both methods, sequenced the libraries on the Illumina Genome Analyzer, mapped the sequencing reads back to the genome, and called variants in the sequences. 74-75% of the sequence reads originated from the targeted region in the SureSelect libraries and 41-67% in the Nimblegen libraries. We could sequence up to 99.9% and 99.5% of the regions targeted by capture probes from the SureSelect libraries and from the Nimblegen libraries, respectively. The Nimblegen probes covered 0.6 Mb more of the original 3.1 Mb target region than the SureSelect probes. In each sample, we called more SNPs and detected more novel SNPs from the libraries that were prepared using the Nimblegen method. Thus the Nimblegen method gave better results when judged by the number of SNPs called, but this came at the cost of more over-sampling.

  11. Rapid enrichment of rare-earth metals by carboxymethyl cellulose-based open-cellular hydrogel adsorbent from HIPEs template.

    Science.gov (United States)

    Zhu, Yongfeng; Wang, Wenbo; Zheng, Yian; Wang, Feng; Wang, Aiqin

    2016-04-20

    A series of monolithic open-cellular hydrogel adsorbents based on carboxymethylcellulose (CMC) were prepared through high internal phase emulsions (HIPEs) and used to enrich the rare-earth metals La(3+) and Ce(3+). The changes of pore structure, and the effects of pH, contact time, initial concentration on the adsorption performance were systematically studied. The results show that the as-prepared monolithic hydrogel adsorbents possess good open-cellular framework structure and have fast adsorption kinetics and high adsorption capacity for La(3+) and Ce(3+). The involved adsorption system can reach equilibrium within 30min and the maximal adsorption capacity is determined to be 384.62mg/g for La(3+) and 333.33mg/g for Ce(3+). Moreover, these porous hydrogel adsorbents show an excellent adsorptive reusability for La(3+) and Ce(3+) through five adsorption-desorption cycles. Such a pore hierarchy structure makes this monolithic open-cellular hydrogel adsorbent be an effective adsorbent for effective enrichment of La(3+) and Ce(3+) from aqueous solution.

  12. Optimized Protocol for Quantitative Multiple Reaction Monitoring-Based Proteomic Analysis of Formalin-Fixed, Paraffin-Embedded Tissues.

    Science.gov (United States)

    Kennedy, Jacob J; Whiteaker, Jeffrey R; Schoenherr, Regine M; Yan, Ping; Allison, Kimberly; Shipley, Melissa; Lerch, Melissa; Hoofnagle, Andrew N; Baird, Geoffrey Stuart; Paulovich, Amanda G

    2016-08-01

    Despite a clinical, economic, and regulatory imperative to develop companion diagnostics, precious few new biomarkers have been successfully translated into clinical use, due in part to inadequate protein assay technologies to support large-scale testing of hundreds of candidate biomarkers in formalin-fixed paraffin-embedded (FFPE) tissues. Although the feasibility of using targeted, multiple reaction monitoring mass spectrometry (MRM-MS) for quantitative analyses of FFPE tissues has been demonstrated, protocols have not been systematically optimized for robust quantification across a large number of analytes, nor has the performance of peptide immuno-MRM been evaluated. To address this gap, we used a test battery approach coupled to MRM-MS with the addition of stable isotope-labeled standard peptides (targeting 512 analytes) to quantitatively evaluate the performance of three extraction protocols in combination with three trypsin digestion protocols (i.e., nine processes). A process based on RapiGest buffer extraction and urea-based digestion was identified to enable similar quantitation results from FFPE and frozen tissues. Using the optimized protocols for MRM-based analysis of FFPE tissues, median precision was 11.4% (across 249 analytes). There was excellent correlation between measurements made on matched FFPE and frozen tissues, both for direct MRM analysis (R(2) = 0.94) and immuno-MRM (R(2) = 0.89). The optimized process enables highly reproducible, multiplex, standardizable, quantitative MRM in archival tissue specimens.

  13. The protocols for the 10/66 dementia research group population-based research programme

    Science.gov (United States)

    Prince, Martin; Ferri, Cleusa P; Acosta, Daisy; Albanese, Emiliano; Arizaga, Raul; Dewey, Michael; Gavrilova, Svetlana I; Guerra, Mariella; Huang, Yueqin; Jacob, KS; Krishnamoorthy, ES; McKeigue, Paul; Rodriguez, Juan Llibre; Salas, Aquiles; Sosa, Ana Luisa; Sousa, Renata MM; Stewart, Robert; Uwakwe, Richard

