WorldWideScience

Sample records for deploying ip telephony

  1. Wireless IP Telephony

    CERN Document Server

    Gerami, Mohsen

    2010-01-01

    The convergence of traditional telecommunications and the Internet is creating new network-based service delivery opportunities for telecommunications companies carriers, service providers, and network equipment providers. Voice over Wireless IP is one of the most exciting new developments emerging within the telephony market. It is set to revolutionize the delivery of mobile voice Services and provide exciting new opportunities for operators and service providers alike. This survey discusses principal of Wireless IP Telephony.

  2. Security Risks in IP Telephony

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2010-01-01

    Full Text Available This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against SPIT attacks. AntiSPIT represents an effective protection based on statistical blacklist and works without participation of the called party which is a significant advantage.

  3. Security of IP Telephony in Ecuador: Online Analysis

    Directory of Open Access Journals (Sweden)

    José Estrada

    2016-06-01

    Full Text Available Telephony is a global service and thus telephone networks have been a coveted target for criminals. Now that voice can be transported over IP and that multiple services are integrated in a convergent model through Internet, there are more incentives to attack and more attackers. Moreover, the development of open source telephone applications has encouraged the massive use of IP telephony, but not an increased awareness about embedded security risks. Due to the current and intensive adoption of IP telephony systems in Ecuador, we conducted an exploration based on public information to obtain statistics about telephone systems connected to Internet in Ecuador. Additionally, using a deliberately vulnerable IP telephony system, we collected more data to do a preliminary analysis of threats to such systems. We found that hundreds of telephone systems were publicly available on the Internet and using outdated versions of Asterisk-based applications. We also found thousands of malicious interactions on the IP telephony system we deployed on the Internet.

  4. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  5. Fast Echo Canceller in IP Telephony Gateway

    Institute of Scientific and Technical Information of China (English)

    黄永峰; 李星

    2003-01-01

    The length of the echo path in the IP telephony system is very long. Generally, the echo canceller is implemented on the IP telephony gateway which needs to perform concurrently multi-channel echo cancellation and voice compression. Hence, the most key technique to design the echo canceller is to reduce greatly the computational requirement. For this reason a number of innovative features to implement a fast echo canceller are presented. The key components of this canceller include: the separation of adaptive and cancel filters, non-real-time adaptation and real-time cancellation, sharing VAD algorithms with the speech codec, the incorporation of delay indexing with zero coefficients, and windowing the adaptive filter coefficients to reduce the cost of DSP during the cancellation. Finally, the performance of the echo canceller is summarized; the results of evaluation show that the performance gains for echo cancellation are significant.

  6. IP Telephony Interconnection Reference Challenges, Models, and Engineering

    CERN Document Server

    Boucadair, Mohamed; Neves, Pedro Miguel; Einarsson, Olafur Pall

    2011-01-01

    Addressing the growth of IP telephony service offerings within the corporate and residential realm, IP Telephony Interconnection Reference: Challenges, Models, and Engineering examines the technical and regulatory issues related to IP telephony interconnection at the large scale. It describes business and interconnection models, reviews emerging architectures such as IMS and TISPAN, identifies commonly-encountered issues, and supplies solutions to technical issues. The authors offer a detailed overview of SPEERMINT activity and proposed architecture, the current work undertaken in i3 Forum, an

  7. Diffusion of IP Telephony in Undergraduate Private Colleges

    Directory of Open Access Journals (Sweden)

    Patrick C. Olson, PhD

    2007-02-01

    Full Text Available Over the summer of 2000 Menlo College implemented enterprise wide Internet Protocol (IP Telephony (Voice over Internet Protocol [VoIP]. More than five years have passed, and analysts are predicting that in the near future the only available Private Branch Exchange (PBX solutions will be VoIP [4]. In view of this market trend, the diffusion of this technology in these institutions seems slow. The Menlo College implementation is very successful, but has the concept diffused to other institutions? What factors influence the diffusion of this technology to other institutions? This paper examines the status of VoIP at these institutions.

  8. Design and implementation of a system to interconnect VoIP services and CERN’s telephony networks

    CERN Document Server

    Pohančeník, Martin; Segeč, Pavel

    The purpose of this diploma thesis was to design and implement a system that would provide an interface of CERN’s telephony network for Voice over IP services (SIP-based services specifically). This system thus serves as an entry point for calls originating from outside of CERN’s telephony network and enables users of these services to call CERN’s fixed and mobile phone numbers. The theoretical part of the thesis talks in detail about the project specification and describes the goals that were trying to be achieved. It also describes the topic of VoIP telephony and current trends, alongside with analysis of the current telephone network of CERN. The practical part is targeted to explain the design of the solution and deployment of the system at CERN. The final part of the thesis shows testing scenarios and results and states several extension capabilities.

  9. Using Transcoding for Hidden Communication in IP Telephony

    CERN Document Server

    Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt data that is compressed to make space for the steganogram. The main innovation of TranSteg is to, for a chosen voice stream, find a codec that will result in a similar voice quality but smaller voice payload size than the originally selected. Then, the voice stream is transcoded. At this step the original voice payload size is intentionally unaltered and the change of the codec is not indicated. Instead, after placing the transcoded voice payload, the remaining free space is filled with hidden data. TranSteg proof of concept implementation was designed and developed. The obtained experimental results are enclosed in this paper. They prove that the proposed method is feasible and offers a high steganographic bandwidth. TranSteg detection is difficult to perfor...

  10. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  11. Implementation of ITU-T G. 729 Speech Codec in IP Telephony Gateway

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    ITU-T G. 729 is the primarily recommended speech codec by H. 323 standard. This paper describes how to implement G. 729 codec in IP telephony gateway, and goes deep into the programming skills on TMS320C6201 DSP and optimizing methods of program code to reduce the speech processing delay time of G.729 codec. Due to adopting these optimizing methods and programming skills, we have implemented a highspeed speech codec that can process concurrently 20 voice channels with single TMS320C6201 chip in IP telephony gateway. Finally, the paperanalyzes the performance results of ITU-T G. 729 codec based on TMS320C6201.

  12. Telephony Over IP: A QoS Measurement-Based End to End Control Algorithm

    Directory of Open Access Journals (Sweden)

    Luigi Alcuri

    2004-12-01

    Full Text Available This paper presents a method for admitting voice calls in Telephony over IP (ToIP scenarios. This method, called QoS-Weighted CAC, aims to guarantee Quality of Service to telephony applications. We use a measurement-based call admission control algorithm, which detects network congested links through a feedback on overall link utilization. This feedback is based on the measures of packet delivery latencies related to voice over IP connections at the edges of the transport network. In this way we introduce a close loop control method, which is able to auto-adapt the quality margin on the basis of network load and specific service level requirements. Moreover we evaluate the difference in performance achieved by different Queue management configurations to guarantee Quality of Service to telephony applications, in which our goal was to evaluate the weight of edge router queue configuration in complex and real-like telephony over IP scenario. We want to compare many well-know queue scheduling algorithms, such as SFQ, WRR, RR, WIRR, and Priority. This comparison aims to locate queue schedulers in a more general control scheme context where different elements such as DiffServ marking and Admission control algorithms contribute to the overall Quality of Service required by real-time voice conversations. By means of software simulations we want to compare this solution with other call admission methods already described in scientific literature in order to locate this proposed method in a more general control scheme context. On the basis of the results we try to evidence the possible advantages of this QoS-Weighted solution in comparison with other similar CAC solutions ( in particular Measured Sum, Bandwidth Equivalent with Hoeffding Bounds, and Simple Measure CAC, on the planes of complexity, stability, management, tune-ability to service level requirements, and compatibility with actual network implementation.

  13. Automation of call setup in IP telephony for tests and measurements

    Science.gov (United States)

    Khasnabish, Bhumip

    1999-11-01

    In IP telephony, a call is usually established in multiple stages. In the first stage, an ingress or call-originating IP-PSTN gateway (GW) is accessed. This is followed by a PIN based caller authentication. Finally, a destination telephone number is entered. If the GWs have enough digital signal processing channels and processing capacity, and the backbone (transport) network can support one T1 CAS port's worth of calls, we should be able to simultaneously start 24 voice connection attempts. The call originating GW should be able to process all the 24 connection requests. However, it appears that most of the currently available IP-PSTN GWs can not handle all 24 simultaneous connection requests. Therefore it is necessary to develop a method to determine the number of calls that can be started simultaneously. It is also required to determine the amount of inter call-burst time gap (in millisec. or sec.) so that all 24 calls will be processed using the existing hardware and software configuration and capacity of the GW. In this paper we develop techniques to perform both of the above functions. These are implemented using Hammer visual basic language for testing some commercially available IP telephony GWs.

  14. Deployment of VoIP Technology: QoS Concerns

    OpenAIRE

    Lazzez, Amor; Slimani, Thabet

    2013-01-01

    Voice over IP (VoIP) is an emerging communication service allowing voice transmission over a private or a public IP network. VoIP allows significant benefits for customers and service providers including cost savings, phone and service portability, mobility, and the integration with other applications. Nevertheless, the deployment of the VoIP technology encounters many challenges such as interoperability issues, security issues, and QoS concerns. Among these disadvantages, QoS issues are cons...

  15. Understanding VoIP Internet Telephony and the Future Voice Network

    CERN Document Server

    Flanagan, William A

    2012-01-01

    Translates technical jargon into practical business communications solutions This book takes readers from traditional voice, fax, video, and data services delivered via separate platforms to a single, unified platform delivering all of these services seamlessly via the Internet. With its clear, jargon-free explanations, the author enables all readers to better understand and assess the growing number of voice over Internet protocol (VoIP) and unified communications (UC) products and services that are available for businesses. VoIP and Unified Communications is based on the author's careful rev

  16. MOBILTEL - Mobile Multimodal Telecommunications dialogue system based on VoIP telephony

    Directory of Open Access Journals (Sweden)

    Anton Čižmár

    2009-10-01

    Full Text Available In this paper the project MobilTel ispresented. The communication itself is becoming amultimodal interactive process. The MobilTel projectprovides research and development activities inmultimodal interfaces area. The result is a functionalarchitecture for mobile multimodal telecommunicationsystem running on handheld device. The MobilTelcommunicator is a multimodal Slovak speech andgraphical interface with integrated VoIP client. Theother possible modalities are pen – touch screeninteraction, keyboard, and display on which theinformation is more user friendly presented (icons,emoticons, etc., and provides hyperlink and scrollingmenu availability.We describe the method of interaction between mobileterminal (PDA and MobilTel multimodal PCcommunicator over a VoIP WLAN connection basedon SIP protocol. We also present the graphicalexamples of services that enable users to obtaininformation about weather or information about trainconnection between two train stations.

  17. Intelligent Advanced Communications IP Telephony Feasibility for the U.S. Navy. Volume 1

    Science.gov (United States)

    2007-10-01

    the vocal tract and the vibration of the vocal chord . If the model of the vocal tract and its vibrations is good, then the error between the actual...from Department of Computer Science at the Columbia University, University of Maryland Advanced Computer Studies, Cisco Systems Inc., and Vocal ...for several open source VoIP software packages, with a special focus of VOCAL , Vovida’s own open communication application library. While VOCAL is the

  18. Telephony user survey

    CERN Multimedia

    IT Department

    2016-01-01

    Let us know your needs to better plan the transition to a new CERN telephony system.   CERN is planning to upgrade its telephony network and replace the system with a new and modern VoIP infrastructure. We strive to make this transition as beneficial and smooth as possible for you. Please let us know more about your current working environment, expectations and suggestions by responding to this survey: https://cern.ch/tel-survey. The more answers we get, the better the new system will serve everyone in the future. The survey will take you about five minutes to complete; we are counting on your feedback!

  19. Deploying a simple voice over IP network using a simulation tool

    OpenAIRE

    Limbu, Prajil

    2016-01-01

    Voice over IP is a major advancement in the field of IP communications systems technology since the advent of Internet. It is a communication technology which enables a device to transmit and receive voice traffic with the help of an IP-based network such as the Internet. Various types and deployments of Voice over IP are prevailing due to its popularity since its origin. Since its advent, it has managed to evolve and has given a platform to be benefited with its numerous advantages not only ...

  20. Fixed telephony evolution at CERN

    CERN Document Server

    CERN. Geneva

    2015-01-01

    The heart of CERN’s telephony infrastructure consists of the Alcatel IP-PBX that links CERN’s fixed line phones, Lync softphones and CERN’s GSM subscribers to low-cost local and international telephony services. The PABX infrastructure also supports the emergency “red telephones” in the LHC tunnel and provides vital services for the Fire and Rescue Service and the CERN Control Centre. Although still reliable, the Alcatel hardware is increasingly costly to maintain and looking increasingly outmoded in a market where open source solutions are increasingly dominant. After presenting an overview of the Alcatel PABX and the services it provides, including innovative solutions such as the Closed User Group for our mobile telephony services, we present a possible architecture for a software based system designed to meet tomorrow’s communication needs and describe how the introduction of open-source call routers based on the SIP protocol and Session Border Controllers (SBC) could foster the introduction...

  1. DC powering of Internet certifies for telephony

    Energy Technology Data Exchange (ETDEWEB)

    Aakerlund, J. [Uninterruptible Power Networks UPN AB (Sweden)

    2000-07-01

    Telephony faces new great changes. One paradigm, still current, was established at the beginning of automation in the 1920s. That was when the central battery system was introduced, enabling telephones to be powered over large distances, 3 - 5 km from the telephone exchange. The customers did not have to deal with local batteries anymore. The central battery system was a great step forward, leading to a dramatic increase of service level, availability performance and reliability in telephony. It helped subscribers to make their calls without the need of public power supply or local batteries and at the same time made the telephony system into a very reliable, life-saving, emergency and safety system of great benefit to the entire society. The ''lifeline'' was born. This excellent quality of telephone technology, simple as it is, must not be underrated. If possible, it should be defended and maintained, see figure 1. This can be achieved at low costs when constructing Internet, laying data cables for LANs into almost any building. The present technical development, with datacom, broadband, IP telephony via the Internet, PCs and optical fibre etc., decreases availability performance, reliability and if not independently powered, the ''lifeline'' function. From the point of view of performance availability and power supply, the present technological development will bring us back to the times of the local battery unless the power people take action. This paper describes a possible solution to this problem, and shows what to do to give Internet and IP telephony the same functionality and availability as plain old telephony service (POTS), when it comes to power supply. (orig.)

  2. Objective speech quality measures for Internet telephony

    Science.gov (United States)

    Hall, Timothy A.

    2001-07-01

    Measuring voice quality for telephony is not a new problem. However, packet-switched, best-effort networks such as the Internet present significant new challenges for the delivery of real-time voice traffic. Unlike the circuit-switched PSTN, Internet protocol (IP) networks guarantee neither sufficient bandwidth for the voice traffic nor a constant, minimal delay. Dropped packets and varying delays introduce distortions not found in traditional telephony. In addition, if a low bitrate codec is used in voice over IP (VoIP) to achieve a high compression ratio, the original waveform can be significantly distorted. These new potential sources of signal distortion present significant challenges for objectively measuring speech quality. Measurement techniques designed for the PSTN may not perform well in VoIP environments. Our objective is to find a speech quality metric that accurately predicts subjective human perception under the conditions present in VoIP systems. To do this, we compared three types of measures: perceptually weighted distortion measures such as enhanced modified Bark spectral distance (EMBSD) and measuring normalizing blocks (MNB), word-error rates of continuous speech recognizers, and the ITU E-model. We tested the performance of these measures under conditions typical of a VoIP system. We found that the E-model had the highest correlation with mean opinion scores (MOS). The E-model is well-suited for online monitoring because it does not use the original (undistorted) signal to compute its quality metric and because it is computationally simple.

  3. Change of Mobile Telephony Operator

    CERN Multimedia

    2015-01-01

    Following a call for tenders issued in 2014, CERN has agreed a contract with Swisscom for the provision of mobile telephony services from 1 July 2015.     The Sunrise equipment on CERN sites will therefore be switched off from this date and people with a CERN mobile subscription will need to exchange their Sunrise SIM card for a new one from Swisscom, with a new mobile number (the last 4 digits will remain the same). We cannot give further details at present as we are still finalising arrangements for the deployment of the new network with Swisscom, but detailed information on the steps to be followed will be given well in advance of the changeover. Communication Systems Group Information Technology Department 

  4. Beethoven: architecture for media telephony

    Science.gov (United States)

    Keskinarkaus, Anja; Ohtonen, Timo; Sauvola, Jaakko J.

    1999-11-01

    This paper presents a new architecture and techniques for media-based telephony over wireless/wireline IP networks, called `Beethoven'. The platform supports complex media transport and mobile conferencing for multi-user environments having a non-uniform access. New techniques are presented to provide advanced multimedia call management over different media types and their presentation. The routing and distribution of the media is rendered over the standards based protocol. Our approach offers a generic, distributed and object-oriented solution having interfaces, where signal processing and unified messaging algorithms are embedded as instances of core classes. The platform services are divided into `basic communication', `conferencing' and `media session'. The basic communication form platform core services and supports access from scalable user interface to network end-points. Conferencing services take care of media filter adaptation, conversion, error resiliency, multi-party connection and event signaling, while the media session services offer resources for application-level communication between the terminals. The platform allows flexible attachment of any number of plug-in modules, and thus we use it as a test bench for multiparty/multi-point conferencing and as an evaluation bench for signal coding algorithms. In tests, our architecture showed the ability to easily be scaled from simple voice terminal to complex multi-user conference sharing virtual data.

  5. SPAM over Internet Telephony and how to deal with it

    CERN Document Server

    Schmidt, Andreas U; Khayari, Rachid El

    2008-01-01

    In our modern society telephony has developed to an omnipresent service. People are available at anytime and anywhere. Furthermore the Internet has emerged to an important communication medium. These facts and the raising availability of broadband internet access has led to the fusion of these two services. Voice over IP or short VoIP is the keyword, that describes this combination. The advantages of VoIP in comparison to classic telephony are location independence, simplification of transport networks, ability to establish multimedia communications and the low costs. Nevertheless one can easily see, that combining two technologies, always brings up new challenges and problems that have to be solved. It is undeniable that one of the most annoying facet of the Internet nowadays is email spam. According to different sources email spam is considered to be 80 to 90 percent of the email traffic produced. The threat of so called voice spam or Spam over Internet Telephony (SPIT) is even more fatal, for the annoyance...

  6. Analysis and Applications of Session Initiation Protocol(SIP)in Internet Telephony

    Institute of Scientific and Technical Information of China (English)

    LUO Lin; WARFIELD Bob

    2005-01-01

    Session Initiation Protocol(SIP)is a key technology in the Internet telephony or Voice-over-IP(VoIP), also it is an important signaling technology in the next generation multimedia communications.Based on the comparison between SIP and H.323 technology,this paper concludes the advantages of SIP.Then grounded on the major components and their interaction,it analyzes the mechanism and features of the Internet telephony based on SIP.Finally,it discusses the disadvantages of SIP and provides the emphasis of future work.

  7. Modular Design of Call Control Layer in Telephony Software

    Directory of Open Access Journals (Sweden)

    Ilija Basicevic

    2011-01-01

    Full Text Available An important property of a telephony system is the call control model on which it is based. It is noted that many call control models in the past, especially those in PSTN/ISDN networks follow centralized model. For such a model, typical is significant coupling of modules belonging to different services with the basic call control module which is aware of all active telephony features in the system. Although sometimes based on distributed model, VoIP call control models still manifest some of the listed problems of their predecessors. In this paper we present a fully distributed model which exhibits minimal coupling of modules belonging to different services and a simple basic call control module. The model is based on taxonomies of call control services which are presented in the paper. Also, the implementation of several typical services is described.

  8. Digital telephony and network integration

    CERN Document Server

    Keiser, Bernhard E

    1995-01-01

    What is "digital telephony"? To the authors, the term digital telephony denotes the technology used to provide a completely digital telecommunication system from end-to-end. This implies the use of digital technology from one end instru­ ment through transmission facilities and switching centers to another end instru­ ment. Digital telephony has become possible only because of the recent and on­ going surge of semiconductor developments, allowing microminiaturization and high reliability along with reduced costs. This book deals with both the future and the present. Thus, the first chapter is entitled, "A Network in Transition." As baselines, Chapters 2 and 11 provide the reader with the present status of teler-hone technology in terms of voice digiti­ zation as well as switching principles. The book is an outgrowth of the authors' consulting and teaching experience in the field since the early 1980s. The book has been written to provide both the engineering student and the practicing engineer a working k...

  9. Voice over IP Security

    CERN Document Server

    Keromytis, Angelos D

    2011-01-01

    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse. In this book, the authors examine the

  10. Analyzing of MOS and Codec Selection for Voice over IP Technology

    Directory of Open Access Journals (Sweden)

    Mohd Nazri Ismail

    2009-01-01

    Full Text Available In this research, we propose an architectural solution to implement the voice over IP (VoIP service in campus environment network. Voice over IP (VoIP technology has become a discussion issue for this time being. Today, the deployment of this technology on an organization truly can give a great financial benefit over traditional telephony. Therefore, this study is to analyze the VoIP Codec selection and investigate the Mean Opinion Score (MOS performance areas evolved with the quality of service delivered by soft phone and IP phone. This study focuses on quality of voice prediction such as i accuracy of MOS between automated system and human perception and ii different types of codec performance measurement via human perception using MOS technique. In this study, network management system (NMS is used to monitor and capture the performance of VoIP in campus environment. In addition, the most apparent of implementing soft phone and IP phone in campus environment is to define the best codec selection that can be used in operational environment. Based on the finding result, the MOS measurement through automated and manual system is able to predict and evaluate VoIP performance. In addition, based on manual MOS measurement, VoIP conversations over LAN contribute more reliability and availability performance compare to WAN.

  11. CONSTRAINTS TO USE OF MOBILE TELEPHONY FOR ...

    African Journals Online (AJOL)

    X 6 – Household size, X 7 – Farm size (ha), X ... respondents ranges from 1 to 25 persons. members while average household size was .... batteries. CONCLUSION AND. RECOMMENDATIONS. This study reveals that mobile telephony is.

  12. Covert Channels in SIP for VoIP Signalling

    Science.gov (United States)

    Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for typical IP telephony call.

  13. A Conjoint Analysis of Voice Over IP Attributes.

    Science.gov (United States)

    Zubey, Michael L.; Wagner, William; Otto, James R.

    2002-01-01

    Managers need to understand the tradeoffs associated with voice over Internet protocol (VoIP) networks as compared to the Public Switched Telephone Network (PSTN). This article measures the preference structures between IP telephony and PSTN services using conjoint analysis. The purpose is to suggest VoIP technology attributes that best meet…

  14. Covert Channels in SIP for VoIP signalling

    CERN Document Server

    Mazurczyk, Wojciech

    2008-01-01

    In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for typical IP telephony call.

  15. Initiated Protocol Telephony Feasibility for the US Navy, Embedded Proof-of-Concept

    Science.gov (United States)

    2011-03-01

    volume 11. Adjustable handset , headset, and speakerphone receiver/microphone volume 12. 4 programmable memory buttons. 13. Caller ID, Call...into flash memory so that the setup is recalled (persistent) when the phones are power cycled . Unicoi has a small file system implemented in flash...Intelligent Advanced Communications IP Telephony Feasibility for the US Navy – Phase 3 1.4.11 Info Subsystem Centralized access to configuration

  16. IP telephony based danger alert communication system and its implementation

    Science.gov (United States)

    Rezac, Filip; Safarik, Jakub; Voznak, Miroslav; Tomala, Karel; Partila, Pavol

    2013-05-01

    This article discusses a danger alert system created as a part of the research project at Department of Telecommunications of Technical University of Ostrava. The aim of the system is to distribute pre-recorded voice messages in order to alert the called party in danger. This article describes individual technologies, which the application uses for its operation as well as issues relating to hardware requirements and transfer line bandwidth load. The article also describes new algorithms, which had to be developed in order to ensure the reliability of the system. Our intent is focused on disaster management, the message, which should be delivered within specified time span, is typed in the application and text-to-speech module ensures its transformation to a speech format, after that a particular scenario or warned area is selected and a target group is automatically unloaded. For this purpose, we have defined XML format for delivery of phone numbers which are located in the target area and these numbers are obtained from mobile BTS's (Base transmission stations). The benefit of such communication compared to others, is the fact, that it uses a phone call and, therefore, it is possible to get feedback who accepted the message and to improve efficiency of alert system. Finally, the list of unanswered calls is exported and these users can be informed via SMS.

  17. IP Telephony Based Danger Alert Communication System and Its Implementation

    Directory of Open Access Journals (Sweden)

    Filip Rezac

    2012-01-01

    Full Text Available The paper deals with development of a web application allowing to deliver pre-recorded voice messages by using SIP generator. The developed application is a part of complex system, which has been evolved in Dpt. of Telecommunications, Technical University of Ostrava for last three years. Our intent is focused on disaster management, the message, which should be delivered within specified time span, is typed in the application and text-to-speech module ensures its transormation to a speech format, after that a particular scenario or warned area is selected and a target group is automatically unloaded. For this purpose, we have defined XML format for delivery of phone numbers which are located in the target area and these numbers are obtained from mobile BTS's (Base transmission stations. The advantage of this aproach lies in controlled delivery and finally the list of unanswered calls is exported and these users are informed via SMS. In the paper, the core of the danger alert system is described including algorithms of the voice message delivery.

  18. Phonion: Practical Protection of Metadata in Telephony Networks

    Directory of Open Access Journals (Sweden)

    Heuser Stephan

    2017-01-01

    Full Text Available The majority of people across the globe rely on telephony networks as their primary means of communication. As such, many of the most sensitive personal, corporate and government related communications pass through these systems every day. Unsurprisingly, such connections are subject to a wide range of attacks. Of increasing concern is the use of metadata contained in Call Detail Records (CDRs, which contain source, destination, start time and duration of a call. This information is potentially dangerous as the very act of two parties communicating can reveal significant details about their relationship and put them in the focus of targeted observation or surveillance, which is highly critical especially for journalists and activists. To address this problem, we develop the Phonion architecture to frustrate such attacks by separating call setup functions from call delivery. Specifically, Phonion allows users to preemptively establish call circuits across multiple providers and technologies before dialing into the circuit and does not require constant Internet connectivity. Since no single carrier can determine the ultimate destination of the call, it provides unlinkability for its users and helps them to avoid passive surveillance. We define and discuss a range of adversary classes and analyze why current obfuscation technologies fail to protect users against such metadata attacks. In our extensive evaluation we further analyze advanced anonymity technologies (e.g., VoIP over Tor, which do not preserve our functional requirements for high voice quality in the absence of constant broadband Internet connectivity and compatibility with landline and feature phones. Phonion is the first practical system to provide guarantees of unlinkable communication against a range of practical adversaries in telephony systems.

  19. Providing emergency services in Internet telephony

    Science.gov (United States)

    Schulzrinne, Henning G.; Arabshian, Knarig

    2002-07-01

    Assisting during emergencies is one of the important functions of the telephone system. Emergency communications has three components: summoning help during emergencies, coordinating emergency response and notifying citizens and public officials of local emergencies. As we transition to an Internet-based telecommunications system, these functions need to be provided, but there is also an opportunity to add new functionality and improve scalability and robustness. We discuss three aspects of Internet-based communications related to emergencies: First, we describe how Internet telephony can be used to provide emergency call (``911'' or ``112'') services. Secondly, Internet telephony needs to be enhanced to allow prioritized access to communications resources during emergency-induced network congestion. Finally, Internet event notification can be a valuable new mechanism to alert communities to pending or on-going emergencies such as hurricanes or chemical spills.

  20. Analysis of a voip telephony system with environment of ururau discrete event simulation software

    Directory of Open Access Journals (Sweden)

    Italo dos Santos Ferreira

    2016-11-01

    Full Text Available The aim of this study is to evaluate the free and open-source discrete event simulation software, Ururau. A voice over IP telephony system model was constructed in order to to evaluate the dimensioning of the resources. The model designed in Ururau was tested and compared to the results of another model of the same system, built with commercial software package Arena. The results of the simulation showed that the current system easily meets institutional demand and that resources are being underused. The results also demonstrated the viability of using of Ururau for small applications.

  1. Income, Inequality, Market Potential, and Diffusion of Mobile Telephony

    Science.gov (United States)

    Kim, Sungjoong

    2009-01-01

    The diffusion of many previous innovations eventually slowed down and reached an equilibrium level. Despite continued rapid growth, it is possible that the diffusion of mobile telephony will also begin to decelerate and reach a saturation level. Whether universal service can be achieved with the help of mobile telephony will therefore depend…

  2. Income, Inequality, Market Potential, and Diffusion of Mobile Telephony

    Science.gov (United States)

    Kim, Sungjoong

    2009-01-01

    The diffusion of many previous innovations eventually slowed down and reached an equilibrium level. Despite continued rapid growth, it is possible that the diffusion of mobile telephony will also begin to decelerate and reach a saturation level. Whether universal service can be achieved with the help of mobile telephony will therefore depend…

  3. Qos and Voice Over IP

    Directory of Open Access Journals (Sweden)

    Adrian GHENCEA

    Full Text Available As Voice over Internet Protocol (VoIP technology matures, companies are increasingly adopting it to cut costs, improve efficiency and enhance customer service. Using the Internet as an existing network for integrating data and telecom systems through intelligent VoIP, a range of benefits results: lower long distance costs, cost cuts in cabling processes and more flexible telephony management. However, as voice over IP services grow in popularity, major threats arise: this rapid growth leads to traffic congestion, security is jeopardizedand the poor quality of calls affects communication. The objective of this article is to present all the elements that can affect voicequality in a VoIP network and to provide methods for solving them. A detailed analysis to minimize the impact of implementation of QoS will be made, and at the end solutions to management strategies will be proposed.

  4. Audio CAPTCHA for SIP-Based VoIP

    Science.gov (United States)

    Soupionis, Yannis; Tountas, George; Gritzalis, Dimitris

    Voice over IP (VoIP) introduces new ways of communication, while utilizing existing data networks to provide inexpensive voice communications worldwide as a promising alternative to the traditional PSTN telephony. SPam over Internet Telephony (SPIT) is one potential source of future annoyance in VoIP. A common way to launch a SPIT attack is the use of an automated procedure (bot), which generates calls and produces audio advertisements. In this paper, our goal is to design appropriate CAPTCHA to fight such bots. We focus on and develop audio CAPTCHA, as the audio format is more suitable for VoIP environments and we implement it in a SIP-based VoIP environment. Furthermore, we suggest and evaluate the specific attributes that audio CAPTCHA should incorporate in order to be effective, and test it against an open source bot implementation.

  5. Troublesome telephony: how users and non-users shaped the development of early British exchange telephony

    Directory of Open Access Journals (Sweden)

    Dr Michael Kay

    2015-05-01

    Full Text Available When exchange telephony was first marketed to the British public by the early telephone companies in the late nineteenth century it was as an intuitive technology requiring no specialist knowledge or training. This has gone unquestioned in subsequent telephone historiography but, as this article demonstrates, telephone instruments and systems were not always unproblematic or easy to use. Whilst other scholars have discussed important factors in the development and uptake of telephony, such as business economics and intellectual property, this article focuses on usage, and argues that difficulties in using telephone instruments and systems also influenced key changes in the operations of early British exchange systems. To understand these responses and developments it is necessary to look at the opinions and complaints of both users and non-users of telephone exchange systems. In investigating non-users as well as users, this article is influenced by the work of Sally Wyatt in Oudshoorn and Pinch's (2003 edited volume regarding users and non-users of technologies. Recovering the reactions of such people is possible through extensive use of letters received by the telephone companies or published in the periodical press, and opinions voiced at select committee meetings investigating the state of the country's telephone system. In recovering the difficulties early users and non-users faced when confronted with exchange telephone systems this article emphasises the importance of problematising the historical uptake of new technologies, and highlights how, in the case of early British telephony in particular, these problems can reveal specific facts both about historical telephone use-experience and about how exchange telephony spread around the country.

  6. Comprehensive Comparison of VoIP SIP Protocol Problems and Cisco VoIP System

    Directory of Open Access Journals (Sweden)

    TALAL AL-KHAROBI

    2012-08-01

    Full Text Available Voice over IP (VoIP, use of the packet switched internet for telephony, has improved substantially in the past few years. On the other hand, VoIP has many challenges that do not exist in the public switched telephone network (PSTN, a circuit switched system. VoIP is an application running on the internet, and therefore inherits the internet’s security issues. It is important to realise that VoIP is a relatively young technology, and with any new technology, security typically improves with maturity. This paper provides a comprehensive comparison of a VoIP SIP protocol and CISCO VoIP system. The comparison involves the investigation of the vulnerabilities that target both systems and how secure each system is. With this comparison we present our conclusion on which system is more secure.

  7. Improvement on QoS of VoIP

    Institute of Scientific and Technical Information of China (English)

    HUANGYongfeng; LIXing; RUANFang

    2003-01-01

    This paper first introduces some factors affecting QoS of VoIP System, and presents some strategies to improve VoIP speech quality. Studies are concentrated on an adaptive algorithms based on IP telephony gateway, which includes adopting buffer to smooth the jitter, low bit rate redundancy packet sending mechanism to recover the packet loss, a delay and loss measurement mechanism based on RTP (Real-time transmit protocol), and an adaptive scheme algorithm according to the loss ratio and end to end delay. Finally, the results of testing have denoted that these adaptive mechanisms applied in gateway can improve greatly QoS of VoIP.

  8. VoIP attacks detection engine based on neural network

    Science.gov (United States)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  9. Research on Open-Source VoIP Technologies for NGN Service Platform Deployment%利用开源VoIP技术建设NGN业务平台的应用研究

    Institute of Scientific and Technical Information of China (English)

    夏雷; 汪少敏; 钟青峰

    2012-01-01

    Open-source VoIP technologies can be employed to setup VoIP platforms by deploying open-source software on x86 servers, which have many advantages such as low cost, flexibility and openness. The usage of open-source VoIP technologies in NGN service platform deployment helps to reduce carrier's investment, shorten service deployment cycle and improve the duplicability of service platform. In the paper, the architecture of NGN service platform deployed by open-source VoIP technologies is proposed based on comprehensive survey and detailed analysis. A typical example is also provided to evaluate the feasibility and advantages of the proposed NGN service platform deployment method.%开源VoIP技术是一种利用开源软件部署在x86服务器上形成专业VoIP平台的解决方案,具有低成本性、高可用性、灵活性和开放性的优势.利用开源VoIP技术建设NGN业务平台能很好地解决目前运营商建设方式中建设维护成本较高、新业务部署周期较长、可复制性不高的问题.本文在全面分析开源VoIP平台解决方案的基础上,结合电信运营商业务平台的现状,深入研究了开源技术在电信运营商业务平台建设中的应用,提出了利用开源VoIP技术构建NGN业务平台的架构,给出了一个实现范例,评估了利用开源VoIP技术构建NGN业务平台的可用性和优势.

  10. A Stepwise Approach to Developing Languages for SIP Telephony Service Creation

    DEFF Research Database (Denmark)

    Palix, Nicolas; Consel, Charles; Reveillere, Laurent

    2007-01-01

    Developing a SIP-based telephony service requires a programmer to have expertise in telephony rules and constraints, the SIP protocol, distributed systems, and a SIP API, which is often large and complex. These requirements make the development of telephony software an overwhelming challenge...

  11. Architecture of fast IP forwarding engine in gigabit ethernet system

    Science.gov (United States)

    Do, Han C.; Lee, Hyeong H.; Cha, Kyoon Hyun

    1999-11-01

    In recent years, Internet traffic has been increased rapidly as a result of the Internet which accommodates multimedia traffic such as IP telephony and video conference. Gigabit routing technology is one possible approach to handle such internet traffic. This paper presents an efficient IP forwarding architecture adequate for Gigabit Ethernet switching system. The presented IP forwarding architecture is based upon distributed and pipelined process, which can effectively facilitate searching, editing, traffic classification, forwarding, and traffic management in parallel. Additionally, it can also process packets at full wire-speed in the ASIC level.

  12. Service Creation and Deployment in Converged Networks

    DEFF Research Database (Denmark)

    Soler, José

    This monograph (Early Experiences related to Service Creation & Deployment in Converged Networks) presents different experiences related to architectures and mechanisms for deployment of telephony services, understood as especial features complementing the basic voice service. The context...... for these experiences is the transition of telecommunication (telephony) networks from circuit switched based systems towards packet based ones. The text of this monograph proceeds, unaltered for the most, from the author’s PhD thesis “Framework for Deployment of Advanced Telecommunication Services in Current...... and Future Converged Networks”, carried out at the Technical University of Denmark in the period [April 2002-April 2005]. Even though the technologies presented in the text have evolved from that period until now, the presented scenarios and setups are still valid as interesting initial steps in the realm....

  13. What are suspicious VoIP delays?

    CERN Document Server

    Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    2010-01-01

    Voice over IP (VoIP) is unquestionably the most popular real-time service in IP networks today. Recent studies have shown that it is also a suitable carrier for information hiding. Hidden communication may pose security concerns as it can lead to confidential information leakage. In VoIP, RTP (Real-time Transport Protocol) in particular, which provides the means for the successful transport of voice packets through IP networks, is suitable for steganographic purposes. It is characterised by a high packet rate compared to other protocols used in IP telephony, resulting in a potentially high steganographic bandwidth. The modification of an RTP packet stream provides many opportunities for hidden communication as the packets may be delayed, reordered or intentionally lost. In this paper, to enable the detection of steganographic exchanges in VoIP, we examined real RTP traffic traces to answer the questions, what do the "normal" delays in RTP packet streams look like? and, is it possible to detect the use of know...

  14. VoIP Steganography and Its Detection - A Survey

    CERN Document Server

    Mazurczyk, Wojciech

    2012-01-01

    Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to secret information into a carrier message. Steganographic methods are usually aimed at hiding the very existence of the communication. Due to the rise in popularity of IP telephony, together with the large volume of data and variety of protocols involved, it is currently attracting the attention of the research community as a perfect carrier for steganographic purposes. This paper is a survey of the existing VoIP steganography (steganophony) methods and their countermeasures.

  15. Risks of carcinogenesis from electromagnetic radiation of mobile telephony devices.

    Science.gov (United States)

    Yakymenko, I; Sidorik, E

    2010-07-01

    Intensive implementation of mobile telephony technology in everyday human life during last two decades has given a possibility for epidemiological estimation of long-term effects of chronic exposure of human organism to low-intensive microwave (MW) radiation. Latest epidemiological data reveal a significant increase in risk of development of some types of tumors in chronic (over 10 years) users of mobile phone. It was detected a significant increase in incidence of brain tumors (glioma, acoustic neuroma, meningioma), parotid gland tumor, seminoma in long-term users of mobile phone, especially in cases of ipsilateral use (case-control odds ratios from 1.3 up to 6.1). Two epidemiological studies have indicated a significant increase of cancer incidence in people living close to the mobile telephony base station as compared with the population from distant area. These data raise a question of adequacy of modern safety limits of electromagnetic radiation (EMR) exposure for humans. For today the limits were based solely on the conception of thermal mechanism of biological effects of RF/MW radiation. Meantime the latest experimental data indicate the significant metabolic changes in living cell under the low-intensive (non-thermal) EMR exposure. Among reproducible biological effects of low-intensive MWs are reactive oxygen species overproduction, heat shock proteins expression, DNA damages, apoptosis. The lack of generally accepted mechanism of biological effects of low-intensive non-ionizing radiation doesn't permit to disregard the obvious epidemiological and experimental data of its biological activity. Practical steps must be done for reasonable limitation of excessive EMR exposure, along with the implementation of new safety limits of mobile telephony devices radiation, and new technological decisions, which would take out the source of radiation from human brain.

  16. Intelligent Advanced Communications IP Telephony Feasibility for the US Navy - Phase 3

    Science.gov (United States)

    2011-03-01

    www.ekiga.org, July 2, 2007. Kphone, http://sourceforge.net/projects/kphone/, July 2, 2007. Minisip, http://www.minisip.org, July 2, 2007. Zap ...The Mozilla SIP Client, http://www.croczilla.com/ zap , July 5, 2007. The eXtended oslibrary, http://savannah.nongnu.org/projects/exosip, July 2

  17. Intelligent Advanced Communications IP Telephony Feasibility for the U.S. Navy: Phase 2

    Science.gov (United States)

    2009-03-31

    It is classified as an interior gateway protocol ( IGP ) using the distance-vector routing algorithm. It was first defined in RFC 1058 (1988). The...The updates for IPv6 are specified as OSPF Version 3 in RFC 5340 (2008)13. OSPF is perhaps the most widely-used interior gateway protocol ( IGP ) in...a path vector protocol. BGP does not use traditional IGP metrics, but makes routing decisions based on path, network policies and/or rule sets

  18. The Village Telco project: a reliable and practical wireless mesh telephony infrastructure

    Directory of Open Access Journals (Sweden)

    Gardner-Stephen Paul

    2011-01-01

    Full Text Available Abstract VoIP (Voice over IP over mesh networks could be a potential solution to the high cost of making phone calls in most parts of Africa. The Village Telco (VT is an easy to use and scalable VoIP over meshed WLAN (Wireless Local Area Network telephone infrastructure. It uses a mesh network of mesh potatoes to form a peer-to-peer network to relay telephone calls without landlines or cell phone towers. This paper discusses the Village Telco infrastructure, how it addresses the numerous difficulties associated with wireless mesh networks, and its efficient deployment for VoIP services in some communities around the globe. The paper also presents the architecture and functions of a mesh potato and a novel combined analog telephone adapter (ATA and WiFi access point that routes calls. Lastly, the paper presents the results of preliminary tests that have been conducted on a mesh potato. The preliminary results indicate very good performance and user acceptance of the mesh potatoes. The results proved that the infrastructure is deployable in severe and under-resourced environments as a means to make cheap phone calls and render Internet and IP-based services. As a result, the VT project contributes to bridging the digital divide in developing areas.

  19. Maintaining high-quality IP audio services in lossy IP network environments

    Science.gov (United States)

    Barton, Robert J., III; Chodura, Hartmut

    2000-07-01

    In this paper we present our research activities in the area of digital audio processing and transmission. Today's available teleconference audio solutions are lacking in flexibility, robustness and fidelity. There was a need for enhancing the quality of audio for IP-based applications to guarantee optimal services under varying conditions. Multiple tests and user evaluations have shown that a reliable audio communication toolkit is essential for any teleconference application. This paper summarizes our research activities and gives an overview of developed applications. In a first step the parameters, which influence the audio quality, were evaluated. All of these parameters have to be optimized in order to result into the best achievable quality. Therefore it was necessary to enhance existing schemes or develop new methods. Applications were developed for Internet-Telephony, broadcast of live music and spatial audio for Virtual Reality environments. This paper describes these applications and issues of delivering high quality digital audio services over lossy IP networks.

  20. Implications of Privatizing U.S Marine Deployed Tactical Telecommunications

    Science.gov (United States)

    2012-05-01

    particularly as it pertains to mobility of the telecom networks and the threat as a consequence of operating in combat environments.5 For the U.S...private companies can rapidly mobilize the requisite manpower structure to support the requirements of the military. 12 These critical skills that...redistribution, BGP and performance, security, NAT, DHCP, IP telephony, IPv6 , advanced services and VPNs. Target Population: Lance Corporal and above

  1. Mobile IP

    NARCIS (Netherlands)

    Heijenk, Geert; Sallent, S.; Pras, A.

    1999-01-01

    The Internet is growing exponentially, both in the amount of traffic carried, and in the amount of hosts connected. IP technology is becoming more and more important, in company networks (Intranets), and also in the core networks for the next generation mobile networks. Further, wireless access to I

  2. Mobile IP

    NARCIS (Netherlands)

    Heijenk, Gerhard J.; Sallent, S.; Pras, Aiko

    1999-01-01

    The Internet is growing exponentially, both in the amount of traffic carried, and in the amount of hosts connected. IP technology is becoming more and more important, in company networks (Intranets), and also in the core networks for the next generation mobile networks. Further, wireless access to

  3. Differential Fault Attack on KASUMI Cipher Used in GSM Telephony

    Directory of Open Access Journals (Sweden)

    Zongyue Wang

    2014-01-01

    Full Text Available The confidentiality of GSM cellular telephony depends on the security of A5 family of cryptosystems. As an algorithm in this family survived from cryptanalysis, A5/3 is based on the block cipher KASUMI. This paper describes a novel differential fault attack on KAUSMI with a 64-bit key. Taking advantage of some mathematical observations on the FL, FO functions, and key schedule, only one 16-bit word fault is required to recover all information of the 64-bit key. The time complexity is only 232 encryptions. We have practically simulated the attack on a PC which takes only a few minutes to recover all the key bits. The simulation also experimentally verifies the correctness and complexity.

  4. Hardware IP security and trust

    CERN Document Server

    Bhunia, Swarup; Tehranipoor, Mark

    2017-01-01

    This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

  5. Change to mobile telephony coverage and billing in France

    CERN Multimedia

    IT Department

    2016-01-01

    Following recent discussions with the French and Swiss authorities, it has become clear that it is not permitted for a mobile telephony provider from one host state to transmit signals from the territory of the other. As a result, the Swisscom transmitters in France will be turned off on 29 August. From that date, coverage in France will be provided by Orange France. Users with a private subscription will be pleased to note that they will again have the ability to identify calls as private as from 18 July.   In order to ensure that you can still be contacted by your colleagues, please make sure that you have enabled roaming for voice calls. Instructions for common phone models are available at https://cern.ch/gsm-france/content/instructions. If you make use of data services, you will also need to enable data roaming to, for example, access your email whilst in France, but note that use of data services will be charged. Special arrangements have been put in place by Swisscom to ensure that k...

  6. Comparison of QoS guarantee techniques for VoIP over IEEE802.11 wireless LAN

    Science.gov (United States)

    Guo, Fanglu; Chiueh, Tzi-cker

    2008-01-01

    An emerging killer application for enterprise wireless LANs (WLANs) is voice over IP (VoIP) telephony, which promises to greatly improve the reachability and mobility of enterprise telephony service at low cost. None of the commercial IEEE 802.11 WLAN-based VoIP products can support more than ten G.729-quality voice conversations over a single IEEE 802.11b channel on real-world WLANs, even though the physical transmission rate is more than two orders of magnitude higher than an individual VoIP connection's bandwidth requirement. There are two main reasons why these VoIP systems' effective throughput is significantly lower than expected: VoIP's stringent latency requirement and substantial per-WLAN-packet overhead. Time-Division Multiple Access (TDMA) is a well-known technique that provides per-connection QoS guarantee as well as improves the radio channel utilization efficiency. This paper compares the effective throughput of IEEE 802.11, IEEE 802.11e and a software-based TDMA (STDMA) protocol that is specifically designed to support WLAN-based VoIP applications, on the same commodity IEEE 802.11 WLAN hardware. Empirical measurements from a VOIP over WLAN testbed show that the numbers of G.729-quality voice conversations that IEEE 802.11, IEEE 802.11e and STDMA can support over a single IEEE 802.11b channel are 18, 22 and 50, respectively.

  7. Influence of Security Mechanisms on the Quality of Service of VoIP

    Science.gov (United States)

    Backs, Peter; Pohlmann, Norbert

    While Voice over IP (VoIP) is advancing rapidly in the telecommunications market, the interest to protect the data transmitted by this new service is also rising. However, in contrast to other internet services such as email or HTTP, VoIP is real-time media, and therefore must meet a special requirement referred to as Quality-of-Service to provide a comfortable flow of speech. Speech quality is worsened when transmitted over the network due to delays in transmission or loss of packets. Often, voice quality is at a level that even prevents comprehensive dialog. Therefore, an administrator who is to setup a VoIP infrastructure might consider avoiding additional decreases in voice quality resulting from security mechanisms, and might leave internet telephony unprotected as a result. The inspiration for this paper is to illustrate that security mechanisms have negligible impact on speech quality and should in fact be encouraged.

  8. Security Analysis System to Detect Threats on a SIP VoIP Infrasctructure Elements

    Directory of Open Access Journals (Sweden)

    Jiri Vychodil

    2011-01-01

    Full Text Available SIP PBX is definitely the alpha and omega of any IP telephony infrastructure and frequently also provides other services than those related to VoIP traffic. These exchanges are, however, very often the target of attacks by external actors. The article describes a system that was developed on VSB-TU Ostrava as a testing tool to verify if the target VoIP PBX is adequately secured and protected against any real threats. The system tests the SIP element for several usually occurring attacks and it compiles evaluation of its overall security on the basis of successfully or unsuccessfully penetrations. The article describes the applications and algorithms that are used by system and the conclusion consists recommendations and guidelines to ensure effective protection against VoIP PBX threats. The system is designed as an open-source web application, thus allowing independent access and is fully extensible to other test modules.

  9. Facilitating patient self-management through telephony and web technologies in seasonal influenza

    Directory of Open Access Journals (Sweden)

    Zsolt Nagykaldi

    2010-03-01

    Conclusions Primary care patients and their clinicians can adopt and successfully utilise influenza self-management technologies. Our pilot study suggests that web resources combined with telephony technology are feasible to set up and easy to use in primary care settings.

  10. A Technical Approach to the Evaluation of Radiofrequency Radiation Emissions from Mobile Telephony Base Stations.

    Science.gov (United States)

    Buckus, Raimondas; Strukčinskienė, Birute; Raistenskis, Juozas; Stukas, Rimantas; Šidlauskienė, Aurelija; Čerkauskienė, Rimantė; Isopescu, Dorina Nicolina; Stabryla, Jan; Cretescu, Igor

    2017-03-01

    During the last two decades, the number of macrocell mobile telephony base station antennas emitting radiofrequency (RF) electromagnetic radiation (EMR) in residential areas has increased significantly, and therefore much more attention is being paid to RF EMR and its effects on human health. Scientific field measurements of public exposure to RF EMR (specifically to radio frequency radiation) from macrocell mobile telephony base station antennas and RF electromagnetic field (EMF) intensity parameters in the environment are discussed in this article. The research methodology is applied according to the requirements of safety norms and Lithuanian Standards in English (LST EN). The article presents and analyses RF EMFs generated by mobile telephony base station antennas in areas accessible to the general public. Measurements of the RF electric field strength and RF EMF power density were conducted in the near- and far-fields of the mobile telephony base station antenna. Broadband and frequency-selective measurements were performed outside (on the roof and on the ground) and in a residential area. The tests performed on the roof in front of the mobile telephony base station antennas in the near-field revealed the presence of a dynamic energy interaction within the antenna electric field, which changes rapidly with distance. The RF EMF power density values on the ground at distances of 50, 100, 200, 300, 400, and 500 m from the base station are very low and are scattered within intervals of 0.002 to 0.05 μW/cm². The results were compared with international exposure guidelines (ICNIRP).

  11. Energy use of set-top boxes and telephony products in the U.S.

    Energy Technology Data Exchange (ETDEWEB)

    Rosen, Karen B.; Meier, Alan K.; Zandelin, Stefan

    2001-06-01

    The goal of this investigation was to estimate the 1999 energy consumption of set-top boxes and telephony products in the U.S. residential sector. Results of this study will be used to identify new energy conservation opportunities and to align programs with those opportunities. We conducted a bottom-up analysis for set-top boxes and telephony products using our own power measurements and stock and usage estimates from secondary sources. The most common set-top boxes in U.S. homes in 1999 were analog cable boxes, digital cable boxes, wireless receivers, and game consoles. According to these measurements, analog cable boxes and wireless receivers draw between 10 and 15 watts, while digital cable boxes draw between 20 and 25 watts in both the Active and Standby modes. Video games used less than 2 watts in Standby mode, and about 8 watts when Active. We estimate that set-top boxes accounted for 0.7% of residential electricity use in 1999. Our investigation of telephony products included answering machines, cordless phones, cordless phone answering machine combination units, and mobile phone chargers. Answering machines, cordless phones, and combination units use between 2 and 3 watts in both the Active and Standby modes. Mobile phone chargers use about 1 watt in standby. We estimate that these telephony products account for 0.5% of U.S. residential electricity consumption. Together, set-tops and telephony constituted 1.2% of U.S. residential electricity consumption in 1999. Standby power use accounted for about 60% of this energy use. The combined total energy use of the products investigated for this study and those researched previously for this series of reports account for about 6.6% of residential electricity use in the U.S.

  12. Continuously Connected With Mobile IP

    Science.gov (United States)

    2002-01-01

    Cisco Systems developed Cisco Mobile Networks, making IP devices mobile. With this innovation, a Cisco router and its connected IP devices can roam across network boundaries and connection types. Because a mobile user is able to keep the same IP address while roaming, a live IP connection can be maintained without interruption. Glenn Research Center jointly tested the technology with Cisco, and is working to use it on low-earth-orbiting research craft. With Cisco's Mobile Networks functionality now available in Cisco IOS Software release 12.2(4)T, the commercial advantages and benefits are numerous. The technology can be applied to public safety, military/homeland security, emergency management services, railroad and shipping systems, and the automotive industry. It will allow ambulances, police, firemen, and the U.S. Coast Guard to stay connected to their networks while on the move. In the wireless battlefield, the technology will provide rapid infrastructure deployment for U.S. national defense. Airline, train, and cruise passengers utilizing Cisco Mobile Networks can fly all around the world with a continuous Internet connection. Cisco IOS(R) Software is a registered trademark of Cisco Systems.

  13. Analysis of Electric field spatial variability in simulations of electromagnetic waves exposure to mobile telephony base stations

    OpenAIRE

    Diarra Bousso Lo-Ndiaye, Mame; Noé, Nicolas; Combeau, Pierre; Pousset, Yannis; Gaudaire, François

    2015-01-01

    International audience; Numerical simulation is now widely used for modeling of exposure to electromagnetic fields in urban areas, especially in the case of mobile telephony base stations exposure. This is due to the ever-increasing power of computation tools and to the quantity and the quality of available topographic data. The results of such simulations have more and more weight as they allow consultation between the public, mobile telephony companies, associations and local communities. T...

  14. Mobile IP: Security & application

    NARCIS (Netherlands)

    Tuquerres, Gloria; Salvador, Marcos Rogério; Sprenkels, Ron

    1999-01-01

    As required in the TGS Mobile IP Advanced Module, this paper presents a survey of common security threats which mobile IP networks are exposed to as well as some proposed solutions to deal with such threats.

  15. Ensuring Software IP Cleanliness

    Directory of Open Access Journals (Sweden)

    Mahshad Koohgoli

    2007-12-01

    Full Text Available At many points in the life of a software enterprise, determination of intellectual property (IP cleanliness becomes critical. The value of an enterprise that develops and sells software may depend on how clean the software is from the IP perspective. This article examines various methods of ensuring software IP cleanliness and discusses some of the benefits and shortcomings of current solutions.

  16. Evaluation of IP Portfolios

    DEFF Research Database (Denmark)

    Søberg, Peder Veng

    2009-01-01

    As a result of an inquiry concerning how to evaluate IP (intellectual property) portfolios in order to enable the best possible use of IP resources within organizations, an IP evaluation approach primarily applicable for patents and utility models is developed. The developed approach is useful...

  17. Active Network Supports for Mobile IP

    Institute of Scientific and Technical Information of China (English)

    LU Yueming; QIAN Depei; XU Bin; WANG Lei

    2001-01-01

    The basic mobile IP protocol is difficult to implement on the traditional IP network and not flexible and efficient under certain conditions. For example, firewalls or boundary routers may drop packets sent by mobile nodes for security reasons. Traditional networking devices such as routers cannot dynamically load and unload extended services to achieve different qualities of services. In this paper, a new scheme of using the active network to support the mobile IP is presented. The Softnet, a prototype of active networks based on mobile agents,is introduced. The active network is characterized by the programmability of its intermediatenodes and therefore presents dynamic and flexible behaviors. Special services can be dynamically deployed onto the active nodes in the Softnet. This property is definitely required in implementing the mobile IP protocols. The Softnet supports not only the basic mobile IP protocol but also other extended mobile IP protocols. Virtual networks for mobile IP services are dynamically formed by mobile agents in the Softnet to provide different qualities of services.

  18. A quantitative analysis of inter-island telephony traffic in the Pacific Basin Region (PBR)

    Science.gov (United States)

    Evans, D. D.; Arth, C. H.

    1980-01-01

    As part of NASA's continuing assessment of future communication satellite requirements, a study was conducted to quantitatively scope current and future telecommunication traffic demand in the South Pacific Archipelagos. This demand was then converted to equivalent satellite transponder capacities. Only inter-island telephony traffic for the Pacific Basin Region was included. The results show that if all this traffic were carried by a satellite system, one-third of a satellite transponder would be needed to satisfy the base-year (1976-1977) requirement and about two-thirds of a satellite transponder would be needed to satisfy the forecasted 1985 requirement.

  19. IPv6 deployment and management

    CERN Document Server

    Dooley, Michael

    2013-01-01

    A guide for understanding, deploying, and managing Internet Protocol version 6 The growth of the Internet has created a need for more addresses than are available with Internet Protocol version 4 (IPv4)-the protocol currently used to direct almost all Internet traffic. Internet Protocol version 6 (IPv6)-the new IP version intended to ultimately succeed IPv4-will expand the addressing capacity of the Internet to support the explosive growth of users and devices on the Internet as well as add flexibility to allocating addresses and efficiency for routing traffic. IPv6 Deploy

  20. Change of mobile telephony operator and mobile telephone numbers - 24 June 2015

    CERN Document Server

    2015-01-01

    Following a call for tenders issued in 2014, Swisscom will replace Sunrise as CERN’s mobile telephony operator from 24 June 2015. As of this date, CERN mobile telephone numbers will change from the +41 (0)76 487 xxxx format to the +41 (0)75 411 xxxx format and people with a CERN mobile telephony subscription will need to change their SIM card.   SIM card replacement New SIM cards will be available for collection between 1 June and 30 June from distribution points located around CERN. Please check the list of distribution points to find where you will need to collect your SIM card based on your department and group. After 1st July, you will be able to collect your SIM card from the Telecom lab. Please open a SNOW request via this link if: you will not be at CERN in June, you are using a SIM card in a modem or other special device for machine-to-machine communications.   New mobile phone numbers CERN mobile numbers will change from the +41 (0)76 487 xxxx format to the +41...

  1. IP Routing Protocols

    Science.gov (United States)

    Nolasco Pinto, Armando

    2002-03-01

    Uyless Black is a widely known expert in computer networks and data communications. He is author of more than ten books in the communication technologies field, which puts him in a good position to address this topic. In IP Routing Protocols he starts by providing the background and concepts required for understanding TCP/IP technology. This is done clearly and assumes little prior knowledge of the area. As might be expected, he emphasizes the IP route discovery problem. Later he details several routing protocols.

  2. Voice over IP

    OpenAIRE

    Mantula, Juha

    2006-01-01

    Tämä opinnäytetyö käsittelee Voice over Internet Protocol -tekniikkaa ja sen tuomia mahdollisuuksia yrityselämässä. Teoriaosa käsittelee VoIP:n kannalta tärkeitä pro-tokollia ja standardeja, VoIP:n ominaisuuksia sekä esittelee erilaisia puheohjelmia, jotka käyttävät VoIP-tekniikkaa hyväkseen. Empiirinen osuus tutkii Viestintä Ky Pitkärannan Skype-ohjelman käyttöä. Työn tarkoituksena on selvittää VoIP:n hyviä ja huonoja puolia ja sitä kuinka tek-niikkaa voidaan käyttää hyväksi päivittäisessä ...

  3. Impact of VoIP and QoS on Open and Distance Learning

    Directory of Open Access Journals (Sweden)

    Sanjay JASOLA

    2006-07-01

    Full Text Available Voice over Internet Protocol (VoIP is becoming a reality in many organizations. The potential for mobility in voice over wi-fi networks will derive demand for the technology. Wireless VoIP is poised to rival VoIP as an alternative telephony tool. Internet has been used to transport data in the form of packet. In the past, Internet did not support any kind of sophisticated quality of service (QoS mechanism. Although the type of service (TOS field in the Internet protocol (IP header has been existing and has been allowing the differentiated treatment of packets, it was never really used on a large scale. The voice is sensitive to delay and jitter so bandwidth must be guaranteed while transporting it. With the extensive use of Internet for carrying voice, there is a need to add QoS functionality in it. QoS with reference to VoIP has been discussed in the paper. Limited bandwidth and network latency are the issues which need to be considered while using wireless LAN for packetized voice data. Efforts of standards like 802.11e which will take care of these issues, have also been explored. The impact of these technologies on distance education has also been explored in the paper.

  4. Deployment Repeatability

    Science.gov (United States)

    2016-08-31

    potential future space-based mission through large-scale, ground-based testing. Full-scale deployment testing of two petal segments combined with...capture data for incorporation into larger analysis models. Stability testing of two full-scale composite strongback segments , including in a relevant...errors. The NuSTAR project opted for a metrology and adjustment system, which had many advantages for the project and few disadvantages . Because a

  5. Deployment Repeatability

    Science.gov (United States)

    2016-04-01

    controlled to great precision, but in a Cubesat , there may be no attitude determination at all. Such a Cubesat might treat sun angle and tumbling rates as...could be sensitive to small differences in motor controller timing. In these cases, the analyst might choose to model the entire deployment path, with...knowledge of the material damage model or motor controller timing precision. On the other hand, if many repeated and environmentally representative

  6. Deployable centralizers

    Energy Technology Data Exchange (ETDEWEB)

    Grubelich, Mark C.; Su, Jiann-Cherng; Knudsen, Steven D.

    2017-02-28

    A centralizer assembly is disclosed that allows for the assembly to be deployed in-situ. The centralizer assembly includes flexible members that can be extended into the well bore in situ by the initiation of a gas generating device. The centralizer assembly can support a large load carrying capability compared to a traditional bow spring with little or no installation drag. Additionally, larger displacements can be produced to centralize an extremely deviated casing.

  7. Deployment Guide

    Science.gov (United States)

    1994-02-01

    family/unit briefings (to include POA/wills/ consumer law /insurance war clauses) - Provide fill-in-blank sheets to send coordinators of pre- deployment...services. 2. SGLI designations and "By Law" implications. 3. Wills for both spouses. 4. Powers of Attorney. 5. Consumer law issues. 1-7 B. Typically...Relief Act JA 261 Real Property Guide JA 262 Wills Guide JA 263 Family Law Guide JA 265 Consumer Law Guide JA 267 Legal Assistance Office Directory

  8. Management of speech and video telephony quality in heterogeneous wireless networks

    CERN Document Server

    Lewcio, Błażej

    2014-01-01

    This book shows how networking research and quality engineering can be combined to successfully manage the transmission quality when speech and video telephony is delivered in heterogeneous wireless networks. Nomadic use of services requires intelligent management of ongoing transmission, and to make the best of available resources many fundamental trade-offs must be considered. Network coverage versus throughput and reliability of a connection is one key aspect, efficiency versus robustness of signal compression is another. However, to successfully manage services, user-perceived Quality of Experience (QoE) in heterogeneous networks must be known, and the perception of quality changes must be understood.  These issues are addressed in this book, in particular focusing on the perception of quality changes due to switching between diverse networks, speech and video codecs, and encoding bit rates during active calls.

  9. A Novel Smart Meter Controlling System with Dynamic IP Addresses

    DEFF Research Database (Denmark)

    Manembu, Pinrolinvic; Welang, Brammy; Kalua Lapu, Aditya

    2017-01-01

    Smart meters are the electronic devices for measuring energy consumption in real time. Usually, static public IP addresses are allocated to realize the point-to-point (P2P) communication and remote controlling for smart metering systems. This, however, restricts the wide deployment of smart meters......, due to the deficiency of public IP resources. This paper proposes a novel subscription-based communication architecture for the support of dynamic IP addresses and group controlling of smart meters. The paper evaluates the proposed architecture by comparing the traditional P2P architecture......, and validate its effectiveness to interact with smart meters....

  10. IP over DWDM

    Science.gov (United States)

    Allen, Mark E.

    2003-04-01

    The industry has been full of many lively debates about exactly how the functions of layer 1 and 2 (physical layer and data-link layer) will be orchestrated to support the growing amount of IP traffic. In effect, this book must simultaneously address layers 1 through 3. Two main strengths of the book are in describing current state-of-the-art research in very-high-speed IP networks and in detailing the standards activities related to net-work management, software, and signaling.

  11. Benefícios do Uso do VoIP: um estudo de caso na GMBenefits from the VOIP Use: a case study at GMBeneficios del Uso del VoIP: un estudio de caso en la GM

    Directory of Open Access Journals (Sweden)

    FEITERA, Carlos Henrique

    2006-05-01

    Full Text Available RESUMOEste artigo traz uma visão do que é o VoIP, assim como suas principais aplicações, os fatores que as empresas buscam para minimizar custos em telefonia, as vantagens e desvantagens, a agregação de novas tecnologias, como WI-FI e o VOIP, e o futuro da telefonia no Brasil.Serão analisadas as diferenças entre Telefonia IP e VOIP paralelamente, e será tratada como base e estudo de caso a empresa General Motors do Brasil. O objetivo é mostrar o conteúdo que envolve essa inovadora tecnologia. Podemos dizer que a vontade de abordar esse tema foi despertada não somente por ser uma tecnologia inovadora que vem substituindo a telefonia convencional reduzindo os custos das empresas e trocando serviços e equipamentos obsoletos por uma série de novos serviços e oferecendo muitos recursos e benefícios, mas nos chamou a atenção também pelo fato de ser uma tecnologia que está revolucionando o mercado de telecomunicações, já que as empresas de telefonia prestadoras de serviços consomem uma boa parte da renda das empresas e pessoas, e também por exigir, nesse período de transição, muita habilidade em adequar as necessidades do cliente ao uso dessas ferramentas.ABSTRACTThis article brings a vision about Voip, as well as itself main applications, the factors with that the companies search to decrease costs in telephony, the advantages and disadvantages, aggregation of new technologies as wi-fi to the VOIP and the future of the telephony in Brazil. The differences between Telephony IP and VOIP will be analyzed parallel, and will be showed with as base study case of the General Motors. Our objective for this subject is to show the content that involves this fantastic technology. We can say that will to approach this subject it was influenced not only by being an innovative technology that comes substituting the conventional telephony, reducing the costs of the companies, and changing to services and obsolete equipments for a series

  12. Mobile IP and protocol authentication extension

    CERN Document Server

    Nguyen, Phuc V

    2011-01-01

    Mobile IP is an open standard, defined by the Internet Engineering Task Force (IETF) RFC 3220. By using Mobile IP, you can keep the same IP address, stay connected, and maintain ongoing applications while roaming between IP networks. Mobile IP is scalable for the Internet because it is based on IP - any media that can support IP can support Mobile IP.

  13. Digital signage sobre IP

    OpenAIRE

    Casademont Filella, Albert

    2012-01-01

    Projecte que versa sobre el disseny i la implementació d'un sistema de Digital Signage (Cartelleria Digital) sobre IP, creant un gestor que permeti controlar de forma remota tot un conjunt de petits dispositius connectats a pantalles que emeten continguts multimèdia com vídeos, imatges, feeds rss...

  14. IP and ATM Integration

    OpenAIRE

    Mannie, E.; Corridoni, J.; Cremonese, P.; Giordano, Silvia

    1999-01-01

    The performance limits of the current Internet make the integration of IP with ATM a hotly debated issue in the networking arena, leading to various competing approaches and products. Legitimate technical and market issues are, however, often intertwined with biased views and hype, with vendors competing in the standards arena as well as on the markets. Together with the speed of technical evolution, this causes confusion for purchasers of networking equipment who, usually preferring a single...

  15. PV-solar / wind hybrid energy system for GSM/CDMA type mobile telephony base station

    Directory of Open Access Journals (Sweden)

    Pragya Nema, R.K. Nema, Saroj Rangnekar

    2010-03-01

    Full Text Available This paper gives the design idea of optimized PV-Solar and Wind Hybrid Energy System for GSM/CDMA type mobile base station over conventional diesel generator for a particular site in central India (Bhopal . For this hybrid system ,the meteorological data of Solar Insolation, hourly wind speed, are taken for Bhopal-Central India (Longitude 77o.23'and Latitude 23o.21' and the pattern of load consumption of mobile base station are studied and suitably modeled for optimization of the hybrid energy system using HOMER software. The simulation and optimization result gives the best optimized sizing of wind turbine and solar array with diesel generator for particular GSM/CDMA type mobile telephony base station. This system is more cost effective and environmental friendly over the conventional diesel generator. It should reduced approximate 70%-80% fuel cost over conventional diesel generator and also reduced the emission of CO2 and other harmful gasses in environments. It is expected that the newly developed and installed system will provide very good opportunities for telecom sector in near future.

  16. PV-solar / wind hybrid energy system for GSM/CDMA type mobile telephony base station

    Energy Technology Data Exchange (ETDEWEB)

    Nema, Pragya; Rangnekar, Saroj [Energy Engineering Department, Maulana Azad National Institute of Technology , Bhopal-462007 M.P. (India); Nema, R.K. [Electrical Engineering Department, Maulana Azad National Institute of Technology, Bhopal-462007 M.P. (India)

    2010-07-01

    This paper gives the design idea of optimized PV-Solar and Wind Hybrid Energy System for GSM/CDMA type mobile base station over conventional diesel generator for a particular site in central India (Bhopal). For this hybrid system ,the meteorological data of Solar Insolation, hourly wind speed, are taken for Bhopal-Central India (Longitude 77 deg.23'and Latitude 23 deg.21' ) and the pattern of load consumption of mobile base station are studied and suitably modeled for optimization of the hybrid energy system using HOMER software. The simulation and optimization result gives the best optimized sizing of wind turbine and solar array with diesel generator for particular GSM/CDMA type mobile telephony base station. This system is more cost effective and environmental friendly over the conventional diesel generator. It should reduced approximate 70%-80% fuel cost over conventional diesel generator and also reduced the emission of CO2 and other harmful gasses in environments. It is expected that the newly developed and installed system will provide very good opportunities for telecom sector in near future.

  17. Mobile pastoralists in Central and West Africa: between conflict, mobile telephony and (im)mobility.

    Science.gov (United States)

    De Bruijn, M; Amadou, A; Lewa Doksala, E; Sangaré, B

    2016-11-01

    The livelihoods of the Fulani mobile pastoralists in the Sahel, West and Central Africa are characterised by mobility (related to the needs of their animals), extensive social networks, and a focus on social ties as the basis of status and influence ('wealth in people'). The Sahel environment in which many Fulani nomads live has become embroiled in jihadism, conflict, and violence; at the same time, this region has experienced an increase in opportunities to connect through the wireless mobile communication system. This paper analyses the triangle of mobility, communication, and insecurity in order to understand the present-day situation of the nomadic and semi-nomadic Fulani pastoralists and their identity dynamics. The Fulani find themselves caught in between these conflicts, which end their mobility and often lead to the loss of their herds. Will they be able to keep their mobile lifestyle and identity? This article is based on qualitative case studies and the biographical narratives of nomadic and semi-nomadic pastoralists who have lived through conflict and violence in Cameroon, Chad and Mali. These case studies show that, despite the fact that mobile pastoralism has become difficult as a consequence of the conflicts and loss of cattle, the 'mobile' identity is very present and reinforced with the help of mobile telephony, through which social networks and 'wealth in people' are sustained.

  18. PV-solar / Wind Hybrid Energy System for GSM/CDMA Type Mobile Telephony Base

    Directory of Open Access Journals (Sweden)

    Station Md. Ibrahim

    2015-05-01

    Full Text Available This paper presents the design of optimized PV-Solar and Wind Hybrid Energy System for GSM/CDMA type mobile base station over conventional diesel generator for a particular site in south India (Chennai. For this hybrid system ,the meteorological data of Solar Insolation, hourly wind speed, are taken for Chennai (Longitude 80ο .16’and Latitude 13ο .5’ and the pattern of load consumption of mobile base station are studied and suitably modeled for optimization of the hybrid energy system using HOMER software. The simulation and optimization result gives the best optimized sizing of wind turbine and solar array with diesel generator for particular GSM/CDMA type mobile telephony base station. This system is more cost effective and environmental friendly over the conventional diesel generator. The presented system reduce approximate 70%-80% fuel cost over conventional diesel generator and also reduced the emission of CO2 and other harmful gasses in environments. It is expected that the proposed developed and installed system will provide very good opportunities for telecom sector in near future.

  19. IP电话系统中的消回声处理%Echo Cancellation in IP Telephone System

    Institute of Scientific and Technical Information of China (English)

    黄永峰; 周可; 张江陵

    2000-01-01

    The characteristics of the echoes in the IP telephone system are analyzed. According to these echo characteristics such as very long echo path, great delay of echo jitter, etc. a new idea of design an "adaptive echo canceller (AEC)"and its associated algorithms are proposed. The structure of AEC as well as its composing modules, are introduced such as the speech detector, the adaptive filter,the time-delay estimator and the NLMS algorithm controller. We have also discussed how to implement the adaptive echo canceller on TMS320C6201 DSP which can be used in the IP telephony gateway, and how to link it with the IP telephony system. Finally, the performances of test results of the adaptive echo canceller are summarized, and its main advantages are analyzed. It is proved that the adaptive echo canceller can effectively cancel the echoes in the IP telephony system.%分析了IP电话系统中回声的特点,并针对其回声具有路径延迟、延迟抖动大等特点,提出了一种基于延迟分析的自适应回声消除器设计的新思想和相关算法。介绍了自适应回声消除器的基本结构及各个功能模块,例如:变阶数自适应滤波器,语音状态检测器,延迟分析器和NLMS算法控制器.本文还详细论述了以TMS320C6201DSP为硬件平台来实现能运用在IP电话网关中的自适应回声消除器及其在IP电话系统中的连接关系。在文章的最后,列举了对自适应回声消除器的性能测试结果,并分析了自适应回声消除器的优点,证明了自适应回声消除器能很好地解决IP电话系统中的回声消除问题。

  20. IP Phone 综述

    Institute of Scientific and Technical Information of China (English)

    夏华; 陈常嘉

    2000-01-01

    IP Phone代表下一代电话技术,是目前的热点,它通过分组交换网络来传输话音,是开放式分组业务的一种。本文从IP Phone的出现谈起,简要介绍了IP Phone的优势,工作原理和相关标准,着重分析了IP Phone面临的挑战与机遇,并展望了IP Phone的发展前景。

  1. TCP/IP foundations

    CERN Document Server

    Blank, Andrew G

    2006-01-01

    The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor. TCP/IP Foundations provides essential knowledge about the two protocols that form the basis for the Internet, as well as many other networks. What you learn here will benefit you in the short term, as you acquire and

  2. Foundations of hardware IP protection

    CERN Document Server

    Torres, Lionel

    2017-01-01

    This book provides a comprehensive and up-to-date guide to the design of security-hardened, hardware intellectual property (IP). Readers will learn how IP can be threatened, as well as protected, by using means such as hardware obfuscation/camouflaging, watermarking, fingerprinting (PUF), functional locking, remote activation, hidden transmission of data, hardware Trojan detection, protection against hardware Trojan, use of secure element, ultra-lightweight cryptography, and digital rights management. This book serves as a single-source reference to design space exploration of hardware security and IP protection. · Provides readers with a comprehensive overview of hardware intellectual property (IP) security, describing threat models and presenting means of protection, from integrated circuit layout to digital rights management of IP; · Enables readers to transpose techniques fundamental to digital rights management (DRM) to the realm of hardware IP security; · Introduce designers to the concept of salutar...