    2007-01-01

    Background Latin America, China and India are experiencing unprecedentedly rapid demographic ageing with an increasing number of people with dementia. The 10/66 Dementia Research Group's title refers to the 66% of people with dementia that live in developing countries and the less than one tenth of population-based research carried out in those settings. This paper describes the protocols for the 10/66 population-based and intervention studies that aim to redress this imbalance. Methods/design Cross-sectional comprehensive one phase surveys have been conducted of all residents aged 65 and over of geographically defined catchment areas in ten low and middle income countries (India, China, Nigeria, Cuba, Dominican Republic, Brazil, Venezuela, Mexico, Peru and Argentina), with a sample size of between 1000 and 3000 (generally 2000). Each of the studies uses the same core minimum data set with cross-culturally validated assessments (dementia diagnosis and subtypes, mental disorders, physical health, anthropometry, demographics, extensive non communicable disease risk factor questionnaires, disability/functioning, health service utilisation, care arrangements and caregiver strain). Nested within the population based studies is a randomised controlled trial of a caregiver intervention for people with dementia and their families (ISRCTN41039907; ISRCTN41062011; ISRCTN95135433; ISRCTN66355402; ISRCTN93378627; ISRCTN94921815). A follow up of 2.5 to 3.5 years will be conducted in 7 countries (China, Cuba, Dominican Republic, Venezuela, Mexico, Peru and Argentina) to assess risk factors for incident dementia, stroke and all cause and cause-specific mortality; verbal autopsy will be used to identify causes of death. Discussion The 10/66 DRG baseline population-based studies are nearly complete. The incidence phase will be completed in 2009. All investigators are committed to establish an anonymised file sharing archive with monitored public access. Our aim is to create an

  14. A cage-based training, cognitive testing and enrichment system optimized for rhesus macaques in neuroscience research.

    Science.gov (United States)

    Calapai, A; Berger, M; Niessing, M; Heisig, K; Brockhausen, R; Treue, S; Gail, A

    2017-02-01

    In neurophysiological studies with awake non-human primates (NHP), it is typically necessary to train the animals over a prolonged period of time on a behavioral paradigm before the actual data collection takes place. Rhesus monkeys (Macaca mulatta) are the most widely used primate animal models in system neuroscience. Inspired by existing joystick- or touch-screen-based systems designed for a variety of monkey species, we built and successfully employed a stand-alone cage-based training and testing system for rhesus monkeys (eXperimental Behavioral Intrument, XBI). The XBI is mobile and easy to handle by both experts and non-experts; animals can work with only minimal physical restraints, yet the ergonomic design successfully encourages stereotypical postures with a consistent positioning of the head relative to the screen. The XBI allows computer-controlled training of the monkeys with a large variety of behavioral tasks and reward protocols typically used in systems and cognitive neuroscience research.

  15. Two-level Trajectory-Based Routing Protocol for Vehicular Ad Hoc Networks in Freeway and Manhattan Environments

    Directory of Open Access Journals (Sweden)

    Floriano De Rango

    2009-11-01

    Full Text Available This paper focuses on the routing protocol issue in two important environments for Vehicular Ad Hoc Networks (VANET: Manhattan and the Freeway. A novel protocol called Two-level Trajectory Based Routing (TTBR protocol is proposed. Deterministic vehicles movement permits advantage to be taken of the map info to build a specific local trajectory to reach the destination node. However, in order to offer network scalability also a high level cell-based trajectory is applied to have a coarse knowledge of the cell where the destination node is moving. Our proposal needs Peer Servers and Grid subdivision of the space. Simulation results were assessed to show the improvements and scalability offered by TTBR in comparison with other Ad Hoc networks protocols such as AODV and GPSR. Performance Evaluation was evaluated in terms of Normalized Control Overhead and Data Packet Delivery Ratio. TTBR is more performing than AODV for a high speed and high density scenario for both the Manhattan and Freeway scenarios.

  16. Interface Assignment-Based AODV Routing Protocol to Improve Reliability in Multi-Interface Multichannel Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2015-01-01

    Full Text Available The utilization of wireless mesh networks (WMNs has greatly increased, and the multi-interface multichannel (MIMC technic has been widely used for the backbone network. Unfortunately, the ad hoc on-demand distance vector (AODV routing protocol defined in the IEEE 802.11s standard was designed for WMNs using the single-interface single-channel technic. So, we define a problem that happens when the legacy AODV is used in MIMC WMNs and propose an interface assignment-based AODV (IA-AODV in order to resolve that problem. IA-AODV, which is based on multitarget path request, consists of the PREQ prediction scheme, the PREQ loss recovery scheme, and the PREQ sender assignment scheme. A detailed operation according to various network conditions and services is introduced, and the routing efficiency and network reliability of a network using IA-AODV are analyzed over the presented system model. Finally, after a real-world test-bed for MIMC WMNs using the IA-AODV routing protocol is implemented, the various indicators of the network are evaluated through experiments. When the proposed routing protocol is compared with the existing AODV routing protocol, it performs the path update using only 14.33% of the management frames, completely removes the routing malfunction, and reduces the UDP packet loss ratio by 0.0012%.