  3. Introduction à TCP/IP

    OpenAIRE

    Archimbaud, Jean-Luc

    1993-01-01

    • Ce qu'il faut savoir sur les réseaux • Ce qu'il faut savoir sur Ethernet • Généralités sur TCP/IPIP et consort • TCP et consort • Le routage • Interconnexion de réseaux Ethernet et IP • Nommage • Exemples d'applications • Enchaînement des opérations • Daemons et commandes Unix • Glossaire; Engineering school; Cours d'introduction à TCP/IP

  4. Beyond iPS!

    Directory of Open Access Journals (Sweden)

    Editorial

    2012-01-01

    Full Text Available It’s undoubtedly a jubilant moment for scientists and clinicians working in the stem cell arena as Prof. Gurdon and Prof. Shinya Yamanaka have been chosen for the Nobel Prize in Physiology & Medicine this year. The mystery of cell biology is something unfathomable and probably the work of this duo as well as the other scientists, who have put their hands on in- vitro de-differentiation have opened our eyes to a new window or a new paradigm in cell biology. The iPS invention has brought a lot of hope in terms of potential direct benefits to treat several diseases, which have no definite options at the moment. But, we envisage that several spin-offs could come out of this invention and one very significant spin-off finding recently witnessed is the finding by Prof. Masaharu Seno and his team of researchers at the Okayama University, Japan (Chen L, et al. 2012, PLoS ONE 7(4:e33544.doi:10.1371/journal.pone.0033544. According to Prof. Seno, mouse iPS cells (miPS when cultured in the conditioned medium derived from cancer cell lines, differentiate into cancer stem cells (CSCs. While differentiating into CSCs, they do retain the potential to develop endothelial progenitor cells. Several questions arise here: 1.Are these miPS derived CSCs really pluripotent, even if the terminal differentiation destined to specific phenotypes? 2.Shouldn’t the Cancer Stem Cells be termed as cancer progenitor cells, as till date they are considered to be producing only cancer cells but not pluripotent to yield other types of normal tissues? The spin-offs could be infinite as the process of differentiation and de-differentiation happening due to trillions of signals and pathways, most still remaining not-so-well understood. A special mention should be made to Prof. Shinya Yamanaka as he has several sterling qualities to be a role-model for budding scientists. Apart from his passion for science, which made him shift his career from orthopedics to a cell biologist, his

  5. Implementation of IP Telephony Increment Service Based on SIP Protocol%基于SIP协议的IP电话增值业务实现技术

    Institute of Scientific and Technical Information of China (English)

    王瑜; 乐正友

    2003-01-01

    讨论了SIP协议以及基于SIP协议的IP电话增值业务实现技术,并对SIP CGI、CPL、SIP Servlets、JAIN APIs等几种SIP编程技术进行了分析与比较,归纳总结了开发IP电话增值业务的一般方法.

  6. Identification of a major IP5 kinase in Cryptococcus neoformans confirms that PP-IP5/IP7, not IP6, is essential for virulence.

    Science.gov (United States)

    Li, Cecilia; Lev, Sophie; Saiardi, Adolfo; Desmarini, Desmarini; Sorrell, Tania C; Djordjevic, Julianne T

    2016-04-01

    Fungal inositol polyphosphate (IP) kinases catalyse phosphorylation of IP3 to inositol pyrophosphate, PP-IP5/IP7, which is essential for virulence of Cryptococcus neoformans. Cryptococcal Kcs1 converts IP6 to PP-IP5/IP7, but the kinase converting IP5 to IP6 is unknown. Deletion of a putative IP5 kinase-encoding gene (IPK1) alone (ipk1Δ), and in combination with KCS1 (ipk1Δkcs1Δ), profoundly reduced virulence in mice. However, deletion of KCS1 and IPK1 had a greater impact on virulence attenuation than that of IPK1 alone. ipk1Δkcs1Δ and kcs1Δ lung burdens were also lower than those of ipk1Δ. Unlike ipk1Δ, ipk1Δkcs1Δ and kcs1Δ failed to disseminate to the brain. IP profiling confirmed Ipk1 as the major IP5 kinase in C. neoformans: ipk1Δ produced no IP6 or PP-IP5/IP7 and, in contrast to ipk1Δkcs1Δ, accumulated IP5 and its pyrophosphorylated PP-IP4 derivative. Kcs1 is therefore a dual specificity (IP5 and IP6) kinase producing PP-IP4 and PP-IP5/IP7. All mutants were similarly attenuated in virulence phenotypes including laccase, urease and growth under oxidative/nitrosative stress. Alternative carbon source utilisation was also reduced significantly in all mutants except ipk1Δ, suggesting that PP-IP4 partially compensates for absent PP-IP5/IP7 in ipk1Δ grown under this condition. In conclusion, PP-IP5/IP7, not IP6, is essential for fungal virulence.

  7. Performance of cellular phones with video telephony in the use of automated external defibrillators by untrained laypersons.

    Science.gov (United States)

    You, J S; Park, S; Chung, S P; Park, J W

    2008-09-01

    To evaluate the hypothesis that using an automated external defibrillator (AED) with video telephony-directed cellular phone instructions for untrained laypersons would increase the probability of successful performance of AEDs. Real-time communication with visual images can provide critical information and appropriate instructions to both laypersons and dispatchers. A prospective observational study was undertaken. 52 public officers with no previous experience in the use of a defibrillator were presented with a scenario in which they were asked to use an AED on a manikin according to the instructions given to them by cellular phones with video telephony. The proportion who successfully delivered a shock and the time interval from cardiac arrest to delivery of the shock were recorded. Placement of the electrode pads was performed correctly by all 52 participants and 51 (98%) delivered an accurate shock. The mean (SD) time to correct shock delivery was 131.8 (20.6) s (range 101-202). Correct pad placement and shock delivery can be performed using an AED when instructions are provided via video telephone because a dispatcher can monitor every step and provide correct information.

  8. Cell death induced by GSM 900-MHz and DCS 1800-MHz mobile telephony radiation.

    Science.gov (United States)

    Panagopoulos, Dimitris J; Chavdoula, Evangelia D; Nezis, Ioannis P; Margaritis, Lukas H

    2007-01-10

    In the present study, the TUNEL (Terminal deoxynucleotide transferase dUTP Nick End Labeling) assay--a well known technique widely used for detecting fragmented DNA in various types of cells--was used to detect cell death (DNA fragmentation) in a biological model, the early and mid stages of oogenesis of the insect Drosophila melanogaster. The flies were exposed in vivo to either GSM 900-MHz (Global System for Mobile telecommunications) or DCS 1800-MHz (Digital Cellular System) radiation from a common digital mobile phone, for few minutes per day during the first 6 days of their adult life. The exposure conditions were similar to those to which a mobile phone user is exposed, and were determined according to previous studies of ours [D.J. Panagopoulos, A. Karabarbounis, L.H. Margaritis, Effect of GSM 900-MHz mobile phone radiation on the reproductive capacity of D. melanogaster, Electromagn. Biol. Med. 23 (1) (2004) 29-43; D.J. Panagopoulos, N. Messini, A. Karabarbounis, A.L. Philippetis, L.H. Margaritis, Radio frequency electromagnetic radiation within "safety levels" alters the physiological function of insects, in: P. Kostarakis, P. Stavroulakis (Eds.), Proceedings of the Millennium International Workshop on Biological Effects of Electromagnetic Fields, Heraklion, Crete, Greece, October 17-20, 2000, pp. 169-175, ISBN: 960-86733-0-5; D.J. Panagopoulos, L.H. Margaritis, Effects of electromagnetic fields on the reproductive capacity of D. melanogaster, in: P. Stavroulakis (Ed.), Biological Effects of Electromagnetic Fields, Springer, 2003, pp. 545-578], which had shown a large decrease in the oviposition of the same insect caused by GSM radiation. Our present results suggest that the decrease in oviposition previously reported, is due to degeneration of large numbers of egg chambers after DNA fragmentation of their constituent cells, induced by both types of mobile telephony radiation. Induced cell death is recorded for the first time, in all types of cells

  9. Gevaar VoIP voor telecomsector overdreven

    NARCIS (Netherlands)

    Deventer, M.O. van; Wegberg, M. van

    2004-01-01

    Het is een hype Voice-over-IP (VoIP) voor te stellen als een ontwrichtende technologie die de telecomindustrie ingrijpend zal veranderen. Maar hoe ontwrichtend is VoIP eigenlijk? Oskar van Deventer en Marc van Wegberg analyseren drie vormen van VoIP en laten zien dat alleen ‘VoIP-chat’ potentieel

  10. Dynamic IP Reputation from DNS

    Science.gov (United States)

    2016-06-21

    management systems for Internet principals and services – E.g., IP addresses, DNS domains/servers, BGP/AS, etc. – Avoid connections to/from malicious...Operational; data sources for dynamic trust management – Dynamic IP reputation using DNS data 11/4/2009 1 Overview and Motivation • Dynamic Domain...it hosts a few number of bad domains • Ultimate goal: – An on-line dynamic trust/reputation service for IP/Domain 11/4/2009 19 Credits and

  11. University of Cambridge deploys Procket Networks' PRO/8801

    CERN Multimedia

    2003-01-01

    Procket Networks, a provider of high performance Internet Protocol (IP) technology and products has announced that the University of Cambridge has deployed the PRO/8801(TM) router into its research network to develop industry-leading deep packet inspection applications. The major application for this deployment is to identify and understand new traffic patterns created by large scale scientific computations and downloads such as the GRID (1 page).

  12. Deployment summary: Fiscal years 1995-2000 [USDOE Office of International Programs

    Energy Technology Data Exchange (ETDEWEB)

    None

    2000-07-01

    This publication summarizes the progress made by the Office of International Programs (IP) in deploying innovative technologies for the environmental remediation of the DOE complex and for sites of its international collaborators for fiscal years 1995 through 2000.

  13. Synchronously Deployable Truss Structures

    Science.gov (United States)

    Rhodes, M. D.; Hedgepeth, J. M.

    1986-01-01

    Structure lightweight, readily deployed, and has reliable joints. New truss concept, designated as "pac truss," developed. Features easy deployment without need for complex mechanisms. Structures of this type deployed in free flight by controlled release of stored energy in torsional springs at selected hinges located throughout structure. Double-folding technique used in beam model applicable to flat planar trusses, allowing structures of large expanse to fold into compact packages and be deployed for space-platform applications.

  14. Solar array deployment mechanism

    Science.gov (United States)

    Calassa, Mark C.; Kackley, Russell

    1995-05-01

    This paper describes a Solar Array Deployment Mechanism (SADM) used to deploy a rigid solar array panel on a commercial spacecraft. The application required a deployment mechanism design that was not only lightweight, but also could be produced and installed at the lowest possible cost. This paper covers design, test, and analysis of a mechanism that meets these requirements.

  15. VoIP Forensic Analyzer

    Directory of Open Access Journals (Sweden)

    M Mohemmed Sha

    2016-01-01

    Full Text Available People have been utilizing Voice over Internet Protocol (VoIP in most of the conventional communication facilities which has been of assistance in the enormous attenuation of operating costs, as well as the promotion of next- generation communication services-based IP. As an intimidating upshot, cyber criminals have correspondingly started interjecting the environment and creating new challenges for the law enforcement system in any Country. This paper presents an idea of a framework for the forensic analysis of the VoIP traffic over the network. This forensic activity includes spotting and scrutinizing the network patterns of VoIP-SIP stream, which is used to initiate a session for the communication, and regenerate the content from VoIP-RTP stream, which is employed to convey the data. Proposed network forensic investigation framework also accentuates on developing an efficient packet restructuring algorithm for tracing the depraved users involved in a conversation. Network forensics is the basis of proposed work, and performs packet level surveillance of VoIP followed by reconstruction of original malicious content or network session between users for their prosecution in the court.

  16. A Study of the Next Generation Intelligent Networks Interworking with IP Networks

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    In the past three years, the author has participated in several projects involved in Intelligent Network (IN). In 1997, we started our research on the project “The Integration of IN and B-ISDN” supported by National Science Foundation. Since 1999, the author has engaged in the project “the Next Generation IN Based Service Platform Interworking with IP Networks” supported by the National 863 Project. While working on the project, the author made a deep research on the architecture and the key technology of the next generation IN defined by ITU-T IN CS3 and CS4. In the following parts. 1. I conclude the research work and the innovation in my dissertation. The early research on the interworking of IN and Internet, despite the shortage of materials, the interworking architecture by means of IAF is analyzed. Some key techniques like triggering intelligent service and reporting dynamic IP address are solved. Some new SIBs and INAPs are added, and the dial-up software of users is enhanced, too. The incoming call notification service is designed. What we have done paves the way for the future research. 2. The gateway based architecture for the interworking of IN and Internet is described. Considering the research results from ITU, PINT work group and TIPHON work group, we emphasize that the interworking scenario through MG,SCG and C/BG is promising. Based on the CIN software developed by ourselves, we provide the scenario to enhance the function entities and signaling protocol. We address the function of entities and the interaction of signaling with an example like ICW service. 3. With the introduction of mobile agent technology, the author proposes the distributed IN which can be integrated with IP networks. According to the drawbacks of the centralized IN, we address the architecture and conceptual model of distributed IN to support advanced service in IP Telephony. We try to illustrate the role and relationship between function entities. We also present a

  17. Mastering Windows 7 Deployment

    CERN Document Server

    Finn, Aidan; van Surksum, Kenneth

    2011-01-01

    Get professional-level instruction on Windows 7 deployment tools Enterprise-level operating system deployment is challenging and requires knowledge of specific tools. It is expected that Windows 7 will be extensively deployed in businesses worldwide. This comprehensive Sybex guide provides thorough coverage of the Microsoft deployment tools that were specifically created for Windows 7, preparing system administrators, MIS professionals, and corporate programmers to tackle the task effectively.Companies worldwide are expected to deploy Windows 7 as their enterprise operating system; system admi

  18. Running TCP/IP over ATM Networks.

    Science.gov (United States)

    Witt, Michael

    1995-01-01

    Discusses Internet protocol (IP) and subnets and describes how IP may operate over asynchronous transfer mode (ATM). Topics include TCP (transmission control protocol), ATM cells and adaptation layers, a basic architectural model for IP over ATM, address resolution, mapping IP to a subnet technology, and connection management strategy. (LRW)

  19. Mobility management in mobile IP

    Science.gov (United States)

    Medidi, Sirisha; Golshani, Forouzan

    2002-07-01

    There is an emerging interest in integrating mobile wireless communication with the Internet based on the Ipv6 technology. Many issues introduced by the mobility of users arise when such an integration is attempted. This paper addresses the problem of mobility management, i.e., that of tracking the current IP addresses of mobile terminals and sustaining active IP connections as mobiles move. The paper presents some architectural and mobility management options for integrating wireless access to the Internet. We then present performance results for Mobile IPv4, route optimization and Mobile IPv6.

  20. Center for Deployment Psychology

    Data.gov (United States)

    Federal Laboratory Consortium — The Center for Deployment Psychology was developed to promote the education of psychologists and other behavioral health specialists about issues pertaining to the...

  1. Deployable geodesic truss structure

    Science.gov (United States)

    Mikulas, Martin M., Jr. (Inventor); Rhodes, Marvin D. (Inventor); Simonton, J. Wayne (Inventor)

    1987-01-01

    A deployable geodesic truss structure which can be deployed from a stowed state to an erected state is described. The truss structure includes a series of bays, each bay having sets of battens connected by longitudinal cross members which give the bay its axial and torsional stiffness. The cross members are hinged at their mid point by a joint so that the cross members are foldable for deployment or collapsing. The bays are deployed and stabilized by actuator means connected between the mid point joints of the cross members. Hinged longerons may be provided to also connect the sets of battens and to collapse for stowing with the rest of the truss structure.

  2. Nationwide SIP Telephony Network Design to Prevent Congestion Caused by Disaster

    Science.gov (United States)

    Satoh, Daisuke; Ashitagawa, Kyoko

    We present a session initiation protocol (SIP) network design for a voice-over-IP network to prevent congestion caused by people calling friends and family after a disaster. The design increases the capacity of SIP servers in a network by using all of the SIP servers equally. It takes advantage of the fact that equipment for voice data packets is different from equipment for signaling packets in SIP networks. Furthermore, the design achieves simple routing on the basis of telephone numbers. We evaluated the performance of our design in preventing congestion through simulation. We showed that the proposed design has roughly 20 times more capacity, which is 57 times the normal load, than the conventional design if a disaster were to occur in Niigata Prefecture struck by the Chuetsu earthquake in 2004.

  3. Introduction to IP address management

    CERN Document Server

    Rooney, Tim

    2010-01-01

    "The book begins with a basic overview of IP networking, followed by chapters describing each of the three core IPAM technologies: IPv4 and IPv6 addressing, DHCP, and DNS. The next three chapters describe IPAM management techniques and practice, followed by chapters on IPv4-IPv6 co-existence, security and the IPAM business case"--

  4. Multicast and IP Multicast Support in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jorge Sá Silva

    2008-03-01

    Full Text Available Multicast potentially optimises bandwidth consumption and node resources, when several users simultaneously participate in a communication session. Nevertheless, contrary to the expectations, IP multicast has not experienced widespread deployment, with the exception of IPTV. On the other hand, emerging Wireless Sensor Network (WSN applications could greatly benefit from multicast and constitute another field where multicast can be an effective and efficient technique. The questions are: do multicast advantages hold in WSN scenarios? Can we use IP Multicast functionality in WSNs? This paper discusses and evaluates the use of multicast in WSNs. Specifically, we evaluate the use of Source-Specific Multicast, as it is one of the most promising paradigms for IP networking, considering both IPv4 and IPv6 in WSNs. A sensor platform with IP and multicast support that is being developed in our lab is presented. Concurrently, simulation studies were performed in order to assess the usefulness of multicast in WSNs. The results clearly point to the benefits of the use of this technique in processing and energy-restricted environments such as this one.

  5. Modeling EERE Deployment Programs

    Energy Technology Data Exchange (ETDEWEB)

    Cort, K. A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hostick, D. J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Belzer, D. B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Livingston, O. V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2007-11-01

    This report compiles information and conclusions gathered as part of the “Modeling EERE Deployment Programs” project. The purpose of the project was to identify and characterize the modeling of deployment programs within the EERE Technology Development (TD) programs, address possible improvements to the modeling process, and note gaps in knowledge in which future research is needed.

  6. A Voice Priority Queue (VPQ Fair Scheduler for the VoIP over WLANs

    Directory of Open Access Journals (Sweden)

    Kashif Nisar

    2011-02-01

    Full Text Available Transmission of VoIP over packet switching networks is one of the rapidly emerging real-time Internet Protocol. The real-time application of the Voice over Internet Protocol (VoIP is growing rapidly for it is more flexible than the traditional Public Switched Telephone Networks systems (PSTN. Meanwhile, the VoIP deployment on Wireless Local Area Networks (WLANs, which is based on IEEE 802.11 standards, is increasing. Currently, many schedulers have been introduced such as Weighted Fair Queueing (WFQ, Strict Priority (SP General processor sharing (GPS, Deficit Round Robin (DRR, andContention-Aware Temporally fair Scheduling (CATS. Unfortunately, the current scheduling techniques have some drawbacks on real-time applications and therefore will not be able to handle the VoIP packetsin a proper way. The objective of this research is to propose a new scheduler system model for the VoIP application named Voice Priority Queue (VPQ scheduler. The scheduler system model is to ensureefficiency by producing a higher throughput and fairness for VoIP packets. In this paper, only the First Stage of the VPQ packet scheduler and its algorithm are presented. Simulation topologies for VoIP traffic were implemented and analyzed using the Network Simulator (NS-2. The results show that this method can achieve a better and more accurate VoIP quality throughput and fairness index.

  7. Deployable Soft Composite Structures

    Science.gov (United States)

    Wang, Wei; Rodrigue, Hugo; Ahn, Sung-Hoon

    2016-02-01

    Deployable structure composed of smart materials based actuators can reconcile its inherently conflicting requirements of low mass, good shape adaptability, and high load-bearing capability. This work describes the fabrication of deployable structures using smart soft composite actuators combining a soft matrix with variable stiffness properties and hinge-like movement through a rigid skeleton. The hinge actuator has the advantage of being simple to fabricate, inexpensive, lightweight and simple to actuate. This basic actuator can then be used to form modules capable of different types of deformations, which can then be assembled into deployable structures. The design of deployable structures is based on three principles: design of basic hinge actuators, assembly of modules and assembly of modules into large-scale deployable structures. Various deployable structures such as a segmented triangular mast, a planar structure comprised of single-loop hexagonal modules and a ring structure comprised of single-loop quadrilateral modules were designed and fabricated to verify this approach. Finally, a prototype for a deployable mirror was developed by attaching a foldable reflective membrane to the designed ring structure and its functionality was tested by using it to reflect sunlight onto to a small-scale solar panel.

  8. Deployable Soft Composite Structures.

    Science.gov (United States)

    Wang, Wei; Rodrigue, Hugo; Ahn, Sung-Hoon

    2016-02-19

    Deployable structure composed of smart materials based actuators can reconcile its inherently conflicting requirements of low mass, good shape adaptability, and high load-bearing capability. This work describes the fabrication of deployable structures using smart soft composite actuators combining a soft matrix with variable stiffness properties and hinge-like movement through a rigid skeleton. The hinge actuator has the advantage of being simple to fabricate, inexpensive, lightweight and simple to actuate. This basic actuator can then be used to form modules capable of different types of deformations, which can then be assembled into deployable structures. The design of deployable structures is based on three principles: design of basic hinge actuators, assembly of modules and assembly of modules into large-scale deployable structures. Various deployable structures such as a segmented triangular mast, a planar structure comprised of single-loop hexagonal modules and a ring structure comprised of single-loop quadrilateral modules were designed and fabricated to verify this approach. Finally, a prototype for a deployable mirror was developed by attaching a foldable reflective membrane to the designed ring structure and its functionality was tested by using it to reflect sunlight onto to a small-scale solar panel.

  9. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  10. IP, ethernet and MPLS networks resource and fault management

    CERN Document Server

    Perez, André

    2013-01-01

    This book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and MPLS. The QoS of the network is made up of two parts: fault and resource management. Network operation quality is among the functions to be fulfilled in order to offer QoS to the end user. It is characterized by four parameters: packet loss, delay, jitter or the variation of delay over time, and availability. Resource management employs mechanisms that enable the first three parameters to be guaranteed or optimized. Fault management aims to ensure continuity of service.

  11. Extraction Of Electronic Evidence From VoIP: Identification & Analysis Of Digital Speech

    Directory of Open Access Journals (Sweden)

    David Irwin

    2012-09-01

    Full Text Available The Voice over Internet Protocol (VoIP is increasing in popularity as a cost effective and efficient means of making telephone calls via the Internet. However, VoIP may also be an attractive method of communication to criminals as their true identity may be hidden and voice and video communications are encrypted as they are deployed across the Internet. This produces in a new set of challenges for forensic analysts compared with traditional wire-tapping of the Public Switched Telephone Network (PSTN infrastructure, which is not applicable to VoIP. Therefore, other methods of recovering electronic evidence from VoIP are required.  This research investigates the analysis and recovery of digitised human, which persists in computer memory after a VoIP call.This paper proposes a proof of concept how remnants of digitised human speech from a VoIP call may be identified within a forensic memory capture based on how the human voice is detected via a microphone and encoded to a digital format using the sound card of your personal computer. This digital format is unencrypted whist processed in Random Access Memory (RAM before it is passed to the VoIP application for encryption and  transmission over the Internet. Similarly, an incoming encrypted VoIP call is decrypted by the VoIP application and passes through RAM unencrypted in order to be played via the speaker output.A series of controlled tests were undertaken whereby RAM captures were analysed for remnants of digital speech after a VoIP audio call with known conversation. The identification and analysis of digital speech from RAM attempts to construct an automatic process for the identification and subsequent reconstruction of the audio content of a VoIP call.

  12. On using Mobile IP Protocols

    Directory of Open Access Journals (Sweden)

    Fayza A. Nada

    2006-01-01

    Full Text Available The recent advances in wireless communication technology and the unprecedented growth of the Internet have paved the way for wireless networking and IP mobility. Mobile Internet protocol has been designed within the IETF to support the mobility of users who wish to connect to the Internet and maintain communications as they move from place to place. This study describes and summarizes the current Internet draft for mobile IP (MIPv4 with its major components: agent discovery, registration and tunneling. In addition, we outline the available encapsulation techniques and route optimization procedure. In the end, we describe the design of the new protocol for transparent routing of IPv6 packets to mobile IPv6 nodes operating in the Internet.

  13. Security in VoIP

    Directory of Open Access Journals (Sweden)

    Floriana GEREA

    2012-04-01

    Full Text Available VoIP relies on packet switching, similar to the way that e-mails are sent over the Internet. The technology breaks down a voice call into bite-size information packets. Instead of keeping the switch open all the time, the information is sent and received as needed, allowing excess line capacity to be used to carry other data. When the voice data arrives at its destination, it's reassembled into a voice call. As voice over IP services grow in popularity, the potential for viruses, worms and other security threats aimed at the technology also will grow. The current paper's purpose is presenting several security solutions and applying them to integrated systems at an economical and social level.

  14. Internetworking with TCP/IP

    CERN Document Server

    Comer, Douglas E

    2014-01-01

    An internationally best-selling, conceptual introduction to the TCP/IP protocols and Internetworking, this book interweaves a clear discussion of fundamentals and scientific principles with details and examples drawn from the latest technologies. Leading author Douglas Comer covers layering and packet formats for all the Internet protocols, includingTCP, IPv4, IPv6, DHCP, and DNS. In addition, the text explains new trends in Internet systems, including packet classification, Software Defined Networking (SDN), and mesh protocols used in The Internet of Things. The text is appropriate for individuals interested in learning more about TCP/IP protocols, Internet architecture, and current networking technologies, as well as engineers who build network systems. It is suitable for junior to graduate-level courses in Computer Networks, Data Networks, Network Protocols, and Internetworking.

  15. Optimal design of an IP/MPLS over DWDM network

    Directory of Open Access Journals (Sweden)

    Eduardo Canale

    2014-04-01

    Full Text Available Different approaches for deploying resilient optical networks of low cost constitute a traditional group of NP-Hard problems that have been widely studied. Most of them are based on the construction of low cost networks that fulfill connectivity constraints. However, recent trends to virtualize optical networks over the legacy fiber infrastructure, modified the nature of network design problems and turned inappropriate many of these models and algorithms. In this paper we study a design problem arising from the deployment of an IP/MPLS network over an existing DWDM infrastructure. Besides cost and resiliency, this problem integrates traffic and capacity constraints. We present: an integer programming formulation for the problem, theoretical results, and describe how several metaheuristics were applied in order to find good quality solutions, for a real application case of a telecommunications company.

  16. OSI and TCP/IP

    Science.gov (United States)

    Randolph, Lynwood P.

    1994-01-01

    The Open Systems Interconnection Transmission Control Protocol/Internet Protocol (OSI TCP/IP) and the Government Open Systems Interconnection Profile (GOSIP) are compared and described in terms of Federal internetworking. The organization and functions of the Federal Internetworking Requirements Panel (FIRP) are discussed and the panel's conclusions and recommendations with respect to the standards and implementation of the National Information Infrastructure (NII) are presented.

  17. IP Rights and Technological Platforms

    OpenAIRE

    Robert P. Merges

    2008-01-01

    This paper is about intellectual property rights (IPRs) and platform technologies. After a brief introduction explaining some basics of networks, standards and platforms, I turn to three policy issues. The first is the role of IP in what might be termed platform policies, the decisions by courts and regulators concerning whether and how to promote multi-party access to important digital platforms such as media player hardware, cell phones, PCs, and the like. I argue that for the most part the...

  18. Modeling EERE deployment programs

    Energy Technology Data Exchange (ETDEWEB)

    Cort, K. A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Hostick, D. J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Belzer, D. B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Livingston, O. V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2007-11-01

    The purpose of the project was to identify and characterize the modeling of deployment programs within the EERE Technology Development (TD) programs, address possible improvements to the modeling process, and note gaps in knowledge for future research.

  19. Stratospheric Deployment Parafoil Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Stratospheric Deployment Parafoil is a proposed technology that will be designed and tested to provide a greatly superior parachute precision delivery system...

  20. From ð-Calcul towards a Dynamic architecture for the resolution of the problems of optimization for mobile telephony operators

    Directory of Open Access Journals (Sweden)

    Chaker Mezioud

    2012-03-01

    Full Text Available The operators of the mobile telephony are more and more demanding towards their applications. They wait for a big reliability, for a number ceaselessly increasing of services, the respect for the constraints of conviviality, for cost, etc. Therefore, the size and the complexity of the applications increase. The current techniques do not allow protecting us from problems of conception. That is why we need a high-level modelling, which will allow us to analyze the organization between the various elements of the system and the interactions between these elements. The interest of the systems multi agents ensues from collective behaviour produced by the interactions of several autonomous and flexible entities called agents, whom these interactions turn around the cooperation, around the competition or of it. However techniques come from this domain, concentrate more on the expression of the relations inter-agents. The expression of the mobility from the point of view of the distributed systems is not described. A property acquired time, will allow processes to choose themselves to move on the sites of a network to work locally on the resources and be exchanged their interactions. Reason for which, we are going to propose in this paper a formalization which appeals to an algebra of process, which is ƒ-calcul, to conceive systems automobile adaptive which can react to the shape of the problem

  1. Deployable Soft Composite Structures

    OpenAIRE

    Wei Wang; Hugo Rodrigue; Sung-Hoon Ahn

    2016-01-01

    Deployable structure composed of smart materials based actuators can reconcile its inherently conflicting requirements of low mass, good shape adaptability, and high load-bearing capability. This work describes the fabrication of deployable structures using smart soft composite actuators combining a soft matrix with variable stiffness properties and hinge-like movement through a rigid skeleton. The hinge actuator has the advantage of being simple to fabricate, inexpensive, lightweight and sim...

  2. Principle analysis of IP wavelength router

    Institute of Scientific and Technical Information of China (English)

    王勇; 殷洪玺; 徐安士; 吴德明

    2001-01-01

    Combining IP with WDM is an attractive direction for research. WDM will play an important role in IP network in future. Now, an urgent problem is how to introduce wavelength routing in an IP network. We solve this problem by designing IP wavelength router, implementing DPDP (default path and dedicated path) method. We prove the reasonableness and feasibility of this design by a principle experiment. A lot of problems related to this design are also discussed.

  3. IP and Competitiveness of Chinese Telecom Firms

    Institute of Scientific and Technical Information of China (English)

    ZENG Jian-qiu

    2004-01-01

    Based on the influence, this paper discusses the perspectives of IP technology. It illustrates that IP is changing the service structure of China Telecom and IP is striking traditional telecom networks and changing the competitive structure of telecom markets. IP is one of core technologies in future telecom networks and there is an opportunity for Chinese telecom firms to quicken their network innovation and improve the competitiveness for their sustainable development.

  4. Challenges Regarding IP Core Functional Reliability

    Science.gov (United States)

    Berg, Melanie D.; LaBel, Kenneth A.

    2017-01-01

    For many years, intellectual property (IP) cores have been incorporated into field programmable gate array (FPGA) and application specific integrated circuit (ASIC) design flows. However, the usage of large complex IP cores were limited within products that required a high level of reliability. This is no longer the case. IP core insertion has become mainstream including their use in highly reliable products. Due to limited visibility and control, challenges exist when using IP cores and subsequently compromise product reliability. We discuss challenges and suggest potential solutions to critical application IP insertion.

  5. TCP/IP Network Administration

    CERN Document Server

    Hunt, Craig

    2002-01-01

    This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet. Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial

  6. Synchronously deployable truss structure

    Science.gov (United States)

    Bush, H. G. (Inventor); Mikulas, M., Jr. (Inventor); Wallsom, E. (Inventor)

    1986-01-01

    A collapsible-expandable truss structure, including first and second spaced surface truss layers having an attached core layer is described. The surface truss layers are composed of a plurality of linear struts arranged in multiple triangular configurations. Each linear strut is hinged at the center and hinge connected at each end to a nodular joint. A passive spring serves as the expansion force to move the folded struts from a stowed collapsed position to a deployed operative final truss configuration. A damper controls the rate of spring expansion for the synchronized deployment of the truss as the folded configuration is released for deployment by the restrain belts. The truss is synchronously extended under the control of motor driven spools.

  7. Mining Deployment Optimization

    Science.gov (United States)

    Čech, Jozef

    2016-09-01

    The deployment problem, researched primarily in the military sector, is emerging in some other industries, mining included. The principal decision is how to deploy some activities in space and time to achieve desired outcome while complying with certain requirements or limits. Requirements and limits are on the side constraints, while minimizing costs or maximizing some benefits are on the side of objectives. A model with application to mining of polymetallic deposit is presented. To obtain quick and immediate decision solutions for a mining engineer with experimental possibilities is the main intention of a computer-based tool. The task is to determine strategic deployment of mining activities on a deposit, meeting planned output from the mine and at the same time complying with limited reserves and haulage capacities. Priorities and benefits can be formulated by the planner.

  8. Deploying OpenStack

    CERN Document Server

    Pepple, Ken

    2011-01-01

    OpenStack was created with the audacious goal of being the ubiquitous software choice for building public and private cloud infrastructures. In just over a year, it's become the most talked-about project in open source. This concise book introduces OpenStack's general design and primary software components in detail, and shows you how to start using it to build cloud infrastructures. If you're a developer, technologist, or system administrator familiar with cloud offerings such as Rackspace Cloud or Amazon Web Services, Deploying OpenStack shows you how to obtain and deploy OpenStack softwar

  9. Modeling EERE Deployment Programs

    Energy Technology Data Exchange (ETDEWEB)

    Cort, Katherine A.; Hostick, Donna J.; Belzer, David B.; Livingston, Olga V.

    2007-11-08

    The purpose of this report is to compile information and conclusions gathered as part of three separate tasks undertaken as part of the overall project, “Modeling EERE Deployment Programs,” sponsored by the Planning, Analysis, and Evaluation office within the Department of Energy’s Office of Energy Efficiency and Renewable Energy (EERE). The purpose of the project was to identify and characterize the modeling of deployment programs within the EERE Technology Development (TD) programs, address improvements to modeling in the near term, and note gaps in knowledge where future research is needed.

  10. Remote Systems Design & Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, Sharon A.; Baker, Carl P.; Valdez, Patrick LJ

    2009-08-28

    The Pacific Northwest National Laboratory (PNNL) was tasked by Washington River Protection Solutions, LLC (WRPS) to provide information and lessons learned relating to the design, development and deployment of remote systems, particularly remote arm/manipulator systems. This report reflects PNNL’s experience with remote systems and lays out the most important activities that need to be completed to successfully design, build, deploy and operate remote systems in radioactive and chemically contaminated environments. It also contains lessons learned from PNNL’s work experiences, and the work of others in the national laboratory complex.

  11. Implementasi Sistem IP PBX menggunakan Briker

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2017-06-01

    Full Text Available Abstrak VoIP (Voice over Internet Protocol adalah komunikasi suara jarak jauh yang digunakan melalui jaringan IP. Pada penelitian ini dirancang sistem IP PBX dengan menggunakan teknologi berbasis VoIP. IP PBX adalah perangkat switching komunikasi telepon dan data berbasis teknologi Internet Protocol (IP yang mengendalikan ekstension telepon analog maupun ekstension IP Phone. Software VirtualBox digunakan dengan tujuan agar lebih memudahkan dalam sistem pengoperasian Linux yang dimana program untuk membuat IP PBX adalah menggunakan Briker yang bekerja pada Operating System Linux 2.6. Setelah proses penginstalan Briker pada Virtualbox dilakukan implementasi jaringan IP PBX. Setelah mengimplementasikan jaringan IP PBX sesuai dengan topologi, kemudian melakukan pengujian success call rate dan analisis Quality of Service (QoS. Pengukuran QoS menggunakan parameter jitter, delay, dan packet loss yang dihasilkan dalam sistem IP PBX ini. Nilai jitter sesama user Briker (baik pada smartphone maupun komputer mempunyai rata-rata berada pada nilai 16,77 ms. Sedangkan nilai packetloss yang didapat pada saat terdapat pada saat user 1 sebagai pemanggil telepon adalah 0%. Sedangkan persentase packet loss pada saat user 1 sebagai penerima telepon adalah 0,01%. Nilai delay pada saat berkomunikasi antar user berada pada 11,75 ms. Secara keseluruhan nilai yang didapatkan melalui penelitian ini, dimana hasil pengujian parameter-parameter QOS sesuai dengan standar yang telah direkomendasikan oleh ITU dan didapatkan nilai QoS dengan hasil “baik”. Kata Kunci : Briker, VoIP, QoS, IP PBX, Smartphone. Abstract VoIP (Voice over Internet Protocol is a long-distance voice communications over IP networks are used. In this study, IP PBX systems designed using VoIP -based technologies. IP PBX is a telephone switching device and data communication technology-based Internet Protocol (IP which controls the analog phone extensions and IP Phone extensions. VirtualBox software is

  12. WE-MQS-VoIP Priority: An enhanced LTE Downlink Scheduler for voice services with the integration of VoIP priority mode

    Directory of Open Access Journals (Sweden)

    Duy-Huy Nguyen

    2016-07-01

    Full Text Available The Long Term Evolution (LTE is a high data rates and fully All-IP network. It is developed to support well to multimedia services such as Video, VoIP, Gaming, etc. So that, the real-time services such as VoIP, video, etc. need to be optimized. Nevertheless, the deployment of such live stream services having many challenges. Scheduling and allocating radio resource are very important in LTE network, especially with multimedia services such as VoIP. When voice service transmitted over LTE network, it is affected by many network impairments where there are three main factors including packet loss, delay, and jitter. This study proposes a new scheduler which is based on VoIP priority mode,Wideband (WB E-model, QoS- and Channel-Aware (called WE-MQS-VoIP Priority scheduler for voice services in LTE downlink direction. The proposed scheduling scheme is built based on the WB E-model and Maximum Queue Size (MQS. In addition, we integrate the VoIP priority mode into our scheduling scheme. Since the proposed scheduler considers the VoIP priority mode and user perception, thus, it improves significantly the system performance. The results demonstrate that the proposed scheduler not only meets QoS demands of voice calls but also outperforms Modified Largest Weighted Delay First (M-LWDF in terms of delay, Packet Loss Rate (PLR for all number of user (NU and excepting NU equals 30, respectively. For Fairness Index (FI, cell throughput, and Spectral Efficiency (SE, the difference among the packet schedulers is not significant. The performance evaluation is compared in terms of Delay, PLR, Throughput, FI, and SE.

  13. Vaccines and IP Rights: A Multifaceted Relationship.

    Science.gov (United States)

    Durell, Karen

    2016-01-01

    Just as there are many forms of vaccines and components to vaccines-particular compositions, delivery systems, components, and distribution networks-there are a variety of intellectual property (IP) protections applicable for vaccines. IP rights such as patent, copyright, trademarks, plant breeders' rights, and trade secrets may all be applicable to vaccines. Thus, discussion of IP rights and vaccines should not begin and end with the application of one IP right to a vaccine. The discussion should engage considerations of multiple IP rights applicable to a vaccine and how these can be utilized in an integrated manner in a strategy aimed at supporting the development and distribution of the vaccine. Such an approach to IP rights to vaccines allows for the integrated rights to be considered in light of the justifications for protecting vaccines with IP rights, as well as the issues relating to specific IP rights for vaccines, such as compulsory license regimes, available humanitarian purpose IP credits, etc. To view vaccines as the subject of multiple IP protections involves a refocusing, but the outcome can provide significant benefits for vaccine development and distribution.

  14. Applying a gaming approach to IP strategy.

    Science.gov (United States)

    Gasnier, Arnaud; Vandamme, Luc

    2010-02-01

    Adopting an appropriate IP strategy is an important but complex area, particularly in the pharmaceutical and biotechnology sectors, in which aspects such as regulatory submissions, high competitive activity, and public health and safety information requirements limit the amount of information that can be protected effectively through secrecy. As a result, and considering the existing time limits for patent protection, decisions on how to approach IP in these sectors must be made with knowledge of the options and consequences of IP positioning. Because of the specialized nature of IP, it is necessary to impart knowledge regarding the options and impact of IP to decision-makers, whether at the level of inventors, marketers or strategic business managers. This feature review provides some insight on IP strategy, with a focus on the use of a new 'gaming' approach for transferring the skills and understanding needed to make informed IP-related decisions; the game Patentopolis is discussed as an example of such an approach. Patentopolis involves interactive activities with IP-related business decisions, including the exploitation and enforcement of IP rights, and can be used to gain knowledge on the impact of adopting different IP strategies.

  15. Large, Easily Deployable Structures

    Science.gov (United States)

    Agan, W. E.

    1983-01-01

    Study of concepts for large space structures will interest those designing scaffolding, radio towers, rescue equipment, and prefabricated shelters. Double-fold, double-cell module was selected for further design and for zero gravity testing. Concept is viable for deployment by humans outside space vehicle as well as by remotely operated manipulator.

  16. Deployment & Market Transformation (Brochure)

    Energy Technology Data Exchange (ETDEWEB)

    2012-04-01

    NREL's deployment and market transformation (D and MT) activities encompass the laboratory's full range of technologies, which span the energy efficiency and renewable energy spectrum. NREL staff educates partners on how they can advance sustainable energy applications and also provides clients with best practices for reducing barriers to innovation and market transformation.

  17. Deploying Node.js

    CERN Document Server

    Pasquali, Sandro

    2015-01-01

    If you are an intermediate or advanced developer deploying your Node.js applications, then this book is for you. If you have already built a Node application or module and want to take your knowledge to the next level, this book will help you find your way.

  18. Analysis of Handoff Mechanisms in Mobile IP

    Science.gov (United States)

    Jayaraj, Maria Nadine Simonel; Issac, Biju; Haldar, Manas Kumar

    2011-06-01

    One of the most important challenges in mobile Internet Protocol (IP) is to provide service for a mobile node to maintain its connectivity to network when it moves from one domain to another. IP is responsible for routing packets across network. The first major version of IP is the Internet Protocol version 4 (IPv4). It is one of the dominant protocols relevant to wireless network. Later a newer version of IP called the IPv6 was proposed. Mobile IPv6 is mainly introduced for the purpose of mobility. Mobility management enables network to locate roaming nodes in order to deliver packets and maintain connections with them when moving into new domains. Handoff occurs when a mobile node moves from one network to another. It is a key factor of mobility because a mobile node can trigger several handoffs during a session. This paper briefly explains on mobile IP and its handoff issues, along with the drawbacks of mobile IP.

  19. [iPS cells in dentistry].

    Science.gov (United States)

    Egusa, Hiroshi

    2012-01-01

    The discovery of the induced pluripotent stem (iPS) cell technology, which enables us to produce pluripotent stem cells by introducing a few genetic factors, commands considerable attention in the field of dentistry. These iPS cells may be of particular importance for developing innovative technologies to regenerate missing jaw bones and lost teeth, and there are expectations that several types of tissue stem cells and mucosal cells in the oral area can be used as an ideal iPS cell source. We previously reported that the gingiva, which is often resected during general dental treatments and treated as biomedical waste, is a promising source of iPS cells. In this review, the current trends in iPS cell research in dentistry are outlined, and future aspects of potential applications of the iPS cell technologies to dental treatments will be discussed.

  20. SISTEMI IPTV NA IP MULTIMEDIJSKEM PODSISTEMU

    OpenAIRE

    2013-01-01

    Diplomsko delo obravnava arhitekture sistemov IPTV na IP multimedijskem podsistemu ter pripadajoče storitve in funkcije IPTV na IP multimedijskem podsistemu. Predstavljene arhitekture prinašajo veliko novih funkcionalnosti, ki so podrobneje predstavljene po posameznih enotah. V nalogi je tudi podrobneje opisana arhitektura IP multimedijskega podsistema z ravninami in protokoli. Naloga se zaključuje s storitvami na takšnih arhitekturah.

  1. Universal Space IP Transparent Proxy Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Communications applications are strategically moving toward Internet Protocol-based architectures and technologies. Despite IP's huge potential, (e.g. cost...

  2. Dedicated Deployable Aerobraking Structure

    Science.gov (United States)

    Giersch, Louis R.; Knarr, Kevin

    2010-01-01

    A dedicated deployable aerobraking structure concept was developed that significantly increases the effective area of a spacecraft during aerobraking by up to a factor of 5 or more (depending on spacecraft size) without substantially increasing total spacecraft mass. Increasing the effective aerobraking area of a spacecraft (without significantly increasing spacecraft mass) results in a corresponding reduction in the time required for aerobraking. For example, if the effective area of a spacecraft is doubled, the time required for aerobraking is roughly reduced to half the previous value. The dedicated deployable aerobraking structure thus enables significantly shorter aerobraking phases, which results in reduced mission cost, risk, and allows science operations to begin earlier in the mission.

  3. Comparing genome-wide chromatin profiles using ChIP-chip or ChIP-seq

    NARCIS (Netherlands)

    Johannes, Frank; Wardenaar, Rene; Colomé Tatché, Maria; Mousson, Florence; de Graaf, Petra; Mokry, Michal; Guryev, Victor; Timmers, H. Th. Marc; Cuppen, Edwin; Jansen, Ritsert C.; Bateman, Alex

    2010-01-01

    Motivation: ChIP-chip and ChIP-seq technologies provide genomewide measurements of various types of chromatin marks at an unprecedented resolution. With ChIP samples collected from different tissue types and/ or individuals, we can now begin to characterize stochastic or systematic changes in epigen

  4. Comparing genome-wide chromatin profiles using ChIP-chip or ChIP-seq

    NARCIS (Netherlands)

    Johannes, F.; Wardenaar, R.; Colome-Tatche, M.; Mousson, F.; de Graaf, P.; Mokry, M.; Guryev, V.; Timmers, H.T.; Cuppen, E.; Jansen, R.

    2010-01-01

    MOTIVATION: ChIP-chip and ChIP-seq technologies provide genome-wide measurements of various types of chromatin marks at an unprecedented resolution. With ChIP samples collected from different tissue types and/or individuals, we can now begin to characterize stochastic or systematic changes in epigen

  5. 75 FR 13235 - IP-Enabled Services

    Science.gov (United States)

    2010-03-19

    ... interconnected Voice over Internet Protocol (VoIP) service the discontinuance obligations that apply to domestic... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 63 IP-Enabled Services AGENCY: Federal Communications Commission ACTION: Final rule...

  6. Performance of VoIP on HSDPA

    DEFF Research Database (Denmark)

    Wang, Bang; Pedersen, Klaus I.; Kolding, Troels E.

    2005-01-01

    scheduler design incorporating VoIP packet aggregation and user multiplexing is proposed and the VoIP capacity is studied for a macro-cellular environment. Results are obtained for different delay budgets and packet scheduling settings, using either blind round robin or a slightly modified version...

  7. Antiplatelet activity of inositol hexaphosphate (IP6).

    Science.gov (United States)

    Vucenik, I; Podczasy, J J; Shamsuddin, A M

    1999-01-01

    Platelet adhesion to endothelial cells, their aggregation and subsequent release of platelet-derived mediators are key steps in the pathogenesis of thrombosis and atherosclerosis. Using impedance technology the effect of inositol hexaphosphate (IP6) on platelet aggregation and adenosine triphosphate (ATP) release were simultaneously measured in whole blood obtained from healthy volunteers (n = 10). The platelets were activated with adenosine diphosphate (ADP) (10 microM), collagen (2 micrograms/mL), or thrombin (1 U/mL) in the presence or absence of IP6. IP6 significantly inhibited platelet aggregation induced with all agonists in a dose-response manner (p IP6 strongly and significantly reduced agonist-induced ATP release (p = 0.00247 for ADP; p = 0.0074 for collagen; p = 0.0069 for thrombin). These data demonstrate that IP6 effectively inhibits human platelet aggregation in vitro, suggesting its potential in reducing the risk for cardiovascular disease.

  8. A Review on Hot-IP Finding Methods and Its Application in Early DDoS Target Detection

    Directory of Open Access Journals (Sweden)

    Xuan Dau Hoang

    2016-10-01

    Full Text Available On the high-speed connections of the Internet or computer networks, the IP (Internet Protocol packet traffic passing through the network is extremely high, and that makes it difficult for network monitoring and attack detection applications. This paper reviews methods to find the high-occurrence-frequency elements in the data stream and applies the most efficient methods to find Hot-IPs that are high-frequency IP addresses of IP packets passing through the network. Fast finding of Hot-IPs in the IP packet stream can be effectively used in early detection of DDoS (Distributed Denial of Service attack targets and spreading sources of network worms. Research results show that the Count-Min method gives the best overall performance for Hot-IP detection thanks to its low computational complexity, low space requirement and fast processing speed. We also propose an early detection model of DDoS attack targets based on Hot-IP finding, which can be deployed on the target network routers.

  9. Stochastic TCO minimization for Video Transmission over IP Networks

    CERN Document Server

    Goudarzi, Pejman

    2012-01-01

    From the viewpoint of service operators the Total Cost of Ownership (TCO) for developing a communication service comprises from two parts; CAPital EXpenditure (CAPEX) and OPerational EXpenditure (OPEX). These two types of costs are interrelated and affect any service provider's deployment strategy. In many traditional methods, selection of critical elements of a new service is performed in a heuristic manner aimed at reducing only the OPEX part of the TCO which is not necessarily optimal. Furthermore, exact cost modeling for such services is not always possible and contains some uncertainties. In the current work, after cost modeling of each video streaming element by capturing the effect of the model uncertainties, the TCO optimization problem for video streaming over IP networks is formulated as a stochastic optimization problem. The solution of the proposed optimization problem can cope with the cost modeling uncertainties and track the dynamism in the TCO and lead to a time-varying optimal solution. Numer...

  10. IP Connected Low Power Wireless Personal Area Networks in the Future Internet

    DEFF Research Database (Denmark)

    Jacobsen, Rune Hylsberg; Toftegaard, Thomas Skjødeberg; Kjærgaard, Jens Kristian

    2012-01-01

    The Internet of Things is a key concept of the Future Internet. The Internet of Things potentially interconnects billions of small devices in a large ubiquitous infrastructure based on the Internet Protocol (IP). Typically, these devices will be limited in computational capacity, memory......WPANs). The authors address the key mechanisms from network aspects down to device design aspects and discuss how technologies interplay to make real application deployment practical for the Internet of Things....

  11. Securing VoIP keeping your VoIP network safe

    CERN Document Server

    (Bud) Bates, Regis J Jr

    2015-01-01

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent

  12. Space Network IP Services (SNIS): An Architecture for Supporting Low Earth Orbiting IP Satellite Missions

    Science.gov (United States)

    Israel, David J.

    2005-01-01

    The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A Space Network IP Services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet Protocol (IP) communications. This architecture will support all IP protocols, including Mobile IP, over TDRSS Single Access, Multiple Access, and Demand Access Radio Frequency (RF) links. This paper will describe this architecture and how it can enable Low Earth Orbiting IP satellite missions.

  13. Self-Deployable Membrane Structures

    Science.gov (United States)

    Sokolowski, Witold M.; Willis, Paul B.; Tan, Seng C.

    2010-01-01

    Currently existing approaches for deployment of large, ultra-lightweight gossamer structures in space rely typically upon electromechanical mechanisms and mechanically expandable or inflatable booms for deployment and to maintain them in a fully deployed, operational configuration. These support structures, with the associated deployment mechanisms, launch restraints, inflation systems, and controls, can comprise more than 90 percent of the total mass budget. In addition, they significantly increase the stowage volume, cost, and complexity. A CHEM (cold hibernated elastic memory) membrane structure without any deployable mechanism and support booms/structure is deployed by using shape memory and elastic recovery. The use of CHEM micro-foams reinforced with carbon nanotubes is considered for thin-membrane structure applications. In this advanced structural concept, the CHEM membrane structure is warmed up to allow packaging and stowing prior to launch, and then cooled to induce hibernation of the internal restoring forces. In space, the membrane remembers its original shape and size when warmed up. After the internal restoring forces deploy the structure, it is then cooled to achieve rigidization. For this type of structure, the solar radiation could be utilized as the heat energy used for deployment and space ambient temperature for rigidization. The overall simplicity of the CHEM self-deployable membrane is one of its greatest assets. In present approaches to space-deployable structures, the stow age and deployment are difficult and challenging, and introduce a significant risk, heavy mass, and high cost. Simple procedures provided by CHEM membrane greatly simplify the overall end-to-end process for designing, fabricating, deploying, and rigidizing large structures. The CHEM membrane avoids the complexities associated with other methods for deploying and rigidizing structures by eliminating deployable booms, deployment mechanisms, and inflation and control systems

  14. Joint for deployable structures

    Science.gov (United States)

    Craighead, N. D., II; Preliasco, R. J.; Hult, T. D. (Inventor)

    1985-01-01

    A joint is described for connecting a pair of beams to pivot them between positions in alignment or beside one another, which is of light weight and which operates in a controlled manner. The joint includes a pair of fittings and at least one center link having opposite ends pivotally connected to opposite fittings and having axes that pass through centerplates of the fittings. A control link having opposite ends pivotally connected to the different fittings controls their relative orientations, and a toggle assemly holds the fittings in the deployed configuration wherein they are aligned. The fittings have stops that lie on one side of the centerplane opposite the toggle assembly.

  15. Field Deployable DNA analyzer

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, E; Christian, A; Marion, J; Sorensen, K; Arroyo, E; Vrankovich, G; Hara, C; Nguyen, C

    2005-02-09

    This report details the feasibility of a field deployable DNA analyzer. Steps for swabbing cells from surfaces and extracting DNA in an automatable way are presented. Since enzymatic amplification reactions are highly sensitive to environmental contamination, sample preparation is a crucial step to make an autonomous deployable instrument. We perform sample clean up and concentration in a flow through packed bed. For small initial samples, whole genome amplification is performed in the packed bed resulting in enough product for subsequent PCR amplification. In addition to DNA, which can be used to identify a subject, protein is also left behind, the analysis of which can be used to determine exposure to certain substances, such as radionuclides. Our preparative step for DNA analysis left behind the protein complement as a waste stream; we determined to learn if the proteins themselves could be analyzed in a fieldable device. We successfully developed a two-step lateral flow assay for protein analysis and demonstrate a proof of principle assay.

  16. UVEDBA IP TELEFONIJE V MEDNARODNO PODJETJE

    OpenAIRE

    Goršič, Matej

    2009-01-01

    Diploma opisuje postopen prehod iz klasičnega tipa telefonije na IP (Internet Protocol) telefonijo. To je korak, ki so ga mnoga podjetja v svetu že opravila, veliko jih pa še čaka. Predstavili bomo ozadje klasične in IP telefonije ter osnovne gradnike. Poskušali bomo pojasniti, zakaj je zdaj pravi trenutek za ta prehod ter kaj potrebujemo, morda pa bomo tudi koga opogumili za podoben poseg. Opisan je postopni prehod na IP telefonijo. To pomeni, da v prvem koraku še obdržimo klasično centr...

  17. Voice over IP in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially......IP communications are difficult to achieve in a time-varying environment due to channel errors and traffic congestion and across different systems. The provision of VoIP in wireless heterogeneous networks requires a set of time-efficient control mechanisms to support a VoIP session with acceptable quality...

  18. IP Address Management Principles and Practice

    CERN Document Server

    Rooney, Timothy

    2010-01-01

    This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send a

  19. Thermally stable deployable structure

    Science.gov (United States)

    Kegg, Colleen M.

    1988-01-01

    A deployable structure which meets stringent thermal and strength requirements in a space environment was developed. A mast with a very low coefficient of thermal expansion (CTE) was required to limit the movement from thermal distortion over the temperature range of -200 C to 80 C to .064 cm (.025 in). In addition, a high bending strength over the temperature range and weight less than 18.1 kg (40 lbs) was needed. To meet all of the requirements, a composite, near-zero CTE structure was developed. The measured average CTE over the temperature range for the mast was .70 x .000001/C (.38 x .000001/F). The design also has the advantage of being adjustable to attain other specific CTE if desired.

  20. Forward Deployed Robotic Unit

    Science.gov (United States)

    Brendle, Bruce E., Jr.; Bornstein, Jonathan A.

    2000-07-01

    Forward Deployed Robotic Unit (FDRU) is a core science and technology objective of the US Army, which will demonstrate the impact of autonomous systems on all phases of future land warfare. It will develop, integrate and demonstrate technology required to achieve robotic and fire control capabilities for future land combat vehicles, e.g., Future Combat Systems, using a system of systems approach that culminates in a field demonstration in 2005. It will also provide the required unmanned assets and conduct the demonstration. Battle Lab Warfighting Experiments and data analysis required to understand the effects of unmanned assets on combat operations. The US Army Tank- Automotive & Armaments Command and the US Army Research Laboratory are teaming in an effort to leverage prior technology achievements in the areas of autonomous mobility, architecture, sensor and robotics system integration; advance the state-of-the-art in these areas; and to provide field demonstration/application of the technologies.

  1. Complex Deployed Responsive Service

    Science.gov (United States)

    Parry, Glenn; McLening, Marc; Caldwell, Nigel; Thompson, Rob

    A pizza restaurant must provide product, in the form of the food and drink, and service in the way this is delivered to the customer. Providing this has distinct operational challenges, but what if the restaurant also provides a home delivery service? The service becomes deployed as the customer is no-longer co-located with the production area. The business challenge is complicated as service needs to be delivered within a geographic region, to time or the pizza will be cold, and within a cost that is not ­prohibitive. It must also be responsive to short term demand; needing to balance the number of staff it has available to undertake deliveries against a forecast of demand.

  2. Deployable Pipe-Z

    Science.gov (United States)

    Zawidzki, Machi

    2016-10-01

    This paper presents a concept of deployable Pipe-Z (dPZ): a modular structural system which takes advantage of the robustness of rigid-panel mechanism and allows to create free-form links which are also reconfigurable and deployable. The concept presented can be applied for building habitats and infrastructures for human exploration of oceans and outer space. dPZ structures can adapt to changing requirements e.g. mission objectives, crew condition and technological developments. Furthermore, such lightweight and adaptable structural concept can assist in sustainable exploration development. After brief introduction, the concept of Pipe-Z (PZ) is presented. Next, the reconfigurability of PZ is explained and illustrated with continuous and collision-free transition from a PZ forming a Trefoil knot to a Figure-eight knot. The following sections introduce, explain and illustrate the folding mechanism of a single foldable Pipe-Z module (fPZM) and entire dPZ structure. The latter is illustrated with asynchronous (delayed) unfolding of a relatively complex Unknot. Several applications of PZ are suggested, namely for underwater and deep-space and surface habitats, for permanent, but in particular, temporary or emergency passages. As an example, a scenario of a failure of one of the modules of the International Space Station is presented where a rigid structure of 40 fPZMs bypasses the "dead link". A low-fidelity prototype of a 6-module octagonal dPZ is presented; several folding schemes including concentric toric rings are demonstrated. Practical issues of pressurization and packing are briefly discussed.

  3. LACK - a VoIP Steganographic Method

    CERN Document Server

    Mazurczyk, Wojciech

    2008-01-01

    The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of network steganography and of VoIP steganography in particular. The analytical results presented in the paper concern the influence of LACK's hidden data insertion procedure on the method's impact on quality of voice transmission and its resistance to steganalysis.

  4. An Implementation of IP-Phone Gateway

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    To implement voice service over packet-based network (Internet) and TDM-based network (PSTN Public Switched Telephone Network), an IP phone gateway is necessary to transform media stream and convert signaling protocols used over both the two networks. In this article, the architecture of the IP-Phone gateway is described firstly. Then the communications mechanism between functional blocks and multi-thread consideration are presented.

  5. MASK: An efficient mechanism to extend inter-domain IP spoofing preventions

    Institute of Scientific and Technical Information of China (English)

    LU XiCheng; L(U) GaoFeng; ZHU PeiDong; CHEN YiJiao

    2008-01-01

    IP spoofing hinders the efficiency of DDoS defenses. While recent proposals of IP spoofing prevention mechanisms are weak at filtering spoofing packets due to the complexity in maintaining source IP spaces and the Iow incentive of deployments.To address this problem, we propose an efficient mechanism to extend the range of inter-domain IP spoofing prevention called MASK. Source MASK nodes inform destination MASK nodes about the source IP spaces and labels of their neighbor Stub-ASes in order to implement the marking and verification of packets towards the Stub-ASes, and limit the number of MASK peers through the propagation of BGP updates so as to reduce the overheads of computing and storing of labels. By utilizing the method of extending the spoofing prevention to Stub-ASes, MASK can not only enlarge the domain of the spoofing prevention service, but also filter spoofing packets in advance. Through analysis and simulations, we demonstrate MASK's accuracy and effectiveness.

  6. User-centered Development of Video telephony for Servicing Mainly Older Users: Review and Evaluation of an Approach Applied for 10 Years

    Directory of Open Access Journals (Sweden)

    Seppo Väyrynen

    2006-01-01

    Full Text Available A research and development (R&D approach has been applied to video telephony (VT in northern Finland since 1994 by broad consortia. The focus has been on the considerable involvement of ergonomics within the engineering and implementation of VT. This multidisciplinary participatory ergonomic R&D approach (PERDA is described briefly, in general and through two cases. The user-centeredness should be discernible in this sociotechnical systemic entity. A consortium—comprising mainly manufacturers, individual and organizational users of technological products, and R&D organizations—serves as a natural context for product development. VT has been considered to have much potential for enhancing (multimedia interaction and effective multimodal communication, thereby facilitating many activities of everyday life and work. An assessment of the VT system, called HomeHelper, involved older citizens, as clients or customers, and the staff of social, health, and other services.

  7. Comparative calibration of IP scanning equipment

    Science.gov (United States)

    Ingenito, F.; Andreoli, P.; Batani, D.; Boutoux, G.; Cipriani, M.; Consoli, F.; Cristofari, G.; Curcio, A.; De Angelis, R.; Di Giorgio, G.; Ducret, J.; Forestier-Colleoni, P.; Hulin, S.; Jakubowska, K.; Rabhi, N.

    2016-05-01

    Imaging Plates (IP) are diagnostic devices which contain a photostimulable phosphor layer that stores the incident radiation dose as a latent image. The image is read with a scanner which stimulates the decay of electrons, previously excited by the incident radiation, by exposition to a laser beam. This results in emitted light, which is detected by photomultiplier tubes; so the latent image is reconstructed. IPs have the interesting feature that can be reused many times, after erasing stored information. Algorithms to convert signals stored in the detector to Photostimulated luminescence (PSL) counts depend on the scanner and are not available on every model. A comparative cross-calibration of the IP scanner Dürr CR35 BIO, used in ABC laboratory, was performed, using the Fujifilm FLA 7000 scanner as a reference, to find the equivalence between grey-scale values given by the Dürr scanner to PSL counts. Using an IP and a 55Fe β-source, we produced pairs of samples with the same exposition times, which were analysed by both scanners, placing particular attention to fading times of the image stored on IPs. Data analysis led us to the determine a conversion formula which can be used to compare data of experiments obtained in different laboratories and to use IP calibrations available, till now, only for Fujifilm scanners.

  8. CMS software deployment on OSG

    Energy Technology Data Exchange (ETDEWEB)

    Kim, B; Avery, P [University of Florida, Gainesville, FL 32611 (United States); Thomas, M [California Institute of Technology, Pasadena, CA 91125 (United States); Wuerthwein, F [University of California at San Diego, La Jolla, CA 92093 (United States)], E-mail: bockjoo@phys.ufl.edu, E-mail: thomas@hep.caltech.edu, E-mail: avery@phys.ufl.edu, E-mail: fkw@fnal.gov

    2008-07-15

    A set of software deployment tools has been developed for the installation, verification, and removal of a CMS software release. The tools that are mainly targeted for the deployment on the OSG have the features of instant release deployment, corrective resubmission of the initial installation job, and an independent web-based deployment portal with Grid security infrastructure login mechanism. We have been deploying over 500 installations and found the tools are reliable and adaptable to cope with problems with changes in the Grid computing environment and the software releases. We present the design of the tools, statistics that we gathered during the operation of the tools, and our experience with the CMS software deployment on the OSG Grid computing environment.

  9. Family Reintegration Following Guard Deployment

    Science.gov (United States)

    2010-09-20

    expectations is a key process that has to occur for successful reintegration of the veteran back into the family. Both parties have to work out their...describe veterans and families perceptions of: Aim 1. Their experience with family reintegration and the challenges reintegration presents; Aim 2...deployment, and post deployment shape the degree of challenges with reintegration that a veteran and their family will encounter. Pre-deployment, the

  10. Design optimization of deployable wings

    Science.gov (United States)

    Gaddam, Pradeep

    Morphing technology is an important aspect of UAV design, particularly in regards to deployable systems. The design of such system has an important impact on the vehicle's performance. The primary focus of the present research work was to determine the most optimum deployable wing design from 3 competing designs and develop one of the deployable wing designs to test in the research facility. A Matlab code was developed to optimize 3 deployable wing concepts inflatable, inflatable telescopic and rigid-folding wings based on a sequential optimization strategy. The constraints that were part of the code include the packaging constraints during its stowed state, fixed length of the deployed section and the minimum L/D constraint. This code resulted in determining the optimum weight of all the 3 designs, the most optimum weight design is the inflatable wing design. This is a result of the flexible skin material and also due to no rigid parts in the deployed wing section. Another goal of the research involved developing an inflatable telescopic wing. The prototype was tested in a wind tunnel, while the actual wing was tested in the altitude chamber to determine the deployment speed, input pressure, analyze and predict the deployment sequence and behavior of the wing at such high wind speeds and altitudes ranging from 60,000 ft to 90,000 ft. Results from these tests allowed us to conclude the deployment sequence of the telescopic wing followed from the root to the tip section. The results were used to analyze the deployment time of the wing. As expected the deployment time decreased with an increase in input pressure. The results also show us that as the altitude increases, the deployment speed of the wing also increased. This was demonstrated when the wing was tested at a maximum altitude pressure of 90,000ft, well above the design altitude of 60,000ft.

  11. Mastering Hyper-V Deployment

    CERN Document Server

    Finn, Aidan

    2010-01-01

    The only book to take an in-depth look at deploying Hyper-V. Now in its second generation, the popular Hyper-V boasts technical advances that create even more dynamic systems than ever before. This unique resource serves an authoritative guide to deploying Windows Server 2008 R2 Hyper-V comprehensively. Step-by-step instructions demonstrate how to design a Hyper-V deployment, build a Hyper-V host environment, and design a management system with System Center Virtual Machine Manager 2008 R2.: Features real-world examples that show you how to design a Hyper-V deployment, build a Hyper-V host env

  12. Infrastructure Engineering and Deployment Division

    Data.gov (United States)

    Federal Laboratory Consortium — Volpe's Infrastructure Engineering and Deployment Division advances transportation innovation by being leaders in infrastructure technology, including vehicles and...

  13. Deployable Fresnel Rings

    Science.gov (United States)

    Kennedy, Timothy F.; Fink, Patrick W.; Chu, Andrew W.; Lin, Gregory Y.

    2014-01-01

    Deployable Fresnel rings (DFRs) significantly enhance the realizable gain of an antenna. This innovation is intended to be used in combination with another antenna element, as the DFR itself acts as a focusing or microwave lens element for a primary antenna. This method is completely passive, and is also completely wireless in that it requires neither a cable, nor a connector from the antenna port of the primary antenna to the DFR. The technology improves upon the previous NASA technology called a Tri-Sector Deployable Array Antenna in at least three critical aspects. In contrast to the previous technology, this innovation requires no connector, cable, or other physical interface to the primary communication radio or sensor device. The achievable improvement in terms of antenna gain is significantly higher than has been achieved with the previous technology. Also, where previous embodiments of the Tri-Sector antenna have been constructed with combinations of conventional (e.g., printed circuit board) and conductive fabric materials, this innovation is realized using only conductive and non-conductive fabric (i.e., "e-textile") materials, with the possible exception of a spring-like deployment ring. Conceptually, a DFR operates by canceling the out-of-phase radiation at a plane by insertion of a conducting ring or rings of a specific size and distance from the source antenna, defined by Fresnel zones. Design of DFRs follow similar procedures to those outlined for conventional Fresnel zone rings. Gain enhancement using a single ring is verified experimentally and through computational simulation. The experimental test setup involves a microstrip patch antenna that is directly behind a single-ring DFR and is radiating towards a second microstrip patch antenna. The first patch antenna and DFR are shown. At 2.42 GHz, the DFR improves the transmit antenna gain by 8.6 dB, as shown in Figure 2, relative to the wireless link without the DFR. A figure illustrates the

  14. STATE AND PROSPECTS OF DATA STREAMING FROM A WEB-BROWSER IN ORDER TO CREATE A CLOUD CALL CENTER Состояние и перспективы передачи потоковых данных из веб-браузера в рамках организации облачного контакт-центра

    Directory of Open Access Journals (Sweden)

    Teyhrib A. P.

    2012-10-01

    Full Text Available The article gives an overview of possible deployment models of a cloud call center. The requirements for the interaction with VoIP telephony are proposed and the features of SIP, RTP, UDP protocols are described. The article describes the current capabilities of data streaming through a web browser using different approaches: the browser add-on, Adobe Flash technology and WebRTC protocol . In conclusion, the comparison of the existing solutions for data streaming through a web-browser to VoIP telephony is presented

  15. IPS in Europe: the EQOLISE trial.

    Science.gov (United States)

    Burns, Tom; Catty, Jocelyn

    2008-01-01

    IPS has been demonstrated to increase return to open employment significantly in individuals with mental health problems in the US. Previous experience (e.g. with ACT) has demonstrated the sensitivity of complex community mental health interventions to local social and healthcare cultures. Europe has conditions of generally greater employment security than the US and varying (generally higher) unemployment rates and welfare benefits. Evidence of the effectiveness of IPS in these conditions, and its potential variation across them, would guide local policy and provide possible insights into its mechanism. We conducted an RCT of IPS versus high-quality train-and-place vocational rehabilitation in six European centers with very different labor market and health and social care conditions. A sample of 312 individuals with psychotic illness was randomly allocated (50 per site). Inclusion criteria were a minimum of two years' illness duration, with at least one year of continuous unemployment and six months contact with their current mental health services. Follow-up was 18 months. The primary outcome was any open employment, and secondary outcomes included time to employment, duration of employment and hospital admission. IPS was more effective than the Vocational Services for all vocational outcomes. 85 IPS patients (54.5%) worked for at least one day compared to 43 Vocational Service patients (27.6). They were significantly less likely to be rehospitalized. Local unemployment rates explained a significant amount of the variation in IPS effectiveness and both national economic growth and welfare systems influenced overall employment rates in both services. IPS doubles the access to work of people with psychotic illnesses, without any evidence of increased relapse. Its effectiveness is not independent of external circumstances, particularly local unemployment rates.

  16. RelationshipbetweentheexpressionofIP-10and IP-10mRNAinperipheralbloodandHBVDNA levelinpatientswithcirrhosis

    Institute of Scientific and Technical Information of China (English)

    Jian Wang; Ping-Ping Wang; Gui-Ju Xiang; Xiao-Bin Hu

    2010-01-01

    BACKGROUND:Post-hepatitic cirrhosis is regarded as common and severe form of liver damage. Interferonγ-inducible protein 10 (IP-10), a member of the non-ELR (glutamic-leucine-arginine) motif CXC chemokine family, has recently been shown to recruit and activate speciifc subsets of leukocytes to sites of inlfammation or an immune response during the development of hepatic cirrhosis. However, the effects of IP-10 and IP-10 mRNA on inlfammatory inifltration at local sites and in the peripheral blood of patients with post-hepatitic cirrhosis as well as their relationship with viral load are still poorly deifned. This study aimed to detect the relationship between the expression of IP-10 in serum, IP-10 mRNA in peripheral blood mononuclear cells (PBMCs), and the levels of HBV DNA in the serum of patients, and to explore their role in the pathogenesis of cirrhosis. METHODS:Typical patients with cirrhosis after HBV infection were selected, and their serum IP-10 concentrations were evaluated with ELISA, the content of IP-10 mRNA in PBMCs was measured by real-time PCR, and the load of HBV DNA in serum and PBMCs was assessed by semi-quantitative analysis of gel imaging. RESULTS:The levels of IP-10 in serum and IP-10 mRNA in PBMCs of patients with cirrhosis were 299.9±77.2 pg/ml and 0.7500±0.1495, respectively. They were higher than those of controls (P CONCLUSIONS:The levels of IP-10 and IP-10 mRNA in the peripheral blood of patients with cirrhosis increase are closely correlated with the load of HBV DNA in serum, and play a key role in the progression of post-hepatitic cirrhosis.

  17. Device Measures Angle Of Deployment

    Science.gov (United States)

    Jermakian, Joel B.

    1991-01-01

    Simple electromechanical device indicates angular position of unfolding panel during and after deployment. Resistance of potentiometer gradually increases as unfolding of solar panel about hinge moves wiper of potentiometer. At full deployment, panel pushes and opens normally closed switch. Designed for use on panel of solar photovoltaic cells in spacecraft, modified for use in other, similar position-indicating applications.

  18. Strategic Sealift Supporting Army Deployments

    Science.gov (United States)

    2016-06-10

    STRATEGIC SEALIFT SUPPORTING ARMY DEPLOYMENTS A thesis presented to the Faculty of the U.S. Army Command and General Staff...THOMPSON, MAJ, US ARMY BFA, Louisiana Tech University, Ruston, Louisiana, 1994 Fort Leavenworth, Kansas 2016 Approved for...Strategic Sealift Supporting Army Deployments 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Matthew

  19. Voice over IP in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially with the d...... and to the discruption caused by the user mobility during the session. Voice over IP in Wireless Hetetrogeneous Networks thus investigates and proposes cross-layer techniques for realizing time-efficient control mechanisms for VoIP: signaling, mobility and security.......The convergence of different types of traffic has preceded the convergence of systems and services in a wireless heterogeneous network. Voice and data traffic are usually treated separate in both 2G and 2.5G wireless networks. With advances in packet switching technology and especially....... The focus of Voice over IP in Wierless Heterogeneous Networks is on mechanisms that affect the VoIP user satisfaction  while not explicitly involved in the media session. This relates to the extra delays introduced by the security and the signaling protocols used to set up an authorized VoIP session...

  20. Deployment simulation of a deployable reflector for earth science application

    Science.gov (United States)

    Wang, Xiaokai; Fang, Houfei; Cai, Bei; Ma, Xiaofei

    2015-10-01

    A novel mission concept namely NEXRAD-In-Space (NIS) has been developed for monitoring hurricanes, cyclones and other severe storms from a geostationary orbit. It requires a space deployable 35-meter diameter Ka-band (35 GHz) reflector. NIS can measure hurricane precipitation intensity, dynamics and its life cycle. These information is necessary for predicting the track, intensity, rain rate and hurricane-induced floods. To meet the requirements of the radar system, a Membrane Shell Reflector Segment (MSRS) reflector technology has been developed and several technologies have been evaluated. However, the deployment analysis of this large size and high-precision reflector has not been investigated. For a pre-studies, a scaled tetrahedral truss reflector with spring driving deployment system has been made and tested, deployment dynamics analysis of this scaled reflector has been performed using ADAMS to understand its deployment dynamic behaviors. Eliminating the redundant constraints in the reflector system with a large number of moving parts is a challenging issue. A primitive joint and flexible struts were introduced to the analytical model and they can effectively eliminate over constraints of the model. By using a high-speed camera and a force transducer, a deployment experiment of a single-bay tetrahedral module has been conducted. With the tested results, an optimization process has been performed by using the parameter optimization module of ADAMS to obtain the parameters of the analytical model. These parameters were incorporated to the analytical model of the whole reflector. It is observed from the analysis results that the deployment process of the reflector with a fixed boundary experiences three stages. These stages are rapid deployment stage, slow deployment stage and impact stage. The insight of the force peak distributions of the reflector can help the optimization design of the structure.

  1. How to Do a Better IP Commercialization in China?

    Institute of Scientific and Technical Information of China (English)

    WU Ming

    2011-01-01

    1. Status of IP commercialization in China A sound social ecosystem for IP (intellectual property) commercialization will not be established in China overnight because the training of IP professionals and the introducing of IP into management are both a process that takes time.