  17. Development and Testing of a Literature Search Protocol for Evidence Based Nursing: An Applied Student Learning Experience

    Directory of Open Access Journals (Sweden)

    Andy Hickner

    2011-09-01

    Full Text Available Objective – The study aimed to develop a search protocol and evaluate reviewers' satisfaction with an evidence-based practice (EBP review by embedding a library science student in the process.Methods – The student was embedded in one of four review teams overseen by a professional organization for oncology nurses (ONS. A literature search protocol was developed by the student following discussion and feedback from the review team. Organization staff provided process feedback. Reviewers from both case and control groups completed a questionnaire to assess satisfaction with the literature search phases of the review process. Results – A protocol was developed and refined for use by future review teams. The collaboration and the resulting search protocol were beneficial for both the student and the review team members. The questionnaire results did not yield statistically significant differences regarding satisfaction with the search process between case and control groups. Conclusions – Evidence-based reviewers' satisfaction with the literature searching process depends on multiple factors and it was not clear that embedding an LIS specialist in the review team improved satisfaction with the process. Future research with more respondents may elucidate specific factors that may impact reviewers' assessment.

  18. Environmental enrichment for primates in laboratories

    Science.gov (United States)

    Buchanan-Smith, H. M.

    2010-06-01

    Environmental enrichment is a critical component of Refinement, one of the 3Rs underlying humane experimentation on animals. In this paper I discuss why primates housed in laboratories, which often have constraints of space and study protocols, are a special case for enrichment. I outline a framework for categorising the different types of enrichment, using the marmoset as a case study, and summarise the methods used to determine what animals want/prefer. I briefly review the arguments that enrichment does not negatively affect experimental outcomes. Finally I focus on complexity and novelty, choice and control, the underlying features of enrichment that makes it successful, and how combined with a thorough understanding of natural history we can put effective enrichment into practice in laboratories. Throughout the paper I emphasise the need to evaluate enrichment to ensure it is having the desired effect.

  19. Universal screening test based on analysis of circulating organ-enriched microRNAs: a novel approach to diagnostic screening.

    Science.gov (United States)

    Sheinerman, Kira S; Umansky, Samuil

    2015-03-01

    Early disease detection leads to more effective and cost-efficient treatment. It is especially important for cancer and neurodegenerative diseases, because progression of these pathologies leads to significant and frequently irreversible changes in underlying pathophysiological processes. At the same time, the development of specific screening tests for detection of each of the hundreds of human pathologies in asymptomatic stage may be impractical. Here, we discuss a recently proposed concept: the development of minimally invasive Universal Screening Test (UST) based on analysis of organ-enriched microRNAs in plasma and other bodily fluids. The UST is designed to detect the presence of a pathology in particular organ systems, organs, tissues or cell types without diagnosing a specific disease. Once the pathology is detected, more specific, and if necessary invasive and expensive, tests can be administered to precisely define the nature of the disease. Here, we discuss recent studies and analyze the data supporting the UST approach.

  20. HPeak: an HMM-based algorithm for defining read-enriched regions in ChIP-Seq data

    Directory of Open Access Journals (Sweden)

    Maher Christopher A

    2010-07-01

    Full Text Available Abstract Background Protein-DNA interaction constitutes a basic mechanism for the genetic regulation of target gene expression. Deciphering this mechanism has been a daunting task due to the difficulty in characterizing protein-bound DNA on a large scale. A powerful technique has recently emerged that couples chromatin immunoprecipitation (ChIP with next-generation sequencing, (ChIP-Seq. This technique provides a direct survey of the cistrom of transcription factors and other chromatin-associated proteins. In order to realize the full potential of this technique, increasingly sophisticated statistical algorithms have been developed to analyze the massive amount of data generated by this method. Results Here we introduce HPeak, a Hidden Markov model (HMM-based Peak-finding algorithm for analyzing ChIP-Seq data to identify protein-interacting genomic regions. In contrast to the majority of available ChIP-Seq analysis software packages, HPeak is a model-based approach allowing for rigorous statistical inference. This approach enables HPeak to accurately infer genomic regions enriched with sequence reads by assuming realistic probability distributions, in conjunction with a novel weighting scheme on the sequencing read coverage. Conclusions Using biologically relevant data collections, we found that HPeak showed a higher prevalence of the expected transcription factor binding motifs in ChIP-enriched sequences relative to the control sequences when compared to other currently available ChIP-Seq analysis approaches. Additionally, in comparison to the ChIP-chip assay, ChIP-Seq provides higher resolution along with improved sensitivity and specificity of binding site detection. Additional file and the HPeak program are freely available at http://www.sph.umich.edu/csg/qin/HPeak.