  2. Quasi-static Deployment Simulation for Deployable Space Truss Structures

    Institute of Scientific and Technical Information of China (English)

    陈务军; 付功义; 何艳丽; 董石麟

    2004-01-01

    A new method was proposed for quasi-static deployment analysis of deployable space truss structures. The structure is assumed a rigid assembly, whose constraints are classified as three categories:rigid member constraint, joint-attached kinematic constraint and boundary constraint. And their geometric constraint equations and derivative matrices are formulated. The basis of the null space and M-P inverse of the geometric constraint matrix are employed to determine the solution for quasi-static deployment analysis. The influence introduced by higher terms of constraints is evaluated subsequently. The numerical tests show that the new method is efficient.

  3. Simulink based VoIP Analysis

    CERN Document Server

    Singh, Hardeep; Mian, M

    2010-01-01

    Voice communication over internet not be possible without a reliable data network, this was first available when distributed network topologies were used in conjunction with data packets. Early network used single centre node network in which a single workstation (Server) is responsible for the communication. This posed problems as if there was a fault with the centre node, (workstation) nothing would work. This problem was solved by the distributed system in which reliability increases by spreading the load between many nodes. The idea of packet switching & distributed network were combined, this combination were increased reliability, speed & responsible for voice communication over internet, Voice-over-IP (VoIP)These data packets travel through a packet-switched network such as the Internet and arrive at their destination where they are decompressed using a compatible Codec (audio coder/decoder) and converted back to analogue audio. This paper deals with the Simulink architecture for VoIP network.

  4. Project implementation plan: ASTD remote deployment

    Energy Technology Data Exchange (ETDEWEB)

    CRASS, D.W.

    1999-08-18

    This Project Implementation Plan (PIP) shall be the controlling document for the Accelerated Site Technology Deployment (ASTD) supported project to procure and qualify a remote/robotic work platform for large hot cell deactivation in the 324 Building B-Cell. This plan will be integrated into the 324/327 Buildings Stabilization/Deactivation Project, Project Management Plan, (HNF-IP-1289, Rev. 1) and shall comply with the base requirements established in that document. This PIP establishes the baseline and defines the scope, schedule, budget, organizational responsibilities, reporting requirements, deliverables, and end points for the implementation of new technology into B-Cell. This shall include procurement, safety, quality assurance, training, documentation, record management, and facility modifications applicable to this project. Specifically this plan controls and executes the procurement and acceptance, qualification, and turnover of a remote/robotic work platform for 324 Building B-Cell. This includes the development of functional parameters, performance requirements, evaluation criteria, procurement specifications, acceptance and qualification test procedures, training requirements, and turnover responsibilities. The 324/237 Buildings Stabilization/Deactivation Project is currently in its second year of a nine-year project to complete deactivation and closure of the facility for long-term surveillance and maintenance. A major obstacles for the project is the inability to effectively perform deactivation tasks within high radioactively contaminated hot cells. The current strategies utilize inefficient and resource intensive technologies that significantly impact the cost and schedule for stabilization and deactivation. The ASTD Remote Deployment Project shall identify, procure, and turnover, to the B-Cell project, a remote/robot work platform to improve B-Cell cleanup productivity and enhance worker safety and health.

  5. Optimization of OSPF Routing in IP Networks

    Science.gov (United States)

    Bley, Andreas; Fortz, Bernard; Gourdin, Eric; Holmberg, Kaj; Klopfenstein, Olivier; Pióro, Michał; Tomaszewski, Artur; Ümit, Hakan

    The Internet is a huge world-wide packet switching network comprised of more than 13,000 distinct subnetworks, referred to as Autonomous Systems (ASs) autonomous system AS . They all rely on the Internet Protocol (IP) internet protocol IP for transport of packets across the network. And most of them use shortest path routing protocols shortest path routing!protocols , such as OSPF or IS-IS, to control the routing of IP packets routing!of IP packets within an AS. The idea of the routing is extremely simple — every packet is forwarded on IP links along the shortest route between its source and destination nodes of the AS. The AS network administrator can manage the routing of packets in the AS by supplying the so-called administrative weights of IP links, which specify the link lengths that are used by the routing protocols for their shortest path computations. The main advantage of the shortest path routing policy is its simplicity, allowing for little administrative overhead. From the network engineering perspective, however, shortest path routing can pose problems in achieving satisfactory traffic handling efficiency. As all routing paths depend on the same routing metric routing!metric , it is not possible to configure the routing paths for the communication demands between different pairs of nodes explicitly or individually; the routing can be controlled only indirectly and only as a whole by modifying the routing metric. Thus, one of the main tasks when planning such networks is to find administrative link weights that induce a globally efficient traffic routing traffic!routing configuration of an AS. It turns out that this task leads to very difficult mathematical optimization problems. In this chapter, we discuss and describe exact integer programming models and solution approaches as well as practically efficient smart heuristics for such shortest path routing problems shortest path routing!problems .

  6. How to Do a Better IP Commercialization in China?

    Institute of Scientific and Technical Information of China (English)

    WU Ming

    2011-01-01

    @@ 1.Status of IP commercialization in China A sound social ecosystem for IP (intellectual property) commercialization will not be established in China overnight because the training of IP professionals and the introducing of IP into management are both a process that takes time. In recent years, the CAS has conducted a series of training programs concerning IP management and service as well as IP team building.Over the past three years, more than 70 senior staffs from CAS institutes have received certificates of IP Specialists from the CAS headquarters after successfully completing a training program.

  7. Encapsulado de servicios IP sobre redes DVB

    OpenAIRE

    Chamero Hortelano, Adrián

    2006-01-01

    La evolución de los servicios IP hacia las aplicaciones de transporte de contenidos en modo de difusión es un campo de explotación e investigación muy activo. Por otro lado, la convergencia de las diferentes redes de transmisión de datos para soportar dichos servicios provenientes de redes IP es un hecho constatable en muchos ejemplos actualmente de los que las redes DVB, inicialmente concebidas para la dfusión de contenidos audiovisuales, forman parte. Las características ofrecidas ...

  8. Secure IP mobility management for VANET

    CERN Document Server

    Taha, Sanaa

    2013-01-01

    This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs in

  9. Space-Based Voice over IP Networks

    Science.gov (United States)

    Nguyen, Sam P.; Okino, Clayton; Walsh, William; Clare, Loren

    2007-01-01

    In human space exploration missions (e.g. a return to the Moon and for future missions to Mars), there will be a need to provide voice communications services. In this work we focus on the performance of Voice over IP (VoIP) techniques applied to space networks, where long range latencies, simplex links, and significant bit error rates occur. Link layer and network layer overhead issues are examined. Finally, we provide some discussion on issues related to voice conferencing in the space network environment.

  10. The Operating Modes and Implementing of Cisco IPS%Cisco IPS的工作模式及部署

    Institute of Scientific and Technical Information of China (English)

    尹淑玲

    2013-01-01

      入侵防御系统(Intrusion Prevention System,IPS)是在入侵检测系统(Intrusion Detection System,IDS)的基础上发展而来的,它不但具有IDS 强大的基于数据包的入侵检测功能,还具有主动、智能的防御功能。目前,IPS已经成为网络安全的一个重要研究方向,相应产品的数量也在逐年增多。首先分析了Cisco IPS产品的四种工作模式及其特点,然后根据企业网的安全需求提出入侵防御解决方案,通过将Cisco IPS安全设备串联在互联网出入口,实时拦截数据流量中各种类型的恶意攻击流量,把攻击拦截在企业网络之外,保护了企业的信息资产。%Intrusion prevention system is a new network security technology based on intrusion detection system. An IPS has the capability to detect and prevent misuse and abuse of, and unauthorized access to, network resources. In networking today, IPS is one of the important researches in network security, and IPS product quantity is increasing year by year. This paper analyzes the four operating modes of cisco IPS products, and then illustrates a typical network IPS deployment, The Cisco IPS is deployed at the network entry point and protect the company resources in real time.

  11. Deployable Structural Booms for Large Deployable Solar Arrays Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The development of a new generation of large, high power deployable solar arrays has been identified as the most significant challenge facing the development of...

  12. Analysis list: Terf2ip [Chip-atlas[Archive

    Lifescience Database Archive (English)

    Full Text Available Terf2ip Embryonic fibroblast + mm9 http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/target/Terf...2ip.1.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/target/Terf2ip.5.tsv http://dbarchive.bio...sciencedbc.jp/kyushu-u/mm9/target/Terf2ip.10.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/colo/Terf2ip

  13. 77 FR 33227 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Science.gov (United States)

    2012-06-05

    ... SECURITY Assessment Questionnaire--IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT) AGENCY...--Assessment Questionnaire--IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT). DHS previously...-operators and/or security managers often volunteer to conduct an automated self risk assessment....

  14. 76 FR 81955 - Assessment Questionnaire-IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT)

    Science.gov (United States)

    2011-12-29

    ... SECURITY Assessment Questionnaire--IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT) AGENCY... managers often volunteer to conduct an automated self risk assessment. The requested questionnaire...: Assessment Questionnaire--IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT). OMB Number:...

  15. Self deployable deorbiting space structure

    DEFF Research Database (Denmark)

    2012-01-01

    -active or heavy device has to be brought on board the spacecraft for deploying the space structure. Allows the deployed flexible sheet surface higher than the case when SDSS is rigidly linked at the short distance from carrier structure. Ensures a reliable unfolding of deorbiting structures in zero gravity....... Provides the strain energy provoking the deployment without the need of addition of energy to the system. Eliminates the issues around successful unfolding known from other technical solutions as the frame unfolds automatically without using external energy for unfolding by using the accumulated strain...... energy in stressed configuration. Ensures that deorbiting space structure can be efficiently folded without intervention of active unfolding device....

  16. New concepts in deployable beam structures

    Science.gov (United States)

    Rhodes, M. D.

    1985-01-01

    The design of deployable structures involves a complicated tradeoff of packaging efficiency, the overall mechanism associated with deploying and latching beam joints, and the requirements and complexity of the beam deployer/repacker. Three longeron deployable beams, controllable geometry beams, and hybrid deployable/erectable beam concepts are evaluated.

  17. Presence in the IP Multimedia Subsystem

    Directory of Open Access Journals (Sweden)

    Ling Lin

    2007-01-01

    Full Text Available With an ever increasing penetration of Internet Protocol (IP technologies, the wireless industry is evolving the mobile core network towards all-IP network. The IP Multimedia Subsystem (IMS is a standardised Next Generation Network (NGN architectural framework defined by the 3rd Generation Partnership Project (3GPP to bridge the gap between circuit-switched and packet-switched networks and consolidate both sides into on single all-IP network for all services. In this paper, we provide an insight into the limitation of the presence service, one of the fundamental building blocks of the IMS. Our prototype-based study is unique of its kind and helps identifying the factors which limit the scalability of the current version of the presence service (3GPP TS 23.141 version 7.2.0 Release 7 [1], which will in turn dramatically limit the performance of advanced IMS services. We argue that the client-server paradigm behind the current IMS architecture does not suite the requirements of the IMS system, which defies the very purpose of its introduction. We finally elaborate on possible avenues for addressing this problem.

  18. Tracing the spiral arms in IP Pegasi

    NARCIS (Netherlands)

    Baptista, R.; Morales-Rueda, L.; Harlaftis, E.T.; Marsh, T.R.; Steeghs, D.

    2005-01-01

    We report the analysis of time-resolved spectroscopy of IP Pegasi in outburst with eclipse mapping techniques to investigate the location and geometry of the observed spiral structures. We were able to obtain an improved view of the spiral structures with the aid of light curves extracted in

  19. IP validation in remote microelectronics testing

    Science.gov (United States)

    Osseiran, Adam; Eshraghian, Kamran; Lachowicz, Stefan; Zhao, Xiaoli; Jeffery, Roger; Robins, Michael

    2004-03-01

    This paper presents the test and validation of FPGA based IP using the concept of remote testing. It demonstrates how a virtual tester environment based on a powerful, networked Integrated Circuit testing facility, aimed to complement the emerging Australian microelectronics based research and development, can be employed to perform the tasks beyond the standard IC test. IC testing in production consists in verifying the tested products and eliminating defective parts. Defects could have a number of different causes, including process defects, process migration and IP design and implementation errors. One of the challenges in semiconductor testing is that while current fault models are used to represent likely faults (stuck-at, delay, etc.) in a global context, they do not account for all possible defects. Research in this field keeps growing but the high cost of ATE is preventing a large community from accessing test and verification equipment to validate innovative IP designs. For these reasons a world class networked IC teletest facility has been established in Australia under the support of the Commonwealth government. The facility is based on a state-of-the-art semiconductor tester operating as a virtual centre spanning Australia and accessible internationally. Through a novel approach the teletest network provides virtual access to the tester on which the DUT has previously been placed. The tester software is then accessible as if the designer is sitting next to the tester. This paper presents the approach used to test and validate FPGA based IPs using this remote test approach.

  20. ChIP-chip versus ChIP-seq: Lessons for experimental design and data analysis

    Directory of Open Access Journals (Sweden)

    Karchenko Peter V

    2011-02-01

    Full Text Available Abstract Background Chromatin immunoprecipitation (ChIP followed by microarray hybridization (ChIP-chip or high-throughput sequencing (ChIP-seq allows genome-wide discovery of protein-DNA interactions such as transcription factor bindings and histone modifications. Previous reports only compared a small number of profiles, and little has been done to compare histone modification profiles generated by the two technologies or to assess the impact of input DNA libraries in ChIP-seq analysis. Here, we performed a systematic analysis of a modENCODE dataset consisting of 31 pairs of ChIP-chip/ChIP-seq profiles of the coactivator CBP, RNA polymerase II (RNA PolII, and six histone modifications across four developmental stages of Drosophila melanogaster. Results Both technologies produce highly reproducible profiles within each platform, ChIP-seq generally produces profiles with a better signal-to-noise ratio, and allows detection of more peaks and narrower peaks. The set of peaks identified by the two technologies can be significantly different, but the extent to which they differ varies depending on the factor and the analysis algorithm. Importantly, we found that there is a significant variation among multiple sequencing profiles of input DNA libraries and that this variation most likely arises from both differences in experimental condition and sequencing depth. We further show that using an inappropriate input DNA profile can impact the average signal profiles around genomic features and peak calling results, highlighting the importance of having high quality input DNA data for normalization in ChIP-seq analysis. Conclusions Our findings highlight the biases present in each of the platforms, show the variability that can arise from both technology and analysis methods, and emphasize the importance of obtaining high quality and deeply sequenced input DNA libraries for ChIP-seq analysis.

  1. KONSTRUKSI SOSIAL GURU IPS TENTANG PEMBELAJARAN IPS DI MTS KECAMATAN KOTA SUMENEP

    Directory of Open Access Journals (Sweden)

    Hamidi Rasyid

    2015-08-01

    Full Text Available Tujuan penelitian ini mendeskripsikan tentang (1 mengetahui konstruksi sosial guru IPS, (2 Implementasi pembelajaran guru di Kelas, (3 Paradigma kepala sekolah tentang pembelajaran IPS.Metode penelitian menggunakan kualitatif, tujuan utama dari penelitian ini adalah untuk menggali substansi mendasar dibalik fakta yang terjadi pada guru IPS. Hasil penelitian menunjukkan bahwa guru IPS mengkonstruksikan IPS menjadi empat konstruksi, (1 IPS adalah ilmu pengetahuan sosial yang peserta didik diharuskan bisa bersikap sosial yang baik sebagai perwujudan dari ilmu pengetahuan sosial, (2 IPS adalah mengkaji kehidupan sehari-hari dan masalah sosial yang ada dalam masyarakat, (3 IPS adalah mengkaji tentang hubungan manusia baik individu dengan individu, individu dengan kelompok maupun kelompok dengan kelompok, (4 IPS adalah mata pelajaran yang di dalamnya ada mata pelajaran sejarah, geografi, sosiologi dan ekonomi. This study describes the purpose of (1 determine the social construction of social studies teachers, (2 Implementation of teacher learning in class, (3 the principal of the learning paradigm of social studies. Using qualitative research methods, the main purpose of this study was to explore the fundamental substance behind the facts that occurred in social studies teacher. The results showed that teachers of social studies constructs into four construction, (1 social studies is a social studies that students are required to be good social as the embodiment of social studies, (2 social studies is reviewing everyday life and social problems that exist in the community, (3 social studies is to examine whether individual human relationships with individuals, groups of individuals and groups with the group, (4 social studiess are subjects in which there is the eye the lessons of history, geography, sociology and economics

  2. A New Wireless VoIP Signaling Device Supporting SIP and H.323 Protocols

    Directory of Open Access Journals (Sweden)

    Salma Rattal

    2014-01-01

    Full Text Available Nowadays, VoIP is a technology with a great demand and wireless networks are increasingly deployed. Each of these has its own technology constraints. For VoIP, it is very important to take into consideration the need to provide a high quality service according to well-defined standard transmission (jitter, end-to-end delay, MOS, and packet loss. However, wireless networks (IEEE 802.11 are based on radio which undergoes a number of technical constraints to achieve theoretical transmission rates; among these constraints the number of users of the networks, the distance between the client and the access, and the amount of data transmitted point are included. In this term, a study is made by simulating wireless network in OPNET Modeler with a fairly large number of VoIPs (15 users whose signaling is handled via a new node that was created specifically to manage the signaling tasks under SIP and H.323 in order to minimize the number of nodes in the network and avoid the congestion. In this paper, two scenarios are compared; the first contains a number of VoIP users with SIP and H.323 signaling handled by the new created device; the second scenario is similar to the first except that the distance between the stations is remarkably lower.

  3. Deployable Entry-system Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Deployable Entry-system ProjecT (ADEPT) will develop requirements for the ADEPT flight test.  Prior entry systems used high mass thermal protection...

  4. Deployment-related Respiratory Issues.

    Science.gov (United States)

    Morris, Michael J; Rawlins, Frederic A; Forbes, Damon A; Skabelund, Andrew J; Lucero, Pedro F

    2016-01-01

    Military deployment to Southwest Asia since 2003 in support of Operations Enduring Freedom/Iraqi Freedom/New Dawn has presented unique challenges from a pulmonary perspective. Various airborne hazards in the deployed environment include suspended geologic dusts, burn pit smoke, vehicle exhaust emissions, industrial air pollution, and isolated exposure incidents. These exposures may give rise to both acute respiratory symptoms and in some instances development of chronic lung disease. While increased respiratory symptoms during deployment are well documented, there is limited data on whether inhalation of airborne particulate matter is causally related to an increase in either common or unique pulmonary diseases. While disease processes such as acute eosinophilic pneumonia and exacerbation of preexisting asthma have been adequately documented, there is significant controversy surrounding the potential effects of deployment exposures and development of rare pulmonary disorders such as constrictive bronchiolitis. The role of smoking and related disorders has yet to be defined. This article presents the current evidence for deployment-related respiratory symptoms and ongoing Department of Defense studies. Further, it also provides general recommendations for evaluating pulmonary health in the deployed military population.

  5. IP-Switch网络通信业务%Communication Services of IP-Switch Network

    Institute of Scientific and Technical Information of China (English)

    马泽旭; 邢兆宏

    2005-01-01

    IP-Switch网是基于IP网络、采用软交换体系架构的、新一代网络通信平台,具有强大的业务提供能力及良好的业务扩展能力,给企业带来很大的收益.介绍IP-Switch网的业务种类、接入方式和实现方法.

  6. Opportunities for IP  in Communications Beyond 3G

    DEFF Research Database (Denmark)

    Nielsen, Thomas Toftegaard; Jacobsen, Rune H.

    2005-01-01

    Future communication will be based on TCP/IP as common network and transport layers to provide global connectivity to users and applications. IP is used to provide ubiquitous access across different access networks and exploits the benefits of a common connectivity layer while reducing the cost...... of operation and maintenance of the network. This paper discusses the opportunities for IP in the evolution towards a future broadband, all-IP mobile communication network. In particular, we argue for three opportunities for the future: Interworking access technologies over IP, IP layer transparency...

  7. Stimulation of inositol 1,4,5-trisphosphate (IP3 receptor subtypes by analogues of IP3.

    Directory of Open Access Journals (Sweden)

    Huma Saleem

    Full Text Available Most animal cells express mixtures of the three subtypes of inositol 1,4,5-trisphosphate receptor (IP(3R encoded by vertebrate genomes. Activation of each subtype by different agonists has not hitherto been examined in cells expressing defined homogenous populations of IP(3R. Here we measure Ca(2+ release evoked by synthetic analogues of IP(3 using a Ca(2+ indicator within the lumen of the endoplasmic reticulum of permeabilized DT40 cells stably expressing single subtypes of mammalian IP(3R. Phosphorylation of (1,4,5IP(3 to (1,3,4,5IP(4 reduced potency by ~100-fold. Relative to (1,4,5IP(3, the potencies of IP(3 analogues modified at the 1-position (malachite green (1,4,5IP(3, 2-position (2-deoxy(1,4,5IP(3 or 3-position (3-deoxy(1,4,5IP(3, (1,3,4,5IP(4 were similar for each IP(3R subtype. The potency of an analogue, (1,4,6IP(3, in which the orientations of the 2- and 3-hydroxyl groups were inverted, was also reduced similarly for all three IP(3R subtypes. Most analogues of IP(3 interact similarly with the three IP(3R subtypes, but the decrease in potency accompanying removal of the 1-phosphate from (1,4,5IP(3 was least for IP(3R3. Addition of a large chromophore (malachite green to the 1-phosphate of (1,4,5IP(3 only modestly reduced potency suggesting that similar analogues could be used to measure (1,4,5IP(3 binding optically. These data provide the first structure-activity analyses of key IP(3 analogues using homogenous populations of each mammalian IP(3R subtype. They demonstrate broadly similar structure-activity relationships for all mammalian IP(3R subtypes and establish the potential utility of (1,4,5IP(3 analogues with chromophores attached to the 1-position.

  8. Adjusting the IP $\\beta$ Functions in RHIC

    CERN Document Server

    Wittmer, W; Pilat, F; Ptitsyn, V; Van Zeijts, J

    2004-01-01

    The beta functions at the IP can be adjusted without perturbation of other optics functions via several approaches. In this paper we describe a scheme based on a vector knob, which assigns fixed values to the different tuning quadrupoles and scales them by a common multiplier. The values for the knob vector were calculated for a lattice without any errors using MADX. Previous studies for the LHC [1] have shown that this approach can meet the design goals. A specific feature of the RHIC lattice is the nested power supply system. To cope with the resulting problems a detailed response matrix analysis has been carried out and different sets of knobs were calculated and compared. The knobs were tested at RHIC during the 2004 run and preliminary results are discussed. Simultaneously a new approach to measure the beam sizes of both colliding beams at the IP, based on the tunability provided by the knobs, was developed and tested.

  9. Steganography of VoIP streams

    CERN Document Server

    Mazurczyk, Wojciech

    2008-01-01

    In this paper, we circumscribe available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. First one is network steganography solution and exploits free/unused fields of the RTCP (Real-Time Control Protocol) and RTP (Real-Time Transport Protocol) protocols. The second method provides hybrid storage-timing covert channel by utilizing delayed audio packets. The results of the experiment, that was performed, regardless of steganalysis, to estimate a total amount of data that can be covertly transferred in VoIP RTP stream during the typical call, are also included in this article.

  10. Newberry Seismic Deployment Fieldwork Report

    Energy Technology Data Exchange (ETDEWEB)

    Wang, J; Templeton, D C

    2012-03-21

    This report summarizes the seismic deployment of Lawrence Livermore National Laboratory (LLNL) Geotech GS-13 short-period seismometers at the Newberry Enhanced Geothermal System (EGS) Demonstration site located in Central Oregon. This Department of Energy (DOE) demonstration project is managed by AltaRock Energy Inc. AltaRock Energy had previously deployed Geospace GS-11D geophones at the Newberry EGS Demonstration site, however the quality of the seismic data was somewhat low. The purpose of the LLNL deployment was to install more sensitive sensors which would record higher quality seismic data for use in future seismic studies, such as ambient noise correlation, matched field processing earthquake detection studies, and general EGS microearthquake studies. For the LLNL deployment, seven three-component seismic stations were installed around the proposed AltaRock Energy stimulation well. The LLNL seismic sensors were connected to AltaRock Energy Gueralp CMG-DM24 digitizers, which are powered by AltaRock Energy solar panels and batteries. The deployment took four days in two phases. In phase I, the sites were identified, a cavity approximately 3 feet deep was dug and a flat concrete pad oriented to true North was made for each site. In phase II, we installed three single component GS-13 seismometers at each site, quality controlled the data to ensure that each station was recording data properly, and filled in each cavity with native soil.

  11. Content Distribution over IP : Developments and Challenges

    OpenAIRE

    Popescu, Adrian; Kouvatsos, Demetres; Remondo, David; Giordano, Stefano

    2006-01-01

    This chapter focuses on the multimedia distribution over Internet IP under the auspices of the NoE Euro-NGI research project "Routing in Overlay Networks (ROVER)". The multimedia distribution is supported by several components such as services, content distribution chain, protocols and standards whilst Internet is used for content, acquisition, management and delivery as well as an Internet; Protocol Television (IPTV) infrastructure with QoS facilities. As the convergence between fi...

  12. Research study on IPS digital controller design

    Science.gov (United States)

    Kuo, B. C.; Folkerts, C.

    1976-01-01

    The performance is investigated of the simplified continuous-data model of the Instrument Pointing System (IPS). Although the ultimate objective is to study the digital model of the system, knowledge on the performance of the continuous-data model is important in the sense that the characteristics of the digital system should approach those of the continuous-data system as the sampling period approaches zero.

  13. iPS cells and personalized medicine

    OpenAIRE

    2014-01-01

    iPS cells and personalized medicine Personalized medicine uses patient's genotype and/or level of gene expression for selection of medication, therapy or preventative measures. One of the best approaches for developing patient specific therapy is to use patient specific cells as in vitro drug testing model. Furthermore, patent specific cells in vitro enriched and modified can be used for autologous cell transplantation for treating numerous degenerative conditions.

  14. Controlling IP Falsifying Using Realistic Simulation

    Directory of Open Access Journals (Sweden)

    Govindavaram Madhusri

    2013-07-01

    Full Text Available The study of Internet-scale events such as worm proliferation, distributed denial-of-service attacks (DDoS,flash crowds, routing volatilities, and DNS attacks depend on the formation of all the networks thatgenerate or forward valid and malevolent traffic,The Distributed Denial of Services (DDoS attack is aserious threat to the valid use of the Internet. Forestalling mechanisms are disappointed by the ability ofattackers to steal, or spoof, the source addresses in IP packets. IP falsifying is still widespread in networkscanning and investigates, as well as denial of service floods.IDPFs can limit the falsifying capability ofattackers. Moreover, it works on a small number of candidate networks easily traceable, thus simplifyingthe reactive IP trace back process. However, this technique does not allow large number of networks,which is a common misapprehension for those unfamiliar with the practice. Current network simulatorscannot be used to study Internet-scale events. They are general-purpose, packet-level simulators thatreproduce too many details of network communication, which limits scalability. We propose to develop adistributed Internet simulator, with the following novel features. It will provide a built-in Internet model,including the topology, routing, link bandwidths and delays, Instead of being a general-purpose simulator,it will provide a common simulation core for traffic generation and message passing, on top of which wewill build separate modules that customize messages and level of simulation details for the event of interest.Customization modules will ensure that all and only the relevant details of the event of interest aresimulated, cutting down the simulation time. We will also provide an interface for new modulespecification, and for existing module modification, this will bring the Internet event simulation at thefingertips of all interested researchers. The simulator will promote research in worm detection and defense,IP

  15. IP Network Management Model Based on NGOSS

    Institute of Scientific and Technical Information of China (English)

    ZHANG Jin-yu; LI Hong-hui; LIU Feng

    2004-01-01

    This paper addresses a management model for IP network based on Next Generation Operation Support System (NGOSS). It makes the network management on the base of all the operation actions of ISP, It provides QoS to user service through the whole path by providing end-to-end Service Level Agreements (SLA) management through whole path. Based on web and coordination technology, this paper gives an implement architecture of this model.

  16. A native IP satellite communications system

    Science.gov (United States)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner-Puschl, S.; Riedler, W.

    2004-08-01

    ≪ In the framework of ESA's ARTES-5 program the Institute of Applied Systems Technology (Joanneum Research) in cooperation with the Department of Communications and Wave Propagation has developed a novel meshed satellite communications system which is optimised for Internet traffic and applications (L*IP—Local Network Interconnection via Satellite Systems Using the IP Protocol Suite). Both symmetrical and asymmetrical connections are supported. Bandwidth on demand and guaranteed quality of service are key features of the system. A novel multi-frequency TDMA access scheme utilises efficient methods of IP encapsulation. In contrast to other solutions it avoids legacy transport network techniques. While the DVB-RCS standard is based on ATM or MPEG transport cells, the solution of the L*IP system uses variable-length cells which reduces the overhead significantly. A flexible and programmable platform based on Linux machines was chosen to allow the easy implementation and adaptation to different standards. This offers the possibility to apply the system not only to satellite communications, but provides seamless integration with terrestrial fixed broadcast wireless access systems. The platform is also an ideal test-bed for a variety of interactive broadband communications systems. The paper describes the system architecture and the key features of the system.

  17. Safeguarding nonhuman primate iPS cells with suicide genes.

    Science.gov (United States)

    Zhong, Bonan; Watts, Korashon L; Gori, Jennifer L; Wohlfahrt, Martin E; Enssle, Joerg; Adair, Jennifer E; Kiem, Hans-Peter

    2011-09-01

    The development of technology to generate induced pluripotent stem (iPS) cells constitutes one of the most exciting scientific breakthroughs because of the enormous potential for regenerative medicine. However, the safety of iPS cell-related products is a major concern for clinical translation. Insertional mutagenesis, possible oncogenic transformation of iPS cells or their derivatives, or the contamination of differentiated iPS cells with undifferentiated cells, resulting in the formation of teratomas, have remained considerable obstacles. Here, we demonstrate the utility of suicide genes to safeguard iPS cells and their derivatives. We found suicide genes can control the cell fate of iPS cells in vitro and in vivo without interfering with their pluripotency and self-renewal capacity. This study will be useful to evaluate the safety of iPS cell technology in a clinically highly relevant, large animal model and further benefit the clinical use of human iPS cells.

  18. Deployable truss structure advanced technology

    Science.gov (United States)

    Dyer, J. E.; Dudeck, M. P.

    1986-01-01

    The 5-meter technology antenna program demonstrated the overall feasibility of integrating a mesh reflector surface with a deployable truss structure to achieve a precision surface contour compatible with future, high-performance antenna requirements. Specifically, the program demonstrated: the feasibility of fabricating a precision, edge-mounted, deployable, tetrahedral truss structure; the feasibility of adjusting a truss-supported mesh reflector contour to a surface error less than 10 mils rms; and good RF test performance, which correlated well with analytical predictions. Further analysis and testing (including flight testing) programs are needed to fully verify all the technology issues, including structural dynamics, thermodynamics, control, and on-orbit RF performance, which are associated with large, deployable, truss antenna structures.

  19. ChIP-Enrich: gene set enrichment testing for ChIP-seq data.

    Science.gov (United States)

    Welch, Ryan P; Lee, Chee; Imbriano, Paul M; Patil, Snehal; Weymouth, Terry E; Smith, R Alex; Scott, Laura J; Sartor, Maureen A

    2014-07-01

    Gene set enrichment testing can enhance the biological interpretation of ChIP-seq data. Here, we develop a method, ChIP-Enrich, for this analysis which empirically adjusts for gene locus length (the length of the gene body and its surrounding non-coding sequence). Adjustment for gene locus length is necessary because it is often positively associated with the presence of one or more peaks and because many biologically defined gene sets have an excess of genes with longer or shorter gene locus lengths. Unlike alternative methods, ChIP-Enrich can account for the wide range of gene locus length-to-peak presence relationships (observed in ENCODE ChIP-seq data sets). We show that ChIP-Enrich has a well-calibrated type I error rate using permuted ENCODE ChIP-seq data sets; in contrast, two commonly used gene set enrichment methods, Fisher's exact test and the binomial test implemented in Genomic Regions Enrichment of Annotations Tool (GREAT), can have highly inflated type I error rates and biases in ranking. We identify DNA-binding proteins, including CTCF, JunD and glucocorticoid receptor α (GRα), that show different enrichment patterns for peaks closer to versus further from transcription start sites. We also identify known and potential new biological functions of GRα. ChIP-Enrich is available as a web interface (http://chip-enrich.med.umich.edu) and Bioconductor package. © The Author(s) 2014. Published by Oxford University Press on behalf of Nucleic Acids Research.

  20. Generation of iPS Cells from Granulosa Cells.

    Science.gov (United States)

    Mao, Jian; Liu, Lin

    2016-01-01

    Various types of somatic cells can be reprogrammed to induced pluripotent stem (iPS) cells. Somatic stem cells may generate iPS cells more efficiently than do differentiated cells. We show that granulosa cells exhibit characteristic of somatic stem cells and can be reprogrammed to iPS cells more efficiently or with few factors. Here, we describe generation of mouse and pig iPS cells from granulosa cells with high efficiency.

  1. OMV multiple deployments of lightsats

    Science.gov (United States)

    Smith, William L.; Walker, James D.

    1988-06-01

    The design and capabilities of the NASA Orbital Maneuvering Vehicle (OMV) are reviewed, and the potential value of the Shuttle-borne OMV for deploying lightweight satellites (lightsats) into different orbits is discussed and illustrated with extensive drawings and diagrams. Assuming 100-lb lightsats in extended GAS canisters, the OMV could separate from the Orbiter at 16 nmi and deploy six lightsats each at altitudes 430, 700, and 970 nmi before rejoining the Orbiter at 160 nmi. Also considered are configurations with 8 or 12 200-lb lightsats and the fittings for Titan-4 launch of OMV/lightsat packages.

  2. Department of Defense, Deployment Health Clinical Center

    Science.gov (United States)

    ... related to deployment health assessments, combat and operational stress programs, deployment-limiting health conditions and deployment-related exposures. Learn More In the News Experts Explore How Combat Roles May Affect Women’s Psychological Health Deployments can be 'significant stressor' ...

  3. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  4. A Survey of Voice over IP Security Research

    Science.gov (United States)

    Keromytis, Angelos D.

    We present a survey of Voice over IP security research. Our goal is to provide a roadmap for researchers seeking to understand existing capabilities and, and to identify gaps in addressing the numerous threats and vulnerabilities present in VoIP systems. We also briefly discuss the implications of our findings with respect to actual vulnerabilities reported in a variety VoIP products.

  5. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  6. On Principles of IP Phone Technology and Its Future%IP Phone的技术原理及展望

    Institute of Scientific and Technical Information of China (English)

    张祖良; 杨佩林; 陈刚

    2001-01-01

    This paper introduces principles of IP Phone technology. The basic communication model of IP Phone and the framework of connecting PSTN and Internet are presented. It also describes the hardware and software of an IP Phone gateway as well as protocols involving IP Phone core technology. Finally, it makes an analysis on the prospects.%本文介绍了IP Phone技术的发展及技术原理。IP Phone的基本通信模式,与现存的电话网络及国际互联网的连接框架结构。介绍了IP网关的构成所涉及的软硬件技术以及IP Phone的核心技术及涉及的协议规范。最后对IP Phone技术的发展前景进行了科学的分析。

  7. Impact of genome assembly status on ChIP-Seq and ChIP-PET data mapping

    Directory of Open Access Journals (Sweden)

    Sachs Laurent

    2009-12-01

    Full Text Available Abstract Background ChIP-Seq and ChIP-PET can potentially be used with any genome for genome wide profiling of protein-DNA interaction sites. Unfortunately, it is probable that most genome assemblies will never reach the quality of the human genome assembly. Therefore, it remains to be determined whether ChIP-Seq and ChIP-PET are practicable with genome sequences other than a few (e.g. human and mouse. Findings Here, we used in silico simulations to assess the impact of completeness or fragmentation of genome assemblies on ChIP-Seq and ChIP-PET data mapping. Conclusions Most currently published genome assemblies are suitable for mapping the short sequence tags produced by ChIP-Seq or ChIP-PET.

  8. Study of a flowerlike deployable structure:

    OpenAIRE

    Luo, Ani; Liu, Heping; Li, Cheng; Wang, Yongfan

    2013-01-01

    A deployable structure is a kind of mechanism that can be folded and deployed automatically. It is able to form required shape or curved surface after deployment. In this paper, a flowerlike deployable structure, which forms a circle plane after deployment, was studied. First, the required circle plane was decomposed to determine the shapes of the members. Then the relation expressions were set up, which include the structural dimensions of the members and how to calculate the volume of the m...

  9. How can we integrate IP strategy with corporate strategy? Combining IP strategy with management strategy making process

    OpenAIRE

    田中, 義敏; Tanaka, Yoshitoshi

    2013-01-01

    Intellectual property systems have been introduced and used in manycountries as a global standard. However, its practical utilisation is still not yetmature because of the lack of IP strategy. Each enterprise has to define aunique IP strategy and be differentiated by other enterprises because the outsideenvironment and internal resource are different. IP people have to havebetter understandings on strategy making process, which is fundamental to themanagement field. In addition, IP strategy s...

  10. Space deployable truss structure design

    Science.gov (United States)

    Coyner, J. V., Jr.; Tobey, W. H.

    1981-01-01

    The development status of the deployable box truss structure is summarized. Potential applications for this structural system are described. Structural and component design requirements derived from these applications are discussed. Components of prototype 4.6 m cubes which incorporate graphite/epoxy structural members, fittings, and mechanisms are described. The benefits of the component designs and their respective manufacturing processes are presented.

  11. A Rapidly Deployable Bridge System

    Science.gov (United States)

    2013-01-15

    A Rapidly Deployable Bridge System Gareth R. Thomas1 and Bernard J. Sia2 1ATA Engineering, 11995 El Camino Real, San Diego, CA 92130; PH (858) 480...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) ATA Engineering,11995 El Camino Real,San Diego,CA,92130 8. PERFORMING ORGANIZATION REPORT NUMBER

  12. OMV Deployed From Space Station

    Science.gov (United States)

    1986-01-01

    In this 1986 artist's concept, the Orbital Maneuvering Vehicle (OMV), at right, prepares to reboost the Hubble Space Telescope after being deployed from an early Space Station configuration (left). As envisioned by Marshall Space Flight Center plarners, the OMV would be a remotely-controlled free-flying space tug which would place, rendezvous, dock, and retrieve orbital payloads.

  13. Voice and Data Network of Convergence and the Application of Voice over IP

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, J.M.

    2000-11-01

    This paper looks at emerging technologies for converging voice and data networks and telephony transport over a data network using Internet Protocols. Considered are the benefits and drivers for this convergence. The paper describes these new technologies, how they are being used, and their application to Sandia.

  14. IP Broadcasting Network Communications Security%浅谈 IP 广电网络的通信安全

    Institute of Scientific and Technical Information of China (English)

    吴永伟

    2015-01-01

    The IP digital broadcasting system is a fully digital audio-broadcasting system based on the IP net-works.Its physical structure completely syncretize with the IP networks,it breaks through the function limit of the traditional broadcasting.The IP digital broadcasting system has the security problems of communication,as it base on the IP networks.This paper discusses the security issues about the IP digital broadcasting system.%IP 数字广电网络是一套基于 IP 网络的纯数字化广播系统,基于 IP 网络的数字化广播、直播、点播,推送功能强大,灵活性强,并突破了传统模拟广播系统的局限性。但 IP 数字广电网络系统也继承了IP 网络安全的问题,主要分析 IP 广电网络所面对的安全问题,并提出解决方法。

  15. Impact of artefact removal on ChIP quality metrics in ChIP-seq and ChIP-exo data.

    Directory of Open Access Journals (Sweden)

    Thomas Samuel Carroll

    2014-04-01

    Full Text Available With the advent of ChIP-seq multiplexing technologies and the subsequent increase in ChIP-seq throughput, the development of working standards for the quality assessment of ChIP-seq studies has received significant attention. The ENCODE consortium’s large scale analysis of transcription factor binding and epigenetic marks as well as concordant work on ChIP-seq by other laboratories has established a new generation of ChIP-seq quality control measures. The use of these metrics alongside common processing steps has however not been evaluated. In this study, we investigate the effects of blacklisting and removal of duplicated reads on established metrics of ChIP-seq quality and show that the interpretation of these metrics is highly dependent on the ChIP-seq preprocessing steps applied. Further to this we perform the first investigation of the use of these metrics for ChIP-exo data and make recommendations for the adaptation of the NSC statistic to allow for the assessment of ChIP-exo efficiency.

  16. Impact of artifact removal on ChIP quality metrics in ChIP-seq and ChIP-exo data.

    Science.gov (United States)

    Carroll, Thomas S; Liang, Ziwei; Salama, Rafik; Stark, Rory; de Santiago, Ines

    2014-01-01

    With the advent of ChIP-seq multiplexing technologies and the subsequent increase in ChIP-seq throughput, the development of working standards for the quality assessment of ChIP-seq studies has received significant attention. The ENCODE consortium's large scale analysis of transcription factor binding and epigenetic marks as well as concordant work on ChIP-seq by other laboratories has established a new generation of ChIP-seq quality control measures. The use of these metrics alongside common processing steps has however not been evaluated. In this study, we investigate the effects of blacklisting and removal of duplicated reads on established metrics of ChIP-seq quality and show that the interpretation of these metrics is highly dependent on the ChIP-seq preprocessing steps applied. Further to this we perform the first investigation of the use of these metrics for ChIP-exo data and make recommendations for the adaptation of the NSC statistic to allow for the assessment of ChIP-exo efficiency.

  17. Analysis list: ATF7IP [Chip-atlas[Archive

    Lifescience Database Archive (English)

    Full Text Available ATF7IP Epidermis + hg19 http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/target/ATF7IP....1.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/target/ATF7IP.5.tsv http://dbarchive.biosciencedbc....jp/kyushu-u/hg19/target/ATF7IP.10.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/colo/ATF7IP.Epidermis.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/hg19/colo/Epidermis.gml ...

  18. An attacker-defender model for IP-based networks

    OpenAIRE

    Barkley, Timothy R.

    2008-01-01

    The Internet Protocol (IP) has emerged as the dominant technology for determining how data is routed across the Internet. Because IP flows are defined essentially in terms of origin-destination (O-D) pairs, we represent IP traffic engineering as a multi-commodity flow problem in which each O-D pair is treated as a separate commodity. We account for the diversity in IP routing by modeling opposite extremes of traffic engineering: "naive" traffic engineering where the IP routes data between...

  19. Analysis list: Atf7ip [Chip-atlas[Archive

    Lifescience Database Archive (English)

    Full Text Available Atf7ip Pluripotent stem cell + mm9 http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/target/Atf7ip....1.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/target/Atf7ip.5.tsv http://dbarchive.biosc...iencedbc.jp/kyushu-u/mm9/target/Atf7ip.10.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/colo/Atf7ip.Plurip...otent_stem_cell.tsv http://dbarchive.biosciencedbc.jp/kyushu-u/mm9/colo/Pluripotent_stem_cell.gml ...

  20. HIMIPv6: An Efficient IP Mobility Management Protocol for Broadband Wireless Networks

    Science.gov (United States)

    Jeong, Hyunku; Maeng, Seungryoul; Chae, Youngsu

    With the increasing deployment of mobile devices and the advent of broadband wireless access systems such as WiBro, mWiMAX, and HSDPA, an efficient IP mobility management protocol becomes one of the most important technical issues for the successful deployment of the broadband wireless data networking service. IETF has proposed the Mobile IPv6 as the basic mobility management protocol for IPv6 networks. To enhance the performance of the basic MIPv6, researchers have been actively working on HMIPv6 and FMIPv6 protocols. In this paper, we propose a new mobility management protocol, HIMIPv6 (Highly Integrated MIPv6), which tightly integrates the hierarchical mobility management mechanism of the HMIPv6 and the proactive handover support of the FMIPv6 to enhance the handover performance especially for the cellular networking environment with high frequent handover activities. We have performed extensive simulation study using ns2 and the results show that the proposed HIMIPv6 outperforms FMIPv6 and HMIPv6. There is no packet loss and consequent service interruption caused by IP handover in HIMIP.

  1. Measuring Data and VoIP Traffic in WiMAX Networks

    CERN Document Server

    Adhicandra, Iwan

    2010-01-01

    Due to its large coverage area, low cost of deployment and high speed data rates, WiMAX is a promising technology for providing wireless last-mile connectivity. Physical and MAC layer of this technology refer to the IEEE 802.16e standard, which defines 5 different data delivery service classes that can be used in order to satisfy Quality of Service (QoS) requirements of different applications, such as VoIP, videoconference, FTP, Web, etc. The main aim of the paper is to examine a case of QoS deployment over a cellular WiMAX network. In particular, the paper compares the performance obtained using two different QoS configurations differing from the delivery service class used to transport VoIP traffic, i.e. UGS or ertPS. Results indicate that for delay-sensitive traffic that fluctuates beyond its nominal rate, having the possibility to give back some of its reserved bandwidth, ertPS has the advantage to permit the transmission of BE traffic.

  2. IP-I0 BASED IMMUNOLOGICAL MONITORING

    DEFF Research Database (Denmark)

    2008-01-01

    The present invention relates to an immunological method and, more particularly, a method for measuring cell-mediated immune reactivity (CMI) in mammals based on the production of IP-10.The invention further discloses an assay and a kit for measuring CMI to an antigen using whole blood or other...... suitable biological samples. The methods of the present invention are useful in therapeutic and diagnostic protocols for human, livestock and veterinary and wild life applications, thus the invention further relates to a method for diagnosing an infection in a mammal....

  3. NEW ARCHITECTURE OF IP QOS MANAGEMENT SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Jiao Li; Cui Yidong; Lin Yu; Wang Wendong; Cheng Shiduan

    2006-01-01

    Based on the analysis of current Quality of Service (QoS) management on IP network, new generation of QoS architecture QoSAF is proposed. QoSAF is divided into three layers: resource control layer, network service layer and business layer. QoS management is accomplished by interactivity of layers. In this architecture, mechanism of feedback control enhances the functions of resource management and system monitoring. The principle of design and logical architecture of system is discussed in detail.

  4. Cell Reprogramming, IPS Limitations, and Overcoming Strategies in Dental Bioengineering

    Directory of Open Access Journals (Sweden)

    Gaskon Ibarretxe

    2012-01-01

    Full Text Available The procurement of induced pluripotent stem cells, or IPS cells, from adult differentiated animal cells has the potential to revolutionize future medicine, where reprogrammed IPS cells may be used to repair disease-affected tissues on demand. The potential of IPS cell technology is tremendous, but it will be essential to improve the methodologies for IPS cell generation and to precisely evaluate each clone and subclone of IPS cells for their safety and efficacy. Additionally, the current state of knowledge on IPS cells advises that research on their regenerative properties is carried out in appropriate tissue and organ systems that permit a safe assessment of the long-term behavior of these reprogrammed cells. In the present paper, we discuss the mechanisms of cell reprogramming, current technical limitations of IPS cells for their use in human tissue engineering, and possibilities to overcome them in the particular case of dental regeneration.

  5. Discovering Attack Path Oriented-IP Traceback

    Institute of Scientific and Technical Information of China (English)

    Fu Jianming(傅建明); Zhu Fuxi; Peng Guojun

    2003-01-01

    The technique of IP traceback may effectively block DOS (Denial Of Service) and meet the requirement of the computer forensic, but its accuracy depends upon that condition that each node in the Internet must support IP packet marking or detected agents. So far, this requirement is not satisfied. On the basis of traditional traceroute,this paper investigates the efficiency of discovering path methods from aspects of the size and order of detecting packets, and the length of paths.It points out that the size of padding in probed packets has a slight effect on discovering latency, and the latency with the method of bulk sending-receiving is much smaller than one with the traditional traceroute. Moreover, the loss rate of packets with the technique of TTL (Time To Live) which increases monotonously is less than that with the technique of TTL which decreases monotonously. Lastly,OS (Operating System) passive fingerprint is used as heuristic to predict the length of the discovered path so as to reduce disturbance in network traffic.

  6. Live Video and IP-TV

    Science.gov (United States)

    Merani, Maria Luisa; Saladino, Daniela

    This Chapter aims at providing a comprehensive insight into the most recent advances in the field of P2P architectures for video broadcasting, focusing on live video streaming P2P live video streaming . After introducing a classification of P2P video solutions, the first part of the Chapter provides an overview of the most interesting P2P IP-TV P2P IP-TV systems currently available over the Internet. It also concentrates on the process of data diffusion within the P2P overlay and complements this view with some measurements that highlight the most salient features of P2P architectures. The second part of the Chapter completes the view, bringing up the modeling efforts to capture the main characteristics and limits of P2P streaming systems, both analytically and numerically. The Chapter is closed by a pristine look at some challenging, open questions, with a specific emphasis on the adoption of network coding in P2P streaming solutions.

  7. IPS - a vision aided navigation system

    Science.gov (United States)

    Börner, Anko; Baumbach, Dirk; Buder, Maximilian; Choinowski, Andre; Ernst, Ines; Funk, Eugen; Grießbach, Denis; Schischmanow, Adrian; Wohlfeil, Jürgen; Zuev, Sergey

    2017-04-01

    Ego localization is an important prerequisite for several scientific, commercial, and statutory tasks. Only by knowing one's own position, can guidance be provided, inspections be executed, and autonomous vehicles be operated. Localization becomes challenging if satellite-based navigation systems are not available, or data quality is not sufficient. To overcome this problem, a team of the German Aerospace Center (DLR) developed a multi-sensor system based on the human head and its navigation sensors - the eyes and the vestibular system. This system is called integrated positioning system (IPS) and contains a stereo camera and an inertial measurement unit for determining an ego pose in six degrees of freedom in a local coordinate system. IPS is able to operate in real time and can be applied for indoor and outdoor scenarios without any external reference or prior knowledge. In this paper, the system and its key hardware and software components are introduced. The main issues during the development of such complex multi-sensor measurement systems are identified and discussed, and the performance of this technology is demonstrated. The developer team started from scratch and transfers this technology into a commercial product right now. The paper finishes with an outlook.

  8. Relationship between Interplanetary (IP) Parameters and Geomagnetic Indices during IP Shock Events of 2005

    Indian Academy of Sciences (India)

    Jatin Rathod; Girija Rajaram; Radharani Alyana; A. Chandrasekhar Reddy; D. S. Misra; C. G. Patil; M. Y. S. Prasad; A. G. Ananth

    2008-03-01

    In the present study, we investigate the possible relationship of IP parameters of solar wind and interplanetary magnetic field with ground-based geomagnetic indices. To carry out the study, we take all the IP shock events listed by Proton Monitor onboard Solar and Heliospheric Observatory (SOHO) during 2005, and plot the time variations of all the IP parameters and geomagnetic parameters (±5 days), centered at the shock arrival time. Next, we obtain scatter plots of absolute values of solar wind parameters such as Vsw, Nsw and Interplanetary Magnetic Field (IMF) components Bx, By, Bz and total B with the values of geomagnetic parameters such as Dst, Kp indices, dayside Magnetopause (MP) distance and Cosmic-Ray Neutron Monitor count (CRNM). The scatter plots show that before the IP shock, the pattern is random with no clear relationship. Following the shock, a clear pattern emerges with a type of relationship being seen – clear for SHARP shocks and less clear for DIFFUSE shocks. A total of 10 shock events for 2005 have been studied. Typical examples of this behaviour are the shock events of January 21, 2005 and May 15, 2005. Our study suggests a definite correlation between changes in the solar wind and interplanetary magnetic field parameters and ground-based geomagnetic response. We are trying to obtain quantitative relationships between these for shock events of 2005.

  9. Chromatin immunoprecipitation (ChIP) of plant transcription factors followed by sequencing (ChIP-SEQ) or hybridization to whole genome arrays (ChIP-CHIP)

    NARCIS (Netherlands)

    Kaufmann, K.; Muiño, J.M.; Østerås, M.; Farinelli, L.; Krajewski, P.; Angenent, G.C.

    2010-01-01

    Chromatin immunoprecipitation (ChIP) is a powerful technique to study interactions between transcription factors (TFs) and DNA in vivo. For genome-wide de novo discovery of TF-binding sites, the DNA that is obtained in ChIP experiments needs to be processed for sequence identification. The sequences

  10. Lifecycle Readiness and Ship Deployment

    Science.gov (United States)

    2013-06-01

    The physical fatigue associated with ship motions has significant consequences for today’s minimally manned ships. “Because of minimally sized...a deployment. The inefficiencies in performance may develop from lack of training, different personal aptitude, and individual’s mental or physical ...exacerbation of symptoms known as the avalanche phenomenon follows which includes: increased salivation, bodily warmth , and light- headedness” (Stevens

  11. In vitro synthesis and purification of PhIP-deoxyguanosine and PhIP-DNA oligomer covalent complexes

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, J.

    1994-12-01

    2-Amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP) is a heterocyclic amine compound formed when meats are cooked at high temperatures. PhIP damages DNA by forming covalent complexes with DNA carcinogen. In an effort to understand how the binding of PhIP to DNA may cause cancer, it is important to characterize the structures of PhIP-damaged DNA molecules. Our HPLC data support fluorescence and {sup 32}P Post-labeling studies which indicate the formation of several species of 2{prime}deoxyguanosine-(dG) or oligodeoxynucleotide-PhIP adducts. The reaction of PhIP with dG resulted in a reddish precipitate that was likely the major adduct, N-(deoxyguanosin-8-yl)-PhIP (dG-C8-PhIP) adduct, with a more polar adduct fraction remaining in the supernatant. Reversed-phase HPLC analysis of the adducts in the supernatant revealed the existence of species of much shorter retention times than the dG-C8-PhIP adduct, confirming that these species are more polar than dG-C8-PhIP. At least four adducts were formed in the reaction of PhIP with DNA oligomer. HPLC analysis of the PhIP-DNA oligomer supernatant after butanol extractions revealed four unresolved peaks which spectra had maximum wavelengths between 340 and 360 nm. Though adduct peaks were not completely resolved, there was {approximately}3 minutes interval between the DNA oligomer peak and the adduct peaks. Furthermore, fluorescence emission data of the DNA oligomer-PhIP adduct solution show heterogeneous binding. The more polar PhIP adducts were fraction-collected and their structures will be solved by nuclear magnetic resonance or x-ray crystallography.

  12. KAJIAN INDUCED PLURIPOTENT STEMCELL (iPS (HARAPAN DAN TANTANGAN

    Directory of Open Access Journals (Sweden)

    Masagus Zainuri

    2014-05-01

    Full Text Available AbstractInduced Pluripotent Stemcell (iPS are adult cells which the genetic information in the nucleus of those cells being reprogrammed (reprogram by inserting exogenous pluripotential genes. The exogenous gene transduction is using vectors, such as lentivirus, retrovirus, or adenovirus, which suppressed the gene expression of the original cells, so they will express the transduced exogenous gene. Viral vectors are then used to reprogramming and producing iPS clones that are pluripotent. iPS derived from adult cells of patient with certain diseases will be used as a tool to study the mechanisms of those specific diseases and the effects of selected drugs against the diseases. Several previous studies have shown that iPS clones developed from specific genetic disease have its original genotype and retain the character of the response to the drug that similar as the original adult cells. Opportunities for the utilization of autologous iPS cell therapy in the future is wide open as expected iPS transplant will not be rejected when transplanted back to the patient. Behind all its potential, iPS production is still facing some problems to be applicable clinically. The use of viruses as vectors may cause problems due to virus gene sequences may be integrated into the genome of the DNA donor cell, thereby causing mutations of the iPS clones. Several subsequent studies have succeeded in replacing the use of viruses as vectors, but the level of efficiency obtained is still very low. Another problem that arises is that epigenetic changes may occur in iPS cultures. Many advanced research related to iPS may be developed in Indonesia and is necessary to improve the production efficiency of iPS and solve iPS clones epigenetic changes problems in the future.Keywords: iPS, pluripotency, transduction, transfection.AbstrakInduced Pluripotent Stemcell (iPS adalah sel somatic dewasa yang informasi genetika dalam inti selnyadiprogram ulang (reprogram dengan cara

  13. Hierarchical Orbital Observatory Deployable Shroud (HOODS) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Large deployable telescopes such as NASA's 9.2m and 16.8m segmented ATLAST systems require commensurately large deployable sunshades for thermal control and to...

  14. Optimal Filtering of Malicious IP Sources

    CERN Document Server

    Soldo, Fabio; Argyraki, Katerina

    2008-01-01

    How can we protect the network infrastructure from malicious traffic, such as scanning, malicious code propagation, and distributed denial-of-service (DDoS) attacks? One mechanism for blocking malicious traffic is filtering: access control lists (ACLs) can selectively block traffic based on fields of the IP header. Filters (ACLs) are already available in the routers today but are a scarce resource because they are stored in the expensive ternary content addressable memory (TCAM). In this paper, we develop, for the first time, a framework for studying filter selection as a resource allocation problem. Within this framework, we study five practical cases of source address/prefix filtering, which correspond to different attack scenarios and operator's policies. We show that filter selection optimization leads to novel variations of the multidimensional knapsack problem and we design optimal, yet computationally efficient, algorithms to solve them. We also evaluate our approach using data from Dshield.org and dem...

  15. 解密家用VoIP

    Institute of Scientific and Technical Information of China (English)

    陈荆花

    2006-01-01

    对一个计算机从业者,人们经常期望他了解所有VoIP技术——如同期望他能恢复硬盘、杀除病毒、组建家庭网络、让用不同语言写的程序兼容运行等等。而事实上,尽管一位计算机从业者可能读过许多行业杂志,或在实验室研究过Asterisk(开放源代码的软件VoIP PBX系统)和SIP网关之类的东西,但真正要在家庭动手实践时,那些理论不一定能解决问题。

  16. TCP/IP Over SpaceWire

    Science.gov (United States)

    Mills, S.; Parkes, S.

    The SpaceWire standard defines a network designed for handling payload data and control information onboard a spacecraft. Among the goals of SpaceWire are re-usability and reliability. The use of network protocols on top of SpaceWire is expected to enhance the already rich re-usability and reliability characteristics of SpaceWire. The Space Systems Research Group at the University of Dundee have developed software to allow data to be sent over SpaceWire using standard network protocols such as TCP/IP, as part of a program of work looking at network protocols for SpaceWire. This paper describes network protocols and their relationship to SpaceWire, introduces software written to allow network protocols to be layered on to SpaceWire, describes the research behind the development of this software, and gives results of some tests and observations made using the software.

  17. Implementation of a Prototype VoIP System

    Institute of Scientific and Technical Information of China (English)

    刘喜成; 李仲同

    2000-01-01

    VoIP (Voice over IP) is a rapidly growing area with great market potential. To promote it for both commercial and research purposes, a prototype VoIP system based on state-of-the-art Motorola communication techniques has been developed. It is a gateway system integrating a PBX and a VoIP module. All com ponents that H.323 defines to support VoIP are implemented in the VoIP module, though in a simplified manner. As an embedded system, the system features real timeness and task distributiveness. A number of additional techniques are used to improve the performance, including noise suppression, zero copy, and buffer structure optimization. When refined in interoperability, the system will also readily serve as a product.

  18. Security Support in Continuous Deployment Pipeline

    DEFF Research Database (Denmark)

    Ullah, Faheem; Raft, Adam Johannes; Shahin, Mojtaba

    2017-01-01

    Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production. Continuous Deployment Pipeline (CDP) supports CD practice by transferring the changes from the repository to production. Since most of the C...

  19. ATF2 Ultra-Low IP Betas Proposal

    CERN Document Server

    Bambade, P; Bai, S; Braun, H; Delahaye, J P; Marin, E; Schulte, D; Tomás, R; Zimmermann, F; Gao, J; Wang, D; Zhu, XW; Honda, Y; Kuroda, S; Okugi, T; Tauchi, T; Terunuma, N; Urakawa, J; Seryi, A; White, G; Woodley, M; Angal-Kalinin, D; Jones, J; Scarfe, A

    2010-01-01

    The CLIC Final Focus System has considerably larger chromaticity than those of ILC and its scaled test machine ATF2. We propose to reduce the IP betas of ATF2 to reach a CLIC-like chromaticity. This would also allow to study the FFS tuning difficulty as function of the IP beam spot size. Both the ILC and CLIC projects will largely benefit from the ATF2 experience at these ultra-low IP betas.

  20. Mobility and QoS Support in Mobile IP Networks

    Institute of Scientific and Technical Information of China (English)

    DUAN Lian; WU Wei-ling

    2004-01-01

    This paper presents the state of the art of the Quality of Service (QoS) and mobility support mechanisms for mobile IP networks, which includes the issues and challenges in QoS support, an overview of the Mobile IP protocol, a general description of the QoS and Mobility framework, and the End-To-End QoS architecture in the next-generation all-IP mobile network.

  1. Strategies Towords Next Generation IP Over Optical Networks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A consensus is emerging in industry on utilizing an IP-Centric control plane within optical networks to support dynamic provisioning and restoration of lightpaths. At the same time, there are divergent views of how IP routers interact with optical core networks to achieve end-to-end connectivity. This paper describes the strategies of optical communication's future development towards next generation IP over Optical Networks. The desirable extent of network transparency in advanced all-optical network architecture is studied. Architectural alternatives for interconnecting IP routers over optical networks, and the concerned routing and signaling issues are described.

  2. Implementation of direct routing mobile IP for solving triangular routing

    Science.gov (United States)

    Jang, Jongwook; Jang, SeongHo; Park, Miri; Lee, Dae-bong

    2001-10-01

    Mobility support on the network layer is of special importance, as the network layer holds together the huge Internet with common protocol IP. Although based on possibility different wireless or wired technologies, all nodes of the network should be able to communicate. Therefore, mobile IP(an extension of the classical IP) has been designed which enablemobility in the Internet without changing existing wired systems. However, mobile IP leaves some points unsolved. Especially, if it comes to security, efficiency of the packet flow that is called triangular routing. Especially triangular routing can cause unnecessary overhead for the network. Furthermore latency can increase dramatically. This is particularly unfortunate if two communicating hosts are separated by transatlantic links. In order to this problem, many methods like IPv6 and ROMIP are proposed. But these methods have limitation. In other words, they have not compatibility because of needing modification of original IP scheme. Especially ROMIP is very complex and the overhead of control message and processing are serious. The problem of inconsistency of Binding caches may occur too. We therefore propose and analyze the performance of the DRMIP (Direct Routing Mobile IP) which do not modify IP source needed in the sender, is compatible with IP and Mobile IP.

  3. Design and performance evaluation of direct routing mobile IP

    Science.gov (United States)

    Jang, Jongwook; Jang, SeongHo; Kim, Kilyeun; Lee, Jung-Tae

    2001-07-01

    Mobility support on the network layer is of special importance, as the network layer holds together the huge Internet with common protocol IP. Although based on possibility different wireless or wired technologies, all nodes of the network should be able to communicate. Therefore, mobile IP (an extension of the classical IP) has been designed which enables mobility in the Internet without changing existing wired systems. However, mobile IP leaves some points unsolved. Especially, if it comes to security, efficient of the packet flow that is called triangular routing. Especially triangular routing can cause unnecessary overhead for the network. Furthermore latency can increase dramatically. This is particularly unfortunate if two communicating hosts are separated by transatlantic links. In order to this problem, many methods like IPv6 and ROMIP are proposed. But these methods have limitation. In other words, they have not compatibility because of needing modification or original IP scheme. Especially ROMIP is very complex and the overhead of control message and processing are serious. The problem of inconsistency of Binding caches may occur tool. We therefore propose and analyze the DRMIP (Direct Routing Mobile IP) which do not modify IP source needed in the sender, is compatible with IP and Mobile IP.

  4. Distinct iPS Cells Show Different Cardiac Differentiation Efficiency.

    Science.gov (United States)

    Ohno, Yohei; Yuasa, Shinsuke; Egashira, Toru; Seki, Tomohisa; Hashimoto, Hisayuki; Tohyama, Shugo; Saito, Yuki; Kunitomi, Akira; Shimoji, Kenichiro; Onizuka, Takeshi; Kageyama, Toshimi; Yae, Kojiro; Tanaka, Tomofumi; Kaneda, Ruri; Hattori, Fumiyuki; Murata, Mitsushige; Kimura, Kensuke; Fukuda, Keiichi

    2013-01-01

    Patient-specific induced pluripotent stem (iPS) cells can be generated by introducing transcription factors that are highly expressed in embryonic stem (ES) cells into somatic cells. This opens up new possibilities for cell transplantation-based regenerative medicine by overcoming the ethical issues and immunological problems associated with ES cells. Despite the development of various methods for the generation of iPS cells that have resulted in increased efficiency, safety, and general versatility, it remains unknown which types of iPS cells are suitable for clinical use. Therefore, the aims of the present study were to assess (1) the differentiation potential, time course, and efficiency of different types of iPS cell lines to differentiate into cardiomyocytes in vitro and (2) the properties of the iPS cell-derived cardiomyocytes. We found that high-quality iPS cells exhibited better cardiomyocyte differentiation in terms of the time course and efficiency of differentiation than low-quality iPS cells, which hardly ever differentiated into cardiomyocytes. Because of the different properties of the various iPS cell lines such as cardiac differentiation efficiency and potential safety hazards, newly established iPS cell lines must be characterized prior to their use in cardiac regenerative medicine.

  5. Inositol hexaphosphate (IP6): a novel treatment for pancreatic cancer.

    Science.gov (United States)

    Somasundar, Ponnandai; Riggs, Dale R; Jackson, Barbara J; Cunningham, Cynthia; Vona-Davis, Linda; McFadden, David W

    2005-06-15

    Inositol hexaphosphate (IP6) is a naturally occurring polyphosphorylated carbohydrate found in food sources high in fiber content. IP6 has been reported to have significant inhibitory effects against a variety of primary tumors including breast and colon. The effects of IP6 have not been evaluated in pancreatic cancer. We hypothesized that IP6 would significantly inhibit cell growth and increase the apoptotic rate of pancreatic cancer in vitro. Two pancreatic cancer cell lines (MIAPACA and PANC1) were cultured using standard techniques and treated with IP6 at doses of 0.5, 1.0, and 5.0 mm. Cell viability was measured by MTT at 24 and 72 h. Apoptosis was evaluated by Annexin V-FITC and results calculated using FACS analysis. Statistical analysis was performed by ANOVA. Significant reductions (P IP6 concentrations tested in both cell lines and at both time points. Reductions in cell proliferation ranged from 37.1 to 91.5%. IP6 increased early and late apoptotic activity (P IP6 significantly decreased cellular growth and increased apoptosis. Our findings suggest that IP6 has the potential to become an effective adjunct for pancreatic cancer treatment. Further in vivo and human studies are needed to evaluate safety and clinical utility of this agent in patients with pancreatic cancer.

  6. Inositol hexaphosphate (IP6) inhibits cellular proliferation in melanoma.

    Science.gov (United States)

    Rizvi, Irfan; Riggs, Dale R; Jackson, Barbara J; Ng, Alex; Cunningham, Cynthia; McFadden, David W

    2006-06-01

    Inositol Hexaphosphate (IP6) is a naturally occurring polyphosphorylated carbohydrate found in food sources high in fiber content. We have previously reported IP6 to have significant inhibitory effects against pancreatic cancer in vitro. We hypothesized that the IP6 would significantly inhibit cell growth of cutaneous melanoma in vitro. The melanoma line HTB68 was cultured using standard techniques and treated with IP6 at doses ranging from 0.2 to 1.0 mM/well. Cell viability was measured by MTT at 72 h. VEGF production was measured in the cell supernatants by ELISA. Apoptosis was evaluated by Annexin V-FITC and results calculated using FACS analysis. Statistical analysis was performed by ANOVA. Significant reductions (P IP6. Overall, IP6 exhibited a mean inhibition of cell growth of 52.1 +/- 11.5% (range, 1.6-83.0%) at 72 h of incubation. VEGF production was significantly reduced (P IP6 (7.5 pg/ml) compared to control (40.9 pg/ml). IP6 significantly increased (P = 0.029) late apoptosis from 5.3 to 7.0% gated events. No changes in necrosis or early apoptosis were observed. Adjuvant treatment of melanoma continues to challenge clinicians and patients. Our findings that IP6 significantly decreased cellular growth, VEGF production and increased late apoptosis in melanoma suggest its potential therapeutic value. Further in vivo studies are planned to evaluate safety and clinical utility of this agent.

  7. Distinct iPS Cells Show Different Cardiac Differentiation Efficiency

    Directory of Open Access Journals (Sweden)

    Yohei Ohno

    2013-01-01

    Full Text Available Patient-specific induced pluripotent stem (iPS cells can be generated by introducing transcription factors that are highly expressed in embryonic stem (ES cells into somatic cells. This opens up new possibilities for cell transplantation-based regenerative medicine by overcoming the ethical issues and immunological problems associated with ES cells. Despite the development of various methods for the generation of iPS cells that have resulted in increased efficiency, safety, and general versatility, it remains unknown which types of iPS cells are suitable for clinical use. Therefore, the aims of the present study were to assess (1 the differentiation potential, time course, and efficiency of different types of iPS cell lines to differentiate into cardiomyocytes in vitro and (2 the properties of the iPS cell-derived cardiomyocytes. We found that high-quality iPS cells exhibited better cardiomyocyte differentiation in terms of the time course and efficiency of differentiation than low-quality iPS cells, which hardly ever differentiated into cardiomyocytes. Because of the different properties of the various iPS cell lines such as cardiac differentiation efficiency and potential safety hazards, newly established iPS cell lines must be characterized prior to their use in cardiac regenerative medicine.

  8. IPRAN network deployment%IPRAN部署方案研究

    Institute of Scientific and Technical Information of China (English)

    黄松乔

    2013-01-01

      With the development of mobile communication 2G to 3G technology evolution, the voice-centric mobile service toward the direction of both voice and data services, business development needs of new mobile Internet business and telecom operators to promote the mobile service and bearer network IP-based process. This article describes the IPRAN the background, analysis of key issues. On mainstream IPRAN technology introduction, in particular, demonstrated the technical principles and network strategy for PTN. On this basis, a full-service operation environment as a starting point, how to IP RAN bearer network architecture to build a fusion carrying mobile, video and broadband integrated services. Finally, the actual network of the telecom operators to deploy strategic plan as an example, certain described the IPRAN network deployment strategy.%  随着移动通信2G向3G技术的演进,以话音为主的移动业务向着话音和数据业务并重的方向发展,移动互联网的新型业务以及电信运营商的全业务拓展需求推动着移动业务和承载网络的IP化进程。本文介绍了IPRAN的发展背景,对关键问题进行了分析。同时,对主流的IPRAN技术做了一定的介绍;特别针对PTN的技术原理以及组网策略进行了论证。在此基础上,讨论了全业务运营环境中,如何以IP RAN作为切入点来构建一个融合承载移动、视频及宽带等综合业务的承载网络架构。最后,通过某电信运营商的实际网络部署策略方案为案例,对IPRAN网络部署策略做一定阐述。

  9. RSG Deployment Case Testing Results

    Energy Technology Data Exchange (ETDEWEB)

    Owsley, Stanley L.; Dodson, Michael G.; Hatchell, Brian K.; Seim, Thomas A.; Alexander, David L.; Hawthorne, Woodrow T.

    2005-09-01

    The RSG deployment case design is centered on taking the RSG system and producing a transport case that houses the RSG in a safe and controlled manner for transport. The transport case was driven by two conflicting constraints, first that the case be as light as possible, and second that it meet a stringent list of Military Specified requirements. The design team worked to extract every bit of weight from the design while striving to meet the rigorous Mil-Spec constraints. In the end compromises were made primarily on the specification side to control the overall weight of the transport case. This report outlines the case testing results.

  10. Telomere reprogramming and maintenance in porcine iPS cells.

    Science.gov (United States)

    Ji, Guangzhen; Ruan, Weimin; Liu, Kai; Wang, Fang; Sakellariou, Despoina; Chen, Jijun; Yang, Yang; Okuka, Maja; Han, Jianyong; Liu, Zhonghua; Lai, Liangxue; Gagos, Sarantis; Xiao, Lei; Deng, Hongkui; Li, Ning; Liu, Lin

    2013-01-01

    Telomere reprogramming and silencing of exogenous genes have been demonstrated in mouse and human induced pluripotent stem cells (iPS cells). Pigs have the potential to provide xenotransplant for humans, and to model and test human diseases. We investigated the telomere length and maintenance in porcine iPS cells generated and cultured under various conditions. Telomere lengths vary among different porcine iPS cell lines, some with telomere elongation and maintenance, and others telomere shortening. Porcine iPS cells with sufficient telomere length maintenance show the ability to differentiate in vivo by teratoma formation test. IPS cells with short or dysfunctional telomeres exhibit reduced ability to form teratomas. Moreover, insufficient telomerase and incomplete telomere reprogramming and/or maintenance link to sustained activation of exogenous genes in porcine iPS cells. In contrast, porcine iPS cells with reduced expression of exogenous genes or partial exogene silencing exhibit insufficient activation of endogenous pluripotent genes and telomerase genes, accompanied by telomere shortening with increasing passages. Moreover, telomere doublets, telomere sister chromatid exchanges and t-circles that presumably are involved in telomere lengthening by recombination also are found in porcine iPS cells. These data suggest that both telomerase-dependent and telomerase-independent mechanisms are involved in telomere reprogramming during induction and passages of porcine iPS cells, but these are insufficient, resulting in increased telomere damage and shortening, and chromosomal instability. Active exogenes might compensate for insufficient activation of endogenous genes and incomplete telomere reprogramming and maintenance of porcine iPS cells. Further understanding of telomere reprogramming and maintenance may help improve the quality of porcine iPS cells.

  11. Protection against cancer by dietary IP6 and inositol.

    Science.gov (United States)

    Vucenik, Ivana; Shamsuddin, AbulKalam M

    2006-01-01

    Inositol hexaphosphate (IP(6)) is a naturally occurring polyphosphorylated carbohydrate, abundantly present in many plant sources and in certain high-fiber diets, such as cereals and legumes. In addition to being found in plants, IP(6) is contained in almost all mammalian cells, although in much smaller amounts, where it is important in regulating vital cellular functions such as signal transduction, cell proliferation, and differentiation. For a long time IP(6) has been recognized as a natural antioxidant. Recently IP(6) has received much attention for its role in cancer prevention and control of experimental tumor growth, progression, and metastasis. In addition, IP(6) possesses other significant benefits for human health, such as the ability to enhance immune system, prevent pathological calcification and kidney stone formation, lower elevated serum cholesterol, and reduce pathological platelet activity. In this review we show the efficacy and discuss some of the molecular mechanisms that govern the action of this dietary agent. Exogenously administered IP(6) is rapidly taken up into cells and dephosphorylated to lower inositol phosphates, which further affect signal transduction pathways resulting in cell cycle arrest. A striking anticancer action of IP(6) was demonstrated in different experimental models. In addition to reducing cell proliferation, IP(6) also induces differentiation of malignant cells. Enhanced immunity and antioxidant properties also contribute to tumor cell destruction. Preliminary studies in humans show that IP(6) and inositol, the precursor molecule of IP(6), appear to enhance the anticancer effect of conventional chemotherapy, control cancer metastases, and improve quality of life. Because it is abundantly present in regular diet, efficiently absorbed from the gastrointestinal tract, and safe, IP(6) + inositol holds great promise in our strategies for cancer prevention and therapy. There is clearly enough evidence to justify the

  12. PENGEMBANGAN PERANGKAT PEMBELAJARAN IPS DENGAN PENDEKATAN INQUIRY

    Directory of Open Access Journals (Sweden)

    Lisna Handayani

    2015-08-01

    Full Text Available Tujuan  penelitian adalah menghasilkan perangkat pembelajaran IPS dengan Pendekatan Inquiry. Penelitian pengembangan ini menggunakan langkah-langkah Borg and Gall yang terdiri dari tiga tahapan utama yaitu pendahuluan, pengembangan dan validasi. Data yang diperoleh adalah hasil belajar, aktivitas diskusi dan respon peserta didik. Data dianalisis menggunakan analisis deskriptif dan uji t. Penggunaan pendekatan inquiry sebagai salah satau strategi pembelajaran IPS dapat dilakukan dengan mempersiapkan terlebih dahulu perangkat pembelajarannya. Hasil pengembangan divalidasi oleh pakar, diujicobakan pada kelas terbatas dan selanjutnya dilakukan ujicoba pada kelas eksperimen yang dibandingkan hasilnya dengan kelas kontrol. Perangkat pembelajaran tergolong efektif untuk meningkatkan hasil belajar peserta didik di kelas VII SMP Negeri 2 Jepara, terbukti dari adanya peningkatan yang nyata terbukti dari hasil uji paired sampel t-test dengan nilai signifikansi 0,000 <0,05, dan terjadi peningkatan yang tinggi (gain > 0,7, serta hasil belajar yang dicapai berbeda secara signifikan dengan kelompok kontrol. Di samping hasil belajar, pembelajaran yang dilakukan juga berdampak pada proses belajar yang membawa tingginya aktivitas peserta didik dalam memberikan gagasan, kerjasama, inisiatif, keaktifan dan kedisiplinan. The purpose of this research is creating Social Lesson Material with Inquiry Approach.This developing of the research is used of  the steps of Borg and Gall. They are Introducing, developing and evaluating. Learning materials are developed and validity by expert. Datas are gooten by study result, discussion activity and students, respone. Analizing datas are used descriptive analize and t- try out. The use of inquiry approach as one of learning strategy on Social Lesson Material can be done by preparing those. The result of  developing are being validity by expert,  try out on limited group and experiment group ad compare with control group

  13. Special rights for the development of Indigenous Peoples (IPS) in ...

    African Journals Online (AJOL)

    Special rights for the development of Indigenous Peoples (IPS) in Africa: Any need in a democratic society with ... Journal Home > Vol 4 (2013) > ... Globalization and efforts to link human, cultural and social rights to the IPs remain blurred and ...

  14. Field Test Results on Natural Field IP Method

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    In this paper the authors propose the natural field induced polarization (IP) method and present the way to pick up IP effect. The relations between the object and anomaly are studied by taking field experiments as examples. The effectiveness and usability of the method are testified.

  15. Evolutionary Programming for IP/MIP Problems with Linear Constraints

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    In this paper, we propose a modified evolutionary programming with dynamic domain for solving nonlinear IP/MIP problems with linear constraints, without involving penalty function or any transformation for the problem to a linear model or others. The numerical results show that the new algorithm gives a satisfactory performance in which it works of high speed and accuracy in IP/MIP problems.

  16. Fair Scheduling for Delay-Sensitive VoIP Traffic

    Science.gov (United States)

    Ahmed, Shawish; Jiang, Xiaohong; Horiguchi, Susumu

    With the wide expansion of voice services over the IP networks (VoIP), the volume of this delay sensitive traffic is steadily growing. The current packet schedulers for IP networks meet the delay constraint of VoIP traffic by simply assigning its packets the highest priority. This technique is acceptable as long as the amount of VoIP traffic is relatively very small compared to other non-voice traffic. With the notable expansion of VoIP applications, however, the current packet schedulers will significantly sacrifice the fairness deserved by the non-voice traffic. In this paper, we extend the conventional Deficit Round-Robin (DRR) scheduler by including a packet classifier, a Token Bucket and a resource reservation scheme and propose an integrated packet scheduler architecture for the growing VoIP traffic. We demonstrate through both theoretical analysis and extensive simulation that the new architecture makes it possible for us to significantly improve the fairness to non-voice traffic while still meeting the tight delay requirement of VoIP applications.

  17. In silico pooling of ChIP-seq control experiments.

    Science.gov (United States)

    Sun, Guannan; Srinivasan, Rajini; Lopez-Anido, Camila; Hung, Holly A; Svaren, John; Keleş, Sündüz

    2014-01-01

    As next generation sequencing technologies are becoming more economical, large-scale ChIP-seq studies are enabling the investigation of the roles of transcription factor binding and epigenome on phenotypic variation. Studying such variation requires individual level ChIP-seq experiments. Standard designs for ChIP-seq experiments employ a paired control per ChIP-seq sample. Genomic coverage for control experiments is often sacrificed to increase the resources for ChIP samples. However, the quality of ChIP-enriched regions identifiable from a ChIP-seq experiment depends on the quality and the coverage of the control experiments. Insufficient coverage leads to loss of power in detecting enrichment. We investigate the effect of in silico pooling of control samples within multiple biological replicates, multiple treatment conditions, and multiple cell lines and tissues across multiple datasets with varying levels of genomic coverage. Our computational studies suggest guidelines for performing in silico pooling of control experiments. Using vast amounts of ENCODE data, we show that pairwise correlations between control samples originating from multiple biological replicates, treatments, and cell lines/tissues can be grouped into two classes representing whether or not in silico pooling leads to power gain in detecting enrichment between the ChIP and the control samples. Our findings have important implications for multiplexing samples.

  18. Last Tribute to Professor Zheng Chengsi, Renowned IP Law Scholar

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    On 10 September 2006, Professor Zheng Chengsi, the renowned Chinese IP law scholar, Chairman of the IP Law Society of the China Law Society, Vice-President of the Copyright Society of China, and member of the Chinese Academy of Social Sciences, passed away in Beijing at the age of 62.

  19. IP-10 release assays in the diagnosis of tuberculosis infection

    DEFF Research Database (Denmark)

    Ruhwald, Morten; Aabye, Martine G; Ravn, Pernille

    2012-01-01

    The current state-of-the-art tests for infection with Mycobacterium tuberculosis - the IFN-γ release assays - rely on accurate measurement of the cytokine IFN-γ. Many other potential biomarkers are expressed in concert with IFN-γ, and IP-10 in particular has shown promising results. IP-10...

  20. Probabilistic Route Selection Algorithm for IP Traceback

    Science.gov (United States)

    Yim, Hong-Bin; Jung, Jae-Il

    DoS(Denial of Service) or DDoS(Distributed DoS) attack is a major threaten and the most difficult problem to solve among many attacks. Moreover, it is very difficult to find a real origin of attackers because DoS/DDoS attacker uses spoofed IP addresses. To solve this problem, we propose a probabilistic route selection traceback algorithm, namely PRST, to trace the attacker's real origin. This algorithm uses two types of packets such as an agent packet and a reply agent packet. The agent packet is in use to find the attacker's real origin and the reply agent packet is in use to notify to a victim that the agent packet is reached the edge router of the attacker. After attacks occur, the victim generates the agent packet and sends it to a victim's edge router. The attacker's edge router received the agent packet generates the reply agent packet and send it to the victim. The agent packet and the reply agent packet is forwarded refer to probabilistic packet forwarding table (PPFT) by routers. The PRST algorithm runs on the distributed routers and PPFT is stored and managed by routers. We validate PRST algorithm by using mathematical approach based on Poisson distribution.

  1. Performance Comparison of IP-Networked Storage

    Institute of Scientific and Technical Information of China (English)

    JU Dapeng; LIU Chuanyi; WANG Dongsheng; LIU Hong; TANG Zhizhong

    2009-01-01

    Dramatically increasing amounts of digital data are placing huge requirements on storage systems.IP-networked storage systems,such as the network file system (NFS)-based network-attached storage (NAS) systems and the iSCSI-storage area network (SAN) systems,have become increasingly common in today's local area network (LAN) environments.The emergence of new storage techniques,such as object-based storage (OBS) and content aware storage (CAS),significantly improves the functionality of storage devices to meet further needs for storage sub-systems.However,these may impact system performance.This paper compares the performance of NFS,iSCSI storage,object-based storage devices (OSDs),and CAS-based storage systems in an environment with no data sharing across host machines.A gigabit ethernet network is used as the storage network.Test results demonstrate that the performances of these systems are comparable with CAS being much better than the others for write operations.The performance bottlenecks in these systems are analyzed to provide insight into how future storage systems may be improved and possible optimization methods.The analysis shows how the I/O interfaces in these systems affect the application performance and that network-based storage systems require optimized I/O latency and reduced network and buffer processing in the servers.

  2. Heterogeneous IP Ecosystem enabling Reuse (HIER)

    Science.gov (United States)

    2017-03-22

    lot • For even a 90% yield, per‐chip  costs  would at least be   $2.2M / (48,000 * 0.90) = $51 – Chiplet  price  would be based on this  cost   plus  some...There are not industry‐wide  pricing  models for IP, e.g. • CHIPS users will need to determine fabrication  costs • But also will need to determine ‘value...incidental  management  costs   plus  some markup to incentivize DoD contractors to  participate – The markup value is key to the model maintaining

  3. EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS

    Directory of Open Access Journals (Sweden)

    Emil Kuriakose John

    2012-10-01

    Full Text Available In this age of gigabit Ethernet and broadband internet, network security has been the top priority for most of the researchers. Technology advancements have advantages as well as disadvantages. Most of the communication of present world, the e-world, takes place online, through the internet. Thus the context of network intrusions and attacks to hack into servers also came into existence. A technique to perform this activity is made possible by preventing the discovery of the sender’s identity through IP Spoofing [7]. Many popular internet sites have been hacked and attackers try to forge or spoof the source addresses in IP packets. Using spoofing detection technique, the user can retrieve the list of IP addresses and able to identify the malicious IP addresses.Hence mechanisms must be designed to prevent hacking. This paper proposes a novel technique to detect IP spoofing based on traffic verification and filtering.

  4. COPAR: A ChIP-Seq Optimal Peak Analyzer

    Directory of Open Access Journals (Sweden)

    Binhua Tang

    2017-01-01

    Full Text Available Sequencing data quality and peak alignment efficiency of ChIP-sequencing profiles are directly related to the reliability and reproducibility of NGS experiments. Till now, there is no tool specifically designed for optimal peak alignment estimation and quality-related genomic feature extraction for ChIP-sequencing profiles. We developed open-sourced COPAR, a user-friendly package, to statistically investigate, quantify, and visualize the optimal peak alignment and inherent genomic features using ChIP-seq data from NGS experiments. It provides a versatile perspective for biologists to perform quality-check for high-throughput experiments and optimize their experiment design. The package COPAR can process mapped ChIP-seq read file in BED format and output statistically sound results for multiple high-throughput experiments. Together with three public ChIP-seq data sets verified with the developed package, we have deposited COPAR on GitHub under a GNU GPL license.

  5. Adaptation of Powerline Communications-Based Smart Metering Deployments to the Requirements of Smart Grids

    Directory of Open Access Journals (Sweden)

    Alberto Sendin

    2015-11-01

    Full Text Available Powerline communications (PLC-based smart meter deployments are now a reality in many regions of the world. Although PLC elements are generally incorporated in smart meters and data concentrators, the underlying PLC network allows the integration of other smart grid services directly over it. The remote control capabilities that automation programs need and are today deployed over their medium voltage (MV grid, can be extended to the low voltage (LV grid through these existing PLC networks. This paper demonstrates the capabilities of narrowband high data rate (NB HDR PLC technologies deployed over LV grids for smart metering purposes to support internet protocol internet protocol (IP communications in the LV grid. The paper demonstrates these possibilities with the presentation of the simulation and laboratory results of IP communications over international telecommunication union: ITU-T G.9904 PLC technology, and the definition of a PLC Network Management System based on a simple network management protocol (SNMP management information base (MIB definition and applicable use cases.

  6. Anti-angiogenic activity of inositol hexaphosphate (IP6).

    Science.gov (United States)

    Vucenik, Ivana; Passaniti, Antonino; Vitolo, Michele I; Tantivejkul, Kwanchanit; Eggleton, Paul; Shamsuddin, Abulkalam M

    2004-11-01

    A significant anticancer activity of the naturally occurring carbohydrate inositol hexaphosphate (IP(6)) has been reported against numerous cancer models. Since tumors require angiogenesis for growth and metastasis, we hypothesize that IP(6) reduces tumor growth by inhibiting angiogenesis. Because angiogenesis depends on the interaction between endothelial and tumor cells, we investigated the effect of IP(6) on both. IP(6) inhibited the proliferation and induced the differentiation of endothelial cells in vitro; the growth of bovine aortic endothelial cells (BAECs) evaluated by MTT proliferation assay was inhibited in a dose-dependent manner (IC(50) = 0.74 mM). The combination of IP(6) and vasostatin, a calreticulin fragment with anti-angiogenic activity, was synergistically superior in growth inhibition than either compound. IP(6) inhibited human umbilical vein endothelial cell (HUVEC) tube formation (in vitro capillary differentiation) on a reconstituted extracellular matrix, Matrigel, and disrupted pre-formed tubes. IP(6) significantly reduced basic fibroblast growth factor (bFGF)-induced vessel formation (P < 0.01) in vivo in Matrigel plug assay. Exposure of HepG2, a human hepatoma cell line, to IP(6) for 8 h, resulted in a dose-dependent decrease in the mRNA levels of vascular endothelial growth factor (VEGF), as assessed by RT-PCR. IP(6) treatment of HepG2 cells for 24 h also significantly reduced the VEGF protein levels in conditioned medium, in a concentration-dependent manner (P = 0.012). Thus, IP(6) has an inhibitory effect on induced angiogenesis.

  7. Pre-deployment Year Mental Health Diagnoses and Treatment in Deployed Army Women.

    Science.gov (United States)

    Wooten, Nikki R; Adams, Rachel Sayko; Mohr, Beth A; Jeffery, Diana D; Funk, Wendy; Williams, Thomas V; Larson, Mary Jo

    2016-07-01

    We estimated the prevalence of select mental health diagnoses (MHDX) and mental health treatment (MHT), and identified characteristics associated with MHT during the pre-deployment year (365 days before deployment) in active duty Army women (N = 14,633) who returned from Iraq or Afghanistan deployments in FY2010. Pre-deployment year prevalence estimates were: 26.2 % for any select MHDX and 18.1 % for any MHT. Army women who had physical injuries since FY2002 or any behavioral health treatment between FY2002 and the pre-deployment year had increased odds of pre-deployment year MHT. During the pre-deployment year, a substantial percentage of Army women had MHDX and at least one MHT encounter or stay. Future research should determine if pre-deployment MHDX among Army women reflect vulnerability to future MHDX, or if pre-deployment MHT results in protection from chronic symptoms.

  8. Inositol hexakisphosphate (IP6) generated by IP5K mediates cullin-COP9 signalosome interactions and CRL function.

    Science.gov (United States)

    Scherer, Paul C; Ding, Yan; Liu, Zhiqing; Xu, Jing; Mao, Haibin; Barrow, James C; Wei, Ning; Zheng, Ning; Snyder, Solomon H; Rao, Feng

    2016-03-29

    The family of cullin-RING E3 Ligases (CRLs) and the constitutive photomorphogenesis 9 (COP9) signalosome (CSN) form dynamic complexes that mediate ubiquitylation of 20% of the proteome, yet regulation of their assembly/disassembly remains poorly understood. Inositol polyphosphates are highly conserved signaling molecules implicated in diverse cellular processes. We now report that inositol hexakisphosphate (IP6) is a major physiologic determinant of the CRL-CSN interface, which includes a hitherto unidentified electrostatic interaction between the N-terminal acidic tail of CSN subunit 2 (CSN2) and a conserved basic canyon on cullins. IP6, with an EC50 of 20 nM, acts as an intermolecular "glue," increasing cullin-CSN2 binding affinity by 30-fold, thereby promoting assembly of the inactive CRL-CSN complexes. The IP6 synthase, Ins(1,3,4,5,6)P5 2-kinase (IPPK/IP5K) binds to cullins. Depleting IP5K increases the percentage of neddylated, active Cul1 and Cul4A, and decreases levels of the Cul1/4A substrates p27 and p21. Besides dysregulating CRL-mediated cell proliferation and UV-induced apoptosis, IP5K depletion potentiates by 28-fold the cytotoxic effect of the neddylation inhibitor MLN4924. Thus, IP5K and IP6 are evolutionarily conserved components of the CRL-CSN system and are potential targets for cancer therapy in conjunction with MLN4924.

  9. DAB2IP 基因的研究进展%Progress on DAB2IP gene

    Institute of Scientific and Technical Information of China (English)

    袁妍; 陈海滨

    2011-01-01

    Human DAB2 interaction protein (DAB2IP) is a novel member of Ras GTPase-activating protein family. It interacts directly with disabled-2 protein (DAB2/DOC2) which suppresses growth of cancers derived from different tissues, including mammary, prostate and ovarian cancers. DAB2IP was identified as an immediate downstream effector mediated by DAB2/DOC2. DAB2IP and DAB2/DOC2 form a unique protein complex that has a negative regulatory effect on the Ras-mediated signal pathway. It is demonstrated that DAB2IP is a tumor suppressor gene inactivated by methylation in several cancers. This article reviews the structure and biological functions of DAB2IP gene as well as its potential roles in carcinogenesis and evolution.

  10. IP VPN及Internet VPN分类研究%A methodology of IP and internet virtual private network classification

    Institute of Scientific and Technical Information of China (English)

    王桐

    2009-01-01

    关于IP VPN的分类目前已经有很多研究,但目前还没有一个统一的说法,而对于Inter-net VPN的分类研究目前还没有见到.因此,PN和VPN,以及IP VPN和Internet VPN的区别和联系很容易被混淆,本文尝试给出了VPN、IP VPN及Internet VPN的一个准确定义,并在定义的基础上对IP VPN和Internet VPN提出了一种分类方法,最后给出了IP VPN和Internet VPN的比较及研究结果.

  11. [IPS an ethical paradigm for biomedical research].

    Science.gov (United States)

    Gámez Escalona, José Antonio

    2013-01-01

    One of the greatest advances in molecular and cell biology was the discovery of the Induced Pluripotent Stem cells (iPS) in mice, by Shinya Yamanka and his team in 2006. The possibility that these cells can be generated also in humans opens up unexpected ways of development for biomedicine. Its main contribution is the creation of a strong protocol that takes into account three major advances in biology such as; nuclear transfer techniques, the discovery of transcription factors associated with pluripotency and the isolation of mouse embryonic stem cells. A protocol that can be easily replicated in other laboratories to have the oportunity to design tests that allow modeling of many incurable diseases, drug testing for human cells or explore the possibilities of autologous transplants of tissues or organs. Yamanaka ethical motivation to find an alternative to embryonic stem cells (ES) and prevent the destruction of embryos produced by In Vitro Fertilization techniques (IVF), has proved to be a research model, in which the intuition of the ethical principles and its application in advanced biotechnology projects, has meant the opening of a whole new way of understanding the biology of embryonic development. It is clear that development, biologically understood (puede ser también ″treated″; tratado), is not a one-way street. The possibilities to deepen into the foundations of molecular biology and genetics, along with the expectations of its clinical applications have earned Yamanka the Nobel Prize in Medicine 2012, along with another great scholar Sir John Gurdon, discoverer of nuclear transfer techniques.

  12. Tow-Dimensionally Deployable "SHDF" Truss

    OpenAIRE

    ONODA, Junjiro; WATANABE, Naoyudi; Ichida, Kazuo; HASHIMOTO, Yasuo; NAKADA, Atsushi; Saito, Hisashi; 小野田, 淳次郎

    1988-01-01

    The present paper describes a newly invented two-dimensionally deployable truss structure named SHDF, which has no articulated members. The most significant feature of SHDF truss is the very small number of the mechanisms to be actuated and locked at the deployment. A globally flat functional model actuated by tiny electromagnetic motors was designed and fabricated. The model demonstrated its practicality and virtually synchronized smooth motion in deploy/fold tests. Subsequently, the model w...

  13. Phoenix Metropolitan Model Deployment Initiative Evaluation Report

    OpenAIRE

    Zimmerman, C; Marks, J.; Jenq, J.; Cluett, Chris; DeBlasio, Allan; Lappin, Jane; Rakha, Hesham A.; Wunderlich, K

    2000-01-01

    This report presents the evaluation results of the Phoenix, Arizona Metropolitan Model Deployment Initiative (MMDI). The MMDI was a three-year program of the Intelligent Transportation Systems (ITS) Joint Program Office of the U.S. Department of Transportation. It focused on aggressive deployment of ITS at four sites across the United States, including the metropolitan areas of San Antonio, Seattle, NY/NJ/Connecticut as well as Phoenix. The focus of the deployments was on integration of exist...

  14. Deployable and retractable telescoping tubular structure development

    Science.gov (United States)

    Thomson, M. W.

    1994-01-01

    A new deployable and retractable telescoping boom capable of high deployed stiffness and strength is described. Deployment and retraction functions are controlled by simple, reliable, and fail-safe latches between the tubular segments. The latch and a BI-STEM (Storable Tubular Extendible Member) actuator work together to eliminate the need for the segments to overlap when deployed. This yields an unusually lightweight boom and compact launch configuration. An aluminum space-flight prototype with three joints displays zero structural deadband, low hysteresis, and high damping. The development approach and difficulties are discussed. Test results provide a joint model for sizing flight booms of any diameter and length.

  15. Rigidizing Inflatable Deployable Dwelling (RIDD) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — By combining thin thermoplastic films, woven Vectran reinforcements, and heat a reliable, deployable, rigidizing space habitat can be created. Although much research...

  16. Low Mass Aeroshell Deployment Mechanism Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Cornerstone Research Group Inc. (CRG) will develop new shape memory polymer (SMP) deployment mechanisms for actuating thermal protection system (TPS) panels to...

  17. Low Mass Aeroshell Deployment Mechanism Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Cornerstone Research Group Inc. (CRG) will develop new shape memory polymer (SMP) deployment mechanisms for actuating thermal protective systems (TPS) panels to...

  18. Self-Deploying Gossamer Support Structure Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Phase I results demonstrated the feasibility of using shape memory polymer composites to deploy, tension and support gossamer antennas. Cornerstone Research Group,...

  19. Scientific Cluster Deployment and Recovery - Using puppet to simplify cluster management

    Science.gov (United States)

    Hendrix, Val; Benjamin, Doug; Yao, Yushu

    2012-12-01

    Deployment, maintenance and recovery of a scientific cluster, which has complex, specialized services, can be a time consuming task requiring the assistance of Linux system administrators, network engineers as well as domain experts. Universities and small institutions that have a part-time FTE with limited time for and knowledge of the administration of such clusters can be strained by such maintenance tasks. This current work is the result of an effort to maintain a data analysis cluster (DAC) with minimal effort by a local system administrator. The realized benefit is the scientist, who is the local system administrator, is able to focus on the data analysis instead of the intricacies of managing a cluster. Our work provides a cluster deployment and recovery process (CDRP) based on the puppet configuration engine allowing a part-time FTE to easily deploy and recover entire clusters with minimal effort. Puppet is a configuration management system (CMS) used widely in computing centers for the automatic management of resources. Domain experts use Puppet's declarative language to define reusable modules for service configuration and deployment. Our CDRP has three actors: domain experts, a cluster designer and a cluster manager. The domain experts first write the puppet modules for the cluster services. A cluster designer would then define a cluster. This includes the creation of cluster roles, mapping the services to those roles and determining the relationships between the services. Finally, a cluster manager would acquire the resources (machines, networking), enter the cluster input parameters (hostnames, IP addresses) and automatically generate deployment scripts used by puppet to configure it to act as a designated role. In the event of a machine failure, the originally generated deployment scripts along with puppet can be used to easily reconfigure a new machine. The cluster definition produced in our CDRP is an integral part of automating cluster deployment

  20. Forwarding techniques for IP fragmented packets in a real 6LoWPAN network.

    Science.gov (United States)

    Ludovici, Alessandro; Calveras, Anna; Casademont, Jordi

    2011-01-01

    Wireless Sensor Networks (WSNs) are attracting more and more interest since they offer a low-cost solution to the problem of providing a means to deploy large sensor networks in a number of application domains. We believe that a crucial aspect to facilitate WSN diffusion is to make them interoperable with external IP networks. This can be achieved by using the 6LoWPAN protocol stack. 6LoWPAN enables the transmission of IPv6 packets over WSNs based on the IEEE 802.15.4 standard. IPv6 packet size is considerably larger than that of IEEE 802.15.4 data frame. To overcome this problem, 6LoWPAN introduces an adaptation layer between the network and data link layers, allowing IPv6 packets to be adapted to the lower layer constraints. This adaptation layer provides fragmentation and header compression of IP packets. Furthermore, it also can be involved in routing decisions. Depending on which layer is responsible for routing decisions, 6LoWPAN divides routing in two categories: mesh under if the layer concerned is the adaptation layer and route over if it is the network layer. In this paper we analyze different routing solutions (route over, mesh under and enhanced route over) focusing on how they forward fragments. We evaluate their performance in terms of latency and energy consumption when transmitting IP fragmented packets. All the tests have been performed in a real 6LoWPAN implementation. After consideration of the main problems in forwarding of mesh frames in WSN, we propose and analyze a new alternative scheme based on mesh under, which we call controlled mesh under.

  1. IP3 receptors regulate vascular smooth muscle contractility and hypertension

    Science.gov (United States)

    Lin, Qingsong; Zhao, Guiling; Fang, Xi; Peng, Xiaohong; Tang, Huayuan; Wang, Hong; Jing, Ran; Liu, Jie; Ouyang, Kunfu

    2016-01-01

    Inositol 1, 4, 5-trisphosphate receptor–mediated (IP3R-mediated) calcium (Ca2+) release has been proposed to play an important role in regulating vascular smooth muscle cell (VSMC) contraction for decades. However, whether and how IP3R regulates blood pressure in vivo remains unclear. To address these questions, we have generated a smooth muscle–specific IP3R triple-knockout (smTKO) mouse model using a tamoxifen-inducible system. In this study, the role of IP3R-mediated Ca2+ release in adult VSMCs on aortic vascular contractility and blood pressure was assessed following tamoxifen induction. We demonstrated that deletion of IP3Rs significantly reduced aortic contractile responses to vasoconstrictors, including phenylephrine, U46619, serotonin, and endothelin 1. Deletion of IP3Rs also dramatically reduced the phosphorylation of MLC20 and MYPT1 induced by U46619. Furthermore, although the basal blood pressure of smTKO mice remained similar to that of wild-type controls, the increase in systolic blood pressure upon chronic infusion of angiotensin II was significantly attenuated in smTKO mice. Taken together, our results demonstrate an important role for IP3R-mediated Ca2+ release in VSMCs in regulating vascular contractility and hypertension.

  2. THE CYTOKINE IP-10 IN CHRONIC HBV AND HCV INFECTION

    Directory of Open Access Journals (Sweden)

    Nina S. Nikolova

    2013-08-01

    Full Text Available Introduction: IP-10 it has been studied as a predictor of treatment response in chronic HCV infected patients. The data for the HBV infection are not enough.Aim: To compare IP-10 levels in patients with chronic HBV /CHB/ and HCV infection /CHC/ and their relation to liver disease and treatment response. Material and methods: 20 patients - with CHC genotype 1 infection /on standard bi-therapy/ and 32 patients with CHB /21 pts - NUC; 11 pts - IFN/. Results: The IP-10 did not correlate with sex, age, ALT and liver fibrosis. The basal IP-10 were lower in patients with CHB (p=0,017. There was a difference in IP-10 baseline levels among the HCV patients with or without RVR (p=0,007. A negative correlation was found between basal IP-10 and RVR (r= -0,508; p=0,008. Conclusion: IP-10 could predict virological response in patients with CHC on standard bi-therapy, but not in HBV infected patients on standard therapy.

  3. Reviewing ChIPS, The Chandra Imaging and Plotting System

    Science.gov (United States)

    Miller, J.; Burke, D. J.; Evans, I. N.; Evans, J. D.; McLaughlin, W.

    2015-09-01

    The Chandra Imaging and Plotting System (ChIPS) is a 2D plotting system designed to allow users to easily create, manipulate, and produce publication quality visualizations. ChIPS has a simple but very powerful interactive interface that allows users to dynamically modify the contents and layout of their plots quickly and efficiently, with the results of any changes being immediately visible. ChIPS allows users to construct their plots fully interactively, and then save the final plot commands as a Python script. This bypasses the need to iteratively edit and rerun the script when developing the plot. Features such as undo and redo commands allow users to easily step backwards and forwards through previous commands, while the ability so save ChIPS sessions in a platform-independent state file allows the session to be restored at any time, even on another machine. Because ChIPS offers a Python interface, users can analyze their data using the broad array of modules offered in Python, and visualize the information in ChIPS at the same time. In this paper we explore the design decisions behind the development of ChIPS and some of the lessons learned along the way.

  4. A decentralized software bus based on IP multicas ting

    Science.gov (United States)

    Callahan, John R.; Montgomery, Todd

    1995-01-01

    We describe decentralized reconfigurable implementation of a conference management system based on the low-level Internet Protocol (IP) multicasting protocol. IP multicasting allows low-cost, world-wide, two-way transmission of data between large numbers of conferencing participants through the Multicasting Backbone (MBone). Each conference is structured as a software bus -- a messaging system that provides a run-time interconnection model that acts as a separate agent (i.e., the bus) for routing, queuing, and delivering messages between distributed programs. Unlike the client-server interconnection model, the software bus model provides a level of indirection that enhances the flexibility and reconfigurability of a distributed system. Current software bus implementations like POLYLITH, however, rely on a centralized bus process and point-to-point protocols (i.e., TCP/IP) to route, queue, and deliver messages. We implement a software bus called the MULTIBUS that relies on a separate process only for routing and uses a reliable IP multicasting protocol for delivery of messages. The use of multicasting means that interconnections are independent of IP machine addresses. This approach allows reconfiguration of bus participants during system execution without notifying other participants of new IP addresses. The use of IP multicasting also permits an economy of scale in the number of participants. We describe the MULITIBUS protocol elements and show how our implementation performs better than centralized bus implementations.

  5. MACE: model based analysis of ChIP-exo.

    Science.gov (United States)

    Wang, Liguo; Chen, Junsheng; Wang, Chen; Uusküla-Reimand, Liis; Chen, Kaifu; Medina-Rivera, Alejandra; Young, Edwin J; Zimmermann, Michael T; Yan, Huihuang; Sun, Zhifu; Zhang, Yuji; Wu, Stephen T; Huang, Haojie; Wilson, Michael D; Kocher, Jean-Pierre A; Li, Wei

    2014-11-10

    Understanding the role of a given transcription factor (TF) in regulating gene expression requires precise mapping of its binding sites in the genome. Chromatin immunoprecipitation-exo, an emerging technique using λ exonuclease to digest TF unbound DNA after ChIP, is designed to reveal transcription factor binding site (TFBS) boundaries with near-single nucleotide resolution. Although ChIP-exo promises deeper insights into transcription regulation, no dedicated bioinformatics tool exists to leverage its advantages. Most ChIP-seq and ChIP-chip analytic methods are not tailored for ChIP-exo, and thus cannot take full advantage of high-resolution ChIP-exo data. Here we describe a novel analysis framework, termed MACE (model-based analysis of ChIP-exo) dedicated to ChIP-exo data analysis. The MACE workflow consists of four steps: (i) sequencing data normalization and bias correction; (ii) signal consolidation and noise reduction; (iii) single-nucleotide resolution border peak detection using the Chebyshev Inequality and (iv) border matching using the Gale-Shapley stable matching algorithm. When applied to published human CTCF, yeast Reb1 and our own mouse ONECUT1/HNF6 ChIP-exo data, MACE is able to define TFBSs with high sensitivity, specificity and spatial resolution, as evidenced by multiple criteria including motif enrichment, sequence conservation, direct sequence pileup, nucleosome positioning and open chromatin states. In addition, we show that the fundamental advance of MACE is the identification of two boundaries of a TFBS with high resolution, whereas other methods only report a single location of the same event. The two boundaries help elucidate the in vivo binding structure of a given TF, e.g. whether the TF may bind as dimers or in a complex with other co-factors. © The Author(s) 2014. Published by Oxford University Press on behalf of Nucleic Acids Research.

  6. MEME-ChIP: motif analysis of large DNA datasets.

    Science.gov (United States)

    Machanick, Philip; Bailey, Timothy L

    2011-06-15

    Advances in high-throughput sequencing have resulted in rapid growth in large, high-quality datasets including those arising from transcription factor (TF) ChIP-seq experiments. While there are many existing tools for discovering TF binding site motifs in such datasets, most web-based tools cannot directly process such large datasets. The MEME-ChIP web service is designed to analyze ChIP-seq 'peak regions'--short genomic regions surrounding declared ChIP-seq 'peaks'. Given a set of genomic regions, it performs (i) ab initio motif discovery, (ii) motif enrichment analysis, (iii) motif visualization, (iv) binding affinity analysis and (v) motif identification. It runs two complementary motif discovery algorithms on the input data--MEME and DREME--and uses the motifs they discover in subsequent visualization, binding affinity and identification steps. MEME-ChIP also performs motif enrichment analysis using the AME algorithm, which can detect very low levels of enrichment of binding sites for TFs with known DNA-binding motifs. Importantly, unlike with the MEME web service, there is no restriction on the size or number of uploaded sequences, allowing very large ChIP-seq datasets to be analyzed. The analyses performed by MEME-ChIP provide the user with a varied view of the binding and regulatory activity of the ChIP-ed TF, as well as the possible involvement of other DNA-binding TFs. MEME-ChIP is available as part of the MEME Suite at http://meme.nbcr.net.

  7. IP ADDRESS AUTOCONFIGURATION FOR WIRELESS AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    阿姆贾德

    2002-01-01

    A novel mechanism was specified by which a node in ad hoc network may autoconfigure an IP address which is unique throughout the mobile ad hoc network. This new algorithm imposes less and constant overhead and delay in obtaining an IP address, and fully utilizes the available addresses space of an ad hoc network, and independent of the existing routing protocol, and less prone to security threats. Moreover, a new Join/Leave mechanism was proposed as an enhancement to the new IP address autoconfiguration algorithm, to support the overall operation of the existing routing protocol of wireless ad hoc networks.

  8. UTN VoIP test bed (Voice over Internet Protocol)

    OpenAIRE

    Clérigo, Patricia; Mercado, Gustavo; Lima, Armando; Gosetto, Gerardo

    2009-01-01

    La tecnología Voice over IP permite transmitir paquetes de voz usando los protocolos de Internet. Esto es el basamento de la convergencia de video, voz y datos en una sola red y bajo el mismo protocolo; metodología que promete confiabilidad, accesibilidad y por sobre todo bajos costos. La UTN VoIP es un servicio de Telefonía que usa los protocolos VoIP de Internet y es montado sobre la Red Universitaria Tecnológica II. Cuando esté implementada conectará todas las Facultades Regionales y la Un...

  9. Concurrent engineering: effective deployment strategies

    Directory of Open Access Journals (Sweden)

    Unny Menon

    1996-12-01

    Full Text Available This paper provides a comprehensive insight into current trends and developments in Concurrent Engineering for integrated development of products and processes with the goal of completing the entire cycle in a shorter time, at lower overall cost and with fewer engineering design changes after product release. The evolution and definition of Concurrent Engineering are addressed first, followed by a concise review of the following elements of the concurrent engineering approach to product development: Concept Development: The Front-End Process, identifying Customer Needs and Quality Function Deployment, Establishing Product Specifications, Concept Selection, Product Architecture, Design for Manufacturing, Effective Rapid Prototyping, and The Economics of Product Development. An outline of a computer-based tutorial developed by the authors and other graduate students funded by NASA ( accessible via the world-wide-web . is provided in this paper. A brief discussion of teamwork for successful concurrent engineering is included, t'ase histories of concurrent engineering implementation at North American and European companies are outlined with references to textbooks authored by Professor Menon and other writers. A comprehensive bibliography on concurrent engineering is included in the paper.

  10. Deployment of Directory Service for IEEE N Bus Test System Information

    Science.gov (United States)

    Barman, Amal; Sil, Jaya

    2008-10-01

    Exchanging information over Internet and Intranet becomes a defacto standard in computer applications, among various users and organizations. Distributed system study, e-governance etc require transparent information exchange between applications, constituencies, manufacturers, and vendors. To serve these purposes database system is needed for storing system data and other relevant information. Directory service, which is a specialized database along with access protocol, could be the single solution since it runs over TCP/IP, supported by all POSIX compliance platforms and is based on open standard. This paper describes a way to deploy directory service, to store IEEE n bus test system data and integrating load flow program with it.

  11. PEMBELAJARAN IPS DALAM REALITA DI ERA KTSP: STUDI EKSPLORASI PELAKSANAAN PEMBELAJARAN IPS PADA JENJANG SMP DI KABUPATEN PATI

    Directory of Open Access Journals (Sweden)

    Edi Sutrisna

    2011-10-01

    Full Text Available Application of KTSP as a curriculum based on competency requires the implementation of strategies and methods that can deliver a number of learners achieving a particular competence. IPS as a subject who has a noble purpose, namely to prepare students to be good citizens, should be taught to students through appropriate strategies and methods by utilizing various media sources and learning. Most social studies teachers still promote the use of expository strategies in presenting lessons of Social Science education and the use of resources and learning media are minimal. Environment, as a laboratory of IPS is not utilized properly.The study shows that most teachers still tend to use expository teaching strategies, use of resources and learning media that are less varied, and integrated approaches to teaching social studies can not be realized by the teachers due to various constraints.   Keywords: learning, IPS, junior school, KTSP   Penerapan KTSP sebagai kurikulum berbasis kompetensi membutuhkan penerapan strategi dan metode yang dapat memberikan sejumlah peserta didik mencapai kompetensi tertentu. IPS sebagai subjek yang memiliki tujuan mulia, yaitu untuk mempersiapkan siswa untuk menjadi warga negara yang baik, harus diajarkan kepada siswa melalui strategi yang tepat dan metode dengan memanfaatkan berbagai sumber media dan pembelajaran. Kebanyakan guru IPS masih menggunakan strategi ekspositori dalam menyajikan meteri pelajaran IPS dengan menggunakan sumber daya dan media pembelajaran yang minimal. Lingkungan sekitar, sebagai laboratorium IPS tidak digunakan menunjukkan pembelajaran yang baik. Kebanyakan guru masih cenderung untuk menggunakan strategi pengajaran ekspositori, penggunaan sumber daya dan media pembelajaran yang kurang bervariasi, dan pendekatan terpadu untuk mengajar IPS, sehingga tidak dapat direalisasikan oleh para guru karena berbagai kendala.   Kata kunci: pembelajaran, IPS, SMP, KTSP  

  12. The purely functional software deployment model

    NARCIS (Netherlands)

    Dolstra, E.

    2006-01-01

    Software deployment is the set of activities related to getting software components to work on the machines of end users. It includes activities such as installation, upgrading, uninstallation, and so on. Many tools have been developed to support deployment, but they all have serious limitations wi

  13. Self-deploying photovoltaic power system

    Science.gov (United States)

    Colozza, Anthony J. (Inventor)

    1993-01-01

    A lightweight flexible photovoltaic (PV) blanket is attached to a support structure of initially stowed telescoping members. The deployment mechanism comprises a series of extendable and rotatable columns. As these columns are extended the PV blanket is deployed to its proper configuration.

  14. Experimental thermal mechanics of deployable boom structures

    Science.gov (United States)

    Predmore, R.

    1972-01-01

    An apparatus was developed for thermal distortion measurements on deployable boom structures. The calibration procedure and thermal static bending plus twist measurements are considered. The thermal mechanics test facility is described. A table is presented for several examples of spacecraft applications of thermal static distortion measurements on 3-m deployable booms.

  15. Seismic SMHD -- Rotational Sensor Development and Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Laughlin, Darren [Applied Technology Associates; Pierson, Bob [Applied Technology Associates; Brune, Bob [Consultant

    2016-06-20

    The U.S. Department of Energy (DOE) and Applied Technology Associates (ATA) are funding development and deployment of a new generation of rotational sensors for validation of rotational seismic applications. The sensors employ Magnetohydrodynamic (MHD) principles with broadband response, high dynamic range, low noise floor, proven ruggedness, and high repeatability. This paper presents current status of sensor development and deployment opportunities.

  16. Enforcing Security Mechanisms in the IP-Based Internet of Things: An Algorithmic Overview

    Directory of Open Access Journals (Sweden)

    Luca Veltri

    2013-04-01

    Full Text Available The Internet of Things (IoT refers to the Internet-like structure of billions of interconnected constrained devices, denoted as “smart objects”. Smart objects have limited capabilities, in terms of computational power and memory, and might be battery-powered devices, thus raising the need to adopt particularly energy efficient technologies. Among the most notable challenges that building interconnected smart objects brings about, there are standardization and interoperability. The use of IP has been foreseen as the standard for interoperability for smart objects. As billions of smart objects are expected to come to life and IPv4 addresses have eventually reached depletion, IPv6 has been identified as a candidate for smart-object communication. The deployment of the IoT raises many security issues coming from (i the very nature of smart objects, e.g., the adoption of lightweight cryptographic algorithms, in terms of processing and memory requirements; and (ii the use of standard protocols, e.g., the need to minimize the amount of data exchanged between nodes. This paper provides a detailed overview of the security challenges related to the deployment of smart objects. Security protocols at network, transport, and application layers are discussed, together with lightweight cryptographic algorithms proposed to be used instead of conventional and demanding ones, in terms of computational resources. Security aspects, such as key distribution and security bootstrapping, and application scenarios, such as secure data aggregation and service authorization, are also discussed.

  17. Efficient Integration of Pipelined IP Blocks into Automatically Compiled Datapaths

    Directory of Open Access Journals (Sweden)

    Andreas Koch

    2006-12-01

    Full Text Available Compilers for reconfigurable computers aim to generate problem-specific optimized datapaths for kernels extracted from an input language. In many cases, however, judicious use of preexisting manually optimized IP blocks within these datapaths could improve the compute performance even further. The integration of IP blocks into the compiled datapaths poses a different set of problems than stitching together IPs to form a system-on-chip; though, instead of the loose coupling using standard busses employed by SoCs, the one between datapath and IP block must be much tighter. To this end, we propose a concise language that can be efficiently synthesized using a template-based approach for automatically generating lightweight data and control interfaces at the datapath level.

  18. Efficient Integration of Pipelined IP Blocks into Automatically Compiled Datapaths

    Directory of Open Access Journals (Sweden)

    Koch Andreas

    2007-01-01

    Full Text Available Compilers for reconfigurable computers aim to generate problem-specific optimized datapaths for kernels extracted from an input language. In many cases, however, judicious use of preexisting manually optimized IP blocks within these datapaths could improve the compute performance even further. The integration of IP blocks into the compiled datapaths poses a different set of problems than stitching together IPs to form a system-on-chip; though, instead of the loose coupling using standard busses employed by SoCs, the one between datapath and IP block must be much tighter. To this end, we propose a concise language that can be efficiently synthesized using a template-based approach for automatically generating lightweight data and control interfaces at the datapath level.

  19. HST/FOS Eclipse mapping of IP Pegasi in outburst

    CERN Document Server

    Saitô, R; Horne, K

    2004-01-01

    We report the results of a time-resolved eclipse mapping of the dwarf nova IP Pegasi during the decline of its May 1993 outburst from HST/FOS fast spectroscopy covering 3 eclipses in the ultraviolet spectral range.

  20. Users speak out on technology deployment

    Energy Technology Data Exchange (ETDEWEB)

    Peters, Mark; Prochaska, Marty; Cromer, Paul; Zewatsky, Jennifer

    2001-02-25

    This report summarizes user feedback data collected during a recent Accelerated Site Technology Deployment (ASTD) project: the Fluor Fernald ASTD Technology Deployment Project from May, 1999 through September, 2000. The main goal of the ASTD project was to use the ''Fernald approach'' to expedite the deployment of new or innovative technologies with superior safety, cost, and/or productivity benefits to Department of Energy (DOE) facilities. The Fernald approach targets technology end-users and their managers and directly involves them with hands-on demonstrations of new or innovative technologies during technology transfer sessions. The two technologies deployed through this project were the Personal Ice Cooling System (PICS) and the oxy-gasoline torch. Participants of technology transfer sessions were requested to complete feedback surveys. Surveys evaluated the effectiveness of the Fernald approach to technology deployment and assessed the responsiveness of employees to new technologies. This report presents the results of those surveys.

  1. A Survey of IPv6 Deployment

    Directory of Open Access Journals (Sweden)

    Manal M. Alhassoun

    2016-09-01

    Full Text Available The next-generation Internet protocol (IPv6 was designed to overcome the limitation in IPv4 by using a 128-bit address instead of a 32-bit address. In addition to solving the address the limitations, IPv6 has many improved features. This research focused to survey IPv6 deployment all around the world. The objectives of this survey paper are to highlight the issues related to the IPv6 deployment and to look into the IPv4 to IPv6 transition mechanisms. Furthermore, provide insight on the global effort around the world to contribute in IPv6 deployment. In addition, identify the potential solutions or suggestions that could improve the IPv6 deployment rate. In order to achieve the said objectives we survey number of papers on IPv6 deployment from different countries and continents.

  2. Renewable Energy: Policy Considerations for Deploying Renewables

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    This information paper accompanies the IEA publication Deploying Renewables 2011: Best and Future Policy Practice (IEA, 2011a). It provides more detailed data and analysis on policies for Deploying Renewables, and is intended to complement the main publication. It provides an account of the strategic drivers underpinning renewable energy (RE) technology deployment (energy security, economic development and environment protection) and assesses RE technologies with respect to these drivers, including an estimate of GHG emissions reductions due to RE technologies. The paper also explores the different barriers to deploying renewables at a given stage of market maturity and discusses what tools policy makers can avail of to succeed in removing deployment barriers. An additional topical highlight explores the challenges associated with accelerating the diffusion of RE technologies in developing countries.

  3. Implementación de una plataforma IMS con herramientas open source

    OpenAIRE

    Garrido Lorenzo, Margarita

    2016-01-01

    Implementación de una plataforma IMS (IP Multimedia Subsystem) con herramientas open source. Esto incluye herramientas de virtualización y estudio de los protocolos involucrados (SIP, SDP, RTP, Diameter). Historically, telephony and other voice services have been provided through circuit-switched networks. However, the implementation, deployment and evolution of services in these kind of networks, both fixed and mobile, is a tedious work while these same operations become more agile, flexi...

  4. Novel Node Structures for IP over WDM Networks

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    IP over WDM is being envisioned as one of the most attractive architectures for the next generation Internet. This paper introduces two novel backbone node structures for IP over WDM networks. These node structures can be used as improvement approaches to DPDP (default path and dedicated path) method. The flow classifiers, which are the main components of these node structures, and the performance metrics of these structures, are also discussed.

  5. IPS Classic. Science, art and nature: a case report.

    Science.gov (United States)

    Culp, L; Roach, R R

    1995-01-01

    The ceramo-metal restoration still forms the backbone of modern restorative dentistry, despite many new systems. This article discusses a unique ceramo-metal system, its advantages, and clinical and technical applications; teamwork between the dentist and the technician is emphasized. IPS Classic (Ivoclar Williams) is a ceramic system with several exclusive features. It encompasses Color Visions, a computer-generated shade system, and the IPS Impulse modifier system allows the ceramist unlimited creativity in color development.

  6. Towards Multi-Stage Intrusion Detection using IP Flow Records

    OpenAIRE

    Muhammad Fahad Umer; Muhammad Sher; Imran Khan

    2016-01-01

    Traditional network-based intrusion detection sys-tems using deep packet inspection are not feasible for modern high-speed networks due to slow processing and inability to read encrypted packet content. As an alternative to packet-based intrusion detection, researchers have focused on flow-based intrusion detection techniques. Flow-based intrusion detection systems analyze IP flow records for attack detection. IP flow records contain summarized traffic information. However, flow data is very ...

  7. Identifying IP Blocks with Spamming Bots by Spatial Distribution

    Science.gov (United States)

    Yun, Sangki; Kim, Byungseung; Bahk, Saewoong; Kim, Hyogon

    In this letter, we develop a behavioral metric with which spamming botnets can be quickly identified with respect to their residing IP blocks. Our method aims at line-speed operation without deep inspection, so only TCP/IP header fields of the passing packets are examined. However, the proposed metric yields a high-quality receiver operating characteristics (ROC), with high detection rates and low false positive rates.

  8. TCP-IP Model in Data Communication and Networking

    OpenAIRE

    Pranab Bandhu Nath; Md.Mofiz Uddin

    2015-01-01

    The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP/IP, because it’s most important protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP), were the first networking protocols defined in this standard. Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking mode...

  9. Survivable IP/MPLS-Over-WSON Multilayer Network Optimization

    OpenAIRE

    Ruiz M.; Pedrola O.; Velasco L.; Careglio D.; Fernandez-Palacios J.; Junyent G.

    2011-01-01

    Network operators are facing the problem of dimensioning their networks for the expected huge IP traffic volumes while keeping constant or even reducing the connectivity prices. Therefore, new architectural solutions able to cope with the expected traffic increase in a more cost-effective way are needed. In this work, we study the survivable IP/multi-protocol label switching (MPLS) over wavelength switched optical network (WSON) multilayer network problem as a capital expenditure (CAPEX...

  10. [Application for Lifestyle disease by iPS cells technologies].

    Science.gov (United States)

    Takashima, Yasuhiro

    2016-03-01

    Currently it is less advanced to understand the pathology of lifestyle disease by using iPS cells because there is partly less direct connection between life style disease and iPS cells. So much more scientists focus on regenerative medicine such as beta cells therapy using iPS cells technologies. It will be indeed a powerful tool to generate beta cells from iPS cells as even in type2 diabetes patients, hyposecretion of insulin from beta cells in pancreas is one of causes. Another reason is complexity of the pathology of life style disease. There are a lot of reasons to cause lifestyle disease. Lifestyle diseases include cancer, chronic liver disease, Type 2 diabetes, heart disease, metabolic syndrome, chronic renal failure, stroke, and obesity. Since obesity is one of major causes of lifestyle diseases, we want to focus on adipogenesis from iPS cells in this review. We analysed and established the differentiation protocol into adipocytes from mouse ES cells and human iPS cells. The other point in this review is the starting pluripotent cells for differentiation. Quality of pluripotent stem cells are one of most critical factors to succeed in getting well-differentiated cells. Recently, we have developed new naive human pluripotent stem cells (PSC),"Reset cells". Naive PSC have more similar to human epibast cells than conventional human PSC. They will be more ideal cells for differentiation because of their hypomethylated status and earlier stage of development.

  11. CATCHprofiles: clustering and alignment tool for ChIP profiles.

    Directory of Open Access Journals (Sweden)

    Fiona G G Nielsen

    Full Text Available Chromatin Immuno Precipitation (ChIP profiling detects in vivo protein-DNA binding, and has revealed a large combinatorial complexity in the binding of chromatin associated proteins and their post-translational modifications. To fully explore the spatial and combinatorial patterns in ChIP-profiling data and detect potentially meaningful patterns, the areas of enrichment must be aligned and clustered, which is an algorithmically and computationally challenging task. We have developed CATCHprofiles, a novel tool for exhaustive pattern detection in ChIP profiling data. CATCHprofiles is built upon a computationally efficient implementation for the exhaustive alignment and hierarchical clustering of ChIP profiling data. The tool features a graphical interface for examination and browsing of the clustering results. CATCHprofiles requires no prior knowledge about functional sites, detects known binding patterns "ab initio", and enables the detection of new patterns from ChIP data at a high resolution, exemplified by the detection of asymmetric histone and histone modification patterns around H2A.Z-enriched sites. CATCHprofiles' capability for exhaustive analysis combined with its ease-of-use makes it an invaluable tool for explorative research based on ChIP profiling data. CATCHprofiles and the CATCH algorithm run on all platforms and is available for free through the CATCH website: http://catch.cmbi.ru.nl/. User support is available by subscribing to the mailing list catch-users@bioinformatics.org.

  12. CATCHprofiles: Clustering and Alignment Tool for ChIP Profiles

    DEFF Research Database (Denmark)

    G. G. Nielsen, Fiona; Galschiøt Markus, Kasper; Møllegaard Friborg, Rune

    2012-01-01

    Chromatin Immuno Precipitation (ChIP) profiling detects in vivo protein-DNA binding, and has revealed a large combinatorial complexity in the binding of chromatin associated proteins and their post-translational modifications. To fully explore the spatial and combinatorial patterns in ChIP-profil......Chromatin Immuno Precipitation (ChIP) profiling detects in vivo protein-DNA binding, and has revealed a large combinatorial complexity in the binding of chromatin associated proteins and their post-translational modifications. To fully explore the spatial and combinatorial patterns in Ch......IP-profiling data and detect potentially meaningful patterns, the areas of enrichment must be aligned and clustered, which is an algorithmically and computationally challenging task. We have developed CATCHprofiles, a novel tool for exhaustive pattern detection in ChIP profiling data. CATCHprofiles is built upon...... a computationally efficient implementation for the exhaustive alignment and hierarchical clustering of ChIP profiling data. The tool features a graphical interface for examination and browsing of the clustering results. CATCHprofiles requires no prior knowledge about functional sites, detects known binding patterns...

  13. A Distributed IP-Based Telecommunication System using SIP

    Directory of Open Access Journals (Sweden)

    Carlton Andre Thompson

    2013-11-01

    Full Text Available Voice over Internet Protocol (VoIP technologies are integral to modern telecommunications because oftheir advanced features, flexibility, and economicbenefits. Internet Service Providers initially promotedthese technologies by providing low cost local andinternational calling. At present, there is also agreatdeal of interest in using IP-based technologies toreplace traditional small and large office telephonesystems that use traditional PBX’s (Private BrancheXchange. Unfortunately, the large majority of theemerging VoIP based office telephone systems have followed the centralized design of traditional publicand private telephone systems in which all the intelligence in the system is at the core, with quite expensivehardware and software components and appropriate redundancy for adequate levels of reliability. In thispaper, it is argued that a centralized model for anIP-based telecommunications system fails to exploit thefull capabilities of Internet-inspired communications and that, very simple, inexpensive, elegant andflexible solutions are possible by deliberately avoiding the centralized approach. This paper describes thedesign, philosophy and implementation of a prototype for a fully distributed IP-based TelecommunicationSystem (IPTS that provides the essential feature set for office and home telecommunications, including IP-based long-distance and local calling, and with thesupport for video as well as data and text. Theprototype system was implemented with an Internet-inspired distributed design using open source software,with appropriate customizations and configurations.

  14. Inositol hexakisphosphate (IP6) generated by IP5K mediates cullin-COP9 signalosome interactions and CRL function

    National Research Council Canada - National Science Library

    Paul C. Scherer; Yan Ding; Zhiqing Liu; Jing Xu; Haibin Mao; James C. Barrow; Ning Wei; Ning Zheng; Solomon H. Snyder; Feng Rao

    2016-01-01

    .... We now report that inositol hexakisphosphate (IP6) is a major physiologic determinant of the CRL-CSN interface, which includes a hitherto unidentified electrostatic interaction between the N-terminal acidic tail of CSN subunit 2 (CSN2...

  15. ChIPpeakAnno: a Bioconductor package to annotate ChIP-seq and ChIP-chip data

    Directory of Open Access Journals (Sweden)

    Pagès Hervé

    2010-05-01

    Full Text Available Abstract Background Chromatin immunoprecipitation (ChIP followed by high-throughput sequencing (ChIP-seq or ChIP followed by genome tiling array analysis (ChIP-chip have become standard technologies for genome-wide identification of DNA-binding protein target sites. A number of algorithms have been developed in parallel that allow identification of binding sites from ChIP-seq or ChIP-chip datasets and subsequent visualization in the University of California Santa Cruz (UCSC Genome Browser as custom annotation tracks. However, summarizing these tracks can be a daunting task, particularly if there are a large number of binding sites or the binding sites are distributed widely across the genome. Results We have developed ChIPpeakAnno as a Bioconductor package within the statistical programming environment R to facilitate batch annotation of enriched peaks identified from ChIP-seq, ChIP-chip, cap analysis of gene expression (CAGE or any experiments resulting in a large number of enriched genomic regions. The binding sites annotated with ChIPpeakAnno can be viewed easily as a table, a pie chart or plotted in histogram form, i.e., the distribution of distances to the nearest genes for each set of peaks. In addition, we have implemented functionalities for determining the significance of overlap between replicates or binding sites among transcription factors within a complex, and for drawing Venn diagrams to visualize the extent of the overlap between replicates. Furthermore, the package includes functionalities to retrieve sequences flanking putative binding sites for PCR amplification, cloning, or motif discovery, and to identify Gene Ontology (GO terms associated with adjacent genes. Conclusions ChIPpeakAnno enables batch annotation of the binding sites identified from ChIP-seq, ChIP-chip, CAGE or any technology that results in a large number of enriched genomic regions within the statistical programming environment R. Allowing users to pass their

  16. Numerical simulation of deepwater deployment for offshore structures with deploying cables

    Institute of Scientific and Technical Information of China (English)

    胡小舟; 刘少军

    2015-01-01

    Deepwater deployment of offshore structures in different sea states was investigated. The whole deployment system was modeled as a lumped mass model, and discretization scheme for cable geometry and methodology for calculating the internal and external force acting on deploying cable were presented. The deployment model suitable for the time-varying length of deploying cable was specified. The free-surface flow fields together with the ship motions were used to calculate dynamic tension in the deploying cable during deployment of the structure. The deployment of deep sea mining system which was a typical subsea working system was employed. Based on lumped mass analysis model and parameters of deep sea mining system, numerical simulations were performed, and dynamic load and dynamic amplification factor (DAF) with different cable parameters, deploying velocities and sea states were obtained. It is shown that cable parameters and amplitudes of ocean waves can significantly influence the dynamic load and DAF, and the time-varying natural period of deploying system is a dominant factor, while the effect of deploying velocity is not obvious.

  17. Overview of Deployed EDS Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Martz, H E; Crawford, C

    2009-09-24

    The term explosive detection system (EDS) is used by the TSA to describe equipment that is certified to detect explosives in checked bags. The EDS, as certified, by the TSL must consist of device for interrogating a bag and an automated detection algorithm (ATD) for evaluating the results of the interrogation. We only consider CT as the interrogation device in this report. A schematic drawing of a CT-based EDS is shown in Figure 2. The output of the ATD is the binary decision of alarm or non-alarm. Alarms may true- or false-positives. Non-alarms may be true- or false-negatives. False positives are also denoted false alarms. The true detection means that the ATD reports an alarm when a threat is present in the scanned bag. The probability of detecting a threat given that a threat is present is denoted the probability of detection (PD). The probability of false alarm (PFA) is the case when an alarm is reported when a threat is not present in a bag. Certification in this context means passing tests for PD and PFA at the TSL. The results of the EDS include CT cross-sectional images of the bag and specifics about the alarmed objects generated by ATD. These results are presented on a display so that a person may override the decision of ATD and declare the alarm to be a non-alarm. This process is denoted clearing. Bags that are not cleared by the person are sent to a secondary inspection process. Here the bags may be opened or assessed with explosive trace detection (ETD) in order to clear the bags. Bags that are not cleared at this point are evaluated by an ordinance disposal team. The CT scanner along with ATD is denoted Level 1 screening. The process of clearing on a display is denoted Level 2 screening. Secondary inspection is denoted Level 3 screening. Vendors of the deployed EDSs supply the TSA with equipment for all three levels. Therefore, the term EDS may include the equipment provided for Levels 1, 2 and 3. A schematic diagram of an EDS and the levels of

  18. Deployable M-braced truss structure

    Science.gov (United States)

    Mikulas, M. M., Jr. (Inventor); Rhodes, M. D. (Inventor)

    1986-01-01

    A deployable M-braced truss structure, efficiently packaged into a compact stowed position and expandable to an operative position at the use site is described. The M-braced configuration effectively separates tension compression and shear in the structure and permits efficient structural design. Both diagonals and longerons telescope from an M-braced base unit and deploy either pneumatically, mechanically by springs or cables, or by powered reciprocating mechanisms. Upon full deployment, the diagonals and longerons lock into place with a simple latch mechanism.

  19. Enabling 4GBB via the last copper drop of a hybrid FttH deployment

    NARCIS (Netherlands)

    Brink, R.F.M. van den

    2011-01-01

    Recent developments are paving the way for Telcos to offer hundreds of Mb/s to end users in a cost effective manner. These developments are to bridge the last 20-200 m of Fiber to the Home solutions via existing telephony wiring. This so called Hybrid FttH solution is considered to become an importa

  20. RadNet Air Quality (Deployable) Data

    Data.gov (United States)

    U.S. Environmental Protection Agency — RadNet Deployable Monitoring is designed to collect radiological and meteorological information and data asset needed to establish the impact of radiation levels on...

  1. Field guide to quick deployment thermocouples

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Instructions for quick deployment of thermocouples to measure fire intensity at Kulm Wetland Management District as part of the Fire Intensity Monitoring survey....

  2. Embedding Quality Function Deployment In Software Development ...

    African Journals Online (AJOL)

    2013-03-01

    Mar 1, 2013 ... product development: Marketing, Design. Engineering,. Quality ... The basic Quality Function Deployment methodology involves ... structure and planning approach, requires that more time be ..... process, and strategy. This is ...

  3. High Efficiency, Deployable Solar Cells Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Ultrathin, lightweight, flexible, and easily deployable solar cell (SC) capable of specific power greater than 1kW/kg are at an early stage of development for...

  4. Self-Deploying, Composite Habitats Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Cornerstone Research Group, Inc. (CRG), proposes to develop self-deploying, composite structures for lunar habitats, based on CRG's VeritexTM materials. These...

  5. Self-Deploying, Composite Habitats Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Cornerstone Research Group, Inc. (CRG), proposes to develop self-deploying, composite structures for lunar habitats, based on CRG's Veritex(TM) materials. These...

  6. Surface Optimization Techniques for Deployable Reflectors Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Under this and several other programs, CTD has developed TEMBOREG deployable solid-surface reflectors (TEMBOREG Reflectors) to provide future NASA and Air Force...

  7. Office of Civilian Response Deployment Tracking System

    Data.gov (United States)

    US Agency for International Development — The purpose of OCR DTS is to establish, manage and track relevant Civilian Response Corps teams for deployment by sector experience, training, education etc.

  8. Deployable structures for a human lunar base

    Science.gov (United States)

    Gruber, Petra; Häuplik, Sandra; Imhof, Barbara; Özdemir, Kürsad; Waclavicek, Rene; Perino, Maria Antoinetta

    2007-06-01

    The study Lunar exploration architecture—deployable structures for a lunar base was performed within the Alcatel Alenia Space “Lunar Exploration Architecture” study for the European Space Agency. The purpose of the study was to investigate bionic concepts applicable to deployable structures and to interpret the findings for possible implementation concepts. The study aimed at finding innovative solutions for deployment possibilities. Translating folding/unfolding principles from nature, candidate geometries were developed and researched using models, drawings and visualisations. The use of materials, joints between structural elements and construction details were investigated for these conceptual approaches. Reference scenarios were used to identify the technical and environmental conditions, which served as design drivers. Mechanical issues and the investigation of deployment processes narrowed the selection down to six chosen concepts. Their applicability was evaluated at a conceptual stage in relation to the timescale of the mission.

  9. DBAS: A Deployable Bandwidth Aggregation System

    CERN Document Server

    Habak, Karim; Harras, Khaled A

    2012-01-01

    The explosive increase in data demand coupled with the rapid deployment of various wireless access technologies have led to the increase of number of multi-homed or multi-interface enabled devices. Fully exploiting these interfaces has motivated researchers to propose numerous solutions that aggregate their available bandwidths to increase overall throughput and satisfy the end-user's growing data demand. These solutions, however, have faced a steep deployment barrier that we attempt to overcome in this paper. We propose a Deployable Bandwidth Aggregation System (DBAS) for multi-interface enabled devices. Our system does not introduce any intermediate hardware, modify current operating systems, modify socket implementations, nor require changes to current applications or legacy servers. The DBAS architecture is designed to automatically estimate the characteristics of applications and dynamically schedule various connections or packets to different interfaces. Since our main focus is deployability, we fully i...

  10. Extreme Environment Sampling System Deployment Mechanism Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Future Venus or Comet mission architectures may feature robotic sampling systems comprised of a Sampling Tool and Deployment Mechanism. Since 2005, Honeybee has been...

  11. Demonstration and Deployment Strategy Workshop: Summary

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2014-05-01

    This report is based on the proceedings of the U.S. Department of Energy Bioenergy Technologies Office Demonstration and Deployment Strategy Workshop, held on March 12–13, 2014, at Argonne National Laboratory.

  12. Proposal of Secure VoIP System Using Attribute Certificate

    Science.gov (United States)

    Kim, Jin-Mook; Jeong, Young-Ae; Hong, Seong-Sik

    VoIP is a service that changes the analogue audio signal into a digital signal and then transfers the audio information to the users after configuring it as a packet; and it has an advantage of lower price than the existing voice call service and better extensibility. However, VoIP service has a system structure that, compared to the existing PSTN (Public Switched Telephone Network), has poor call quality and is vulnerable in the security aspect. To make up these problems, TLS service was introduced to enhance the security. In practical system, however, since QoS problem occurs, it is necessary to develop the VoIP security system that can satisfy QoS at the same time in the security aspect. In this paper, a user authentication VoIP system that can provide a service according to the security and the user through providing a differential service according to the approach of the users by adding AA server at the step of configuring the existing VoIP session is suggested. It was found that the proposed system of this study provides a quicker QoS than the TLS-added system at a similar level of security. Also, it is able to provide a variety of additional services by the different users.

  13. Modeling ChIP sequencing in silico with applications.

    Directory of Open Access Journals (Sweden)

    Zhengdong D Zhang

    Full Text Available ChIP sequencing (ChIP-seq is a new method for genomewide mapping of protein binding sites on DNA. It has generated much excitement in functional genomics. To score data and determine adequate sequencing depth, both the genomic background and the binding sites must be properly modeled. To develop a computational foundation to tackle these issues, we first performed a study to characterize the observed statistical nature of this new type of high-throughput data. By linking sequence tags into clusters, we show that there are two components to the distribution of tag counts observed in a number of recent experiments: an initial power-law distribution and a subsequent long right tail. Then we develop in silico ChIP-seq, a computational method to simulate the experimental outcome by placing tags onto the genome according to particular assumed distributions for the actual binding sites and for the background genomic sequence. In contrast to current assumptions, our results show that both the background and the binding sites need to have a markedly nonuniform distribution in order to correctly model the observed ChIP-seq data, with, for instance, the background tag counts modeled by a gamma distribution. On the basis of these results, we extend an existing scoring approach by using a more realistic genomic-background model. This enables us to identify transcription-factor binding sites in ChIP-seq data in a statistically rigorous fashion.

  14. Towards Multi-Stage Intrusion Detection using IP Flow Records

    Directory of Open Access Journals (Sweden)

    Muhammad Fahad Umer

    2016-10-01

    Full Text Available Traditional network-based intrusion detection sys-tems using deep packet inspection are not feasible for modern high-speed networks due to slow processing and inability to read encrypted packet content. As an alternative to packet-based intrusion detection, researchers have focused on flow-based intrusion detection techniques. Flow-based intrusion detection systems analyze IP flow records for attack detection. IP flow records contain summarized traffic information. However, flow data is very large in high-speed networks and cannot be processed in real-time by the intrusion detection system. In this paper, an efficient multi-stage model for intrusion detection using IP flows records is proposed. The first stage in the model classifies the traffic as normal or malicious. The malicious flows are further analyzed by a second stage. The second stage associates an attack type with malicious IP flows. The proposed multi-stage model is efficient because the majority of IP flows are discarded in the first stage and only malicious flows are examined in detail. We also describe the implementation of our model using machine learning techniques.

  15. An effective dynamic reconfiguration algorithm for IP over WDM networks

    Science.gov (United States)

    Yu, Hongfang; Zhou, Tao; Wang, Sheng; Li, Lemin

    2005-02-01

    WDM (Wavelength Division Multiplexing) technology can provide multiple wavelengths on a fiber. IP directly over WDM (or IP over WDM) has become the hot topic of industry. A promising approach for building an IP over WDM network is that a logical network consisting of the wavelength channels (lightpaths) is built on the physical WDM network. Then, IP traffic is carried on the logical topology, by utilizing the MPLS (Multiple Protocol Label Switching) or GMPLS (Generalized MPLS). When the traffic demand pattern changes in the IP layer, the network performance may become poor. In order to improve the network performance, the virtual topology can be reconfigured to suit the changing traffic patterns. In this paper, dynamic slowly-adaptation scheme (e.g. tearing down a lightpath that is lightly loaded or setting up a new lightpath when congestion occurs) is adopted. How to select the source and the destination nodes of the new lightpath to be added and the underutilized lightpath to be deleted if it is necessary to do so is our key issue. Four selection ways are developed. These ways are evaluated through detail simulations and various performances are investigated.

  16. Spacecraft Dynamic Characteristics While Deploying Flexible Beams

    Institute of Scientific and Technical Information of China (English)

    程绪铎; 李俊峰; 樊勇; 王照林

    2002-01-01

    The attitude dynamic equations of a spacecraft while deploying two flexible beams and the beam equations were developed from momentum theory. The dynamic equations were solved numerically using the Runge-Kutta method to calculate the vibration amplitudes of the flexible beams and the attitude angular velocity. The results show that the vibration amplitudes increase as the beam length increases or as the initial attitude angular velocity increases. The results also show that the vibration amplitudes decrease as the deployment velocity increases.

  17. State perspectives on clean coal technology deployment

    Energy Technology Data Exchange (ETDEWEB)

    Moreland, T. [State of Illinois Washington Office, Washington, DC (United States)

    1997-12-31

    State governments have been funding partners in the Clean Coal Technology program since its beginnings. Today, regulatory and market uncertainties and tight budgets have reduced state investment in energy R and D, but states have developed program initiatives in support of deployment. State officials think that the federal government must continue to support these technologies in the deployment phase. Discussions of national energy policy must include attention to the Clean Coal Technology program and its accomplishments.

  18. Deploying Renewables - Best and Future Policy Practice

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-11-23

    The global energy system faces urgent challenges. Concerns about energy security are growing, as highlighted by the recent political turmoil in Northern Africa and the nuclear incident in Fukushima. At the same time, the need to respond to climate change is more critical than ever. Against this background, many governments have increased efforts to promote deployment of renewable energy -- low-carbon sources that can strengthen energy security. This has stimulated unprecedented rise in deployment, and renewables are now the fastest growing sector of the energy mix. This 'coming of age' of renewable energy also brings challenges. Growth is focused on a few of the available technologies, and rapid deployment is confined to a relatively small number of countries. In more advanced markets, managing support costs and system integration of large shares of renewable energy in a time of economic weakness and budget austerity has sparked vigorous political debate. The IEA's new report, Deploying Renewables 2011: Best and Future Policy Practice: - Provides a comprehensive review and analysis of renewable energy policy and market trends; - Analyses in detail the dynamics of deployment and provides best-practice policy principles for different stages of market maturity; - Assesses the impact and cost-effectiveness of support policies using new methodological tools and indicators; - Investigates the strategic reasons underpinning the pursuit of RE deployment by different countries and the prospects for globalisation of RE. This new book builds on and extends a 2008 IEA publication, drawing on recent policy and deployment experience world-wide. It provides guidance for policy makers and other stakeholders to avoid past mistakes, overcome new challenges and reap the benefits of deploying renewables -- today and tomorrow.

  19. Deployable radiator with flexible line loop

    Science.gov (United States)

    Keeler, Bryan V. (Inventor); Lehtinen, Arthur Mathias (Inventor); McGee, Billy W. (Inventor)

    2003-01-01

    Radiator assembly (10) for use on a spacecraft (12) is provided including at least one radiator panel assembly (26) repeatably movable between a panel stowed position (28) and a panel deployed position (36), at least two flexible lines (40) in fluid communication with the at least one radiator panel assembly (26) and repeatably movable between a stowage loop (42) and a flattened deployed loop (44).

  20. Designing Planar Deployable Objects via Scissor Structures.

    Science.gov (United States)

    Zhang, Ran; Wang, Shiwei; Chen, Xuejin; Ding, Chao; Jiang, Luo; Zhou, Jie; Liu, Ligang

    2016-02-01

    Scissor structure is used to generate deployable objects for space-saving in a variety of applications, from architecture to aerospace science. While deployment from a small, regular shape to a larger one is easy to design, we focus on a more challenging task: designing a planar scissor structure that deploys from a given source shape into a specific target shape. We propose a two-step constructive method to generate a scissor structure from a high-dimensional parameter space. Topology construction of the scissor structure is first performed to approximate the two given shapes, as well as to guarantee the deployment. Then the geometry of the scissor structure is optimized in order to minimize the connection deflections and maximize the shape approximation. With the optimized parameters, the deployment can be simulated by controlling an anchor scissor unit. Physical deployable objects are fabricated according to the designed scissor structures by using 3D printing or manual assembly. We show a number of results for different shapes to demonstrate that even with fabrication errors, our designed structures can deform fluently between the source and target shapes.

  1. Joints in deployable space truss structures

    Science.gov (United States)

    Rhodes, M.

    1988-01-01

    Since the response of deployable structural concepts being considered for the Large Deployable Reflector (LDR) backup structure will be dominated by the response of joints, the joint characteristics are significant. An overview is given of the research activities at LaRC on the static behavior of joints for deployable space truss structures. Since a pin-clevis-type joint will be utilized in deployable structures, an experimental research program to characterize the joint parameters which affect stiffness was conducted. An experimental research program was conducted on a second type of joint, referred to as a near-center latch joint. It was used in the center of members on the deployable truss structure for the Control of Flexible Structures (COFS) flight experiment. The test results of the near-center latch joint and the member with the joints indicated that the stiffness of the near-center joint is linear and stiffer than the stiffness of the total member, and that non-linearities in the stiffness characteristics of the total member were due to bending introduced at the ends of the member. The resulting data indicates that stiff linear folding joints can be designed and that bending load paths should be avoided whenever possible. In summary, for deployable structures, special attention to the joint and the structure design is required to minimize the undesirable structural non-linearities.

  2. Offloading techniques for large deployable space structures

    Science.gov (United States)

    Caravaggio, Levino; Golob, Alex

    1992-01-01

    The validation and verification of large deployable space structures are continual challenges which face the integration and test engineer today. Spar Aerospace Limited has worked on various programs in which such structure validation was required and faces similar tasks in the future. This testing is reported and the different offloading and deployment methods which were used, as well as the proposed methods which will be used on future programs, are described. Past programs discussed include the Olympus solar array ambient and thermal vacuum deployments, and the Anik-E array and reflector deployments. The proposed MSAT reflector and boom ambient deployment tests, as well as the proposed RADARSAT Synthetic Aperture Radar (SAR) ambient and thermal vacuum deployment tests will also be presented. A series of tests relating to various component parts of the offloading equipment systems was required. These tests included the characterization and understanding of linear bearings and large (180 in-lbf) constant force spring motors in a thermal vacuum environment, and the results from these tests are presented.

  3. 78 FR 77550 - Integrated Corridor Management Deployment Planning Grants

    Science.gov (United States)

    2013-12-23

    ... Federal Highway Administration Integrated Corridor Management Deployment Planning Grants AGENCY: Federal... is extending the application period for the Integrated Corridor Management Deployment Planning Grants... Integrated Corridor Management Deployment Planning Grants. The purpose of this notice was to invite States...

  4. Research on Performance between IP and Vector Forwarding

    Directory of Open Access Journals (Sweden)

    Aqun Zhao

    2013-03-01

    Full Text Available With the rapid development of network size and great increase of Internet traffic, it has become a crucial work to improve the forwarding performance of the core devices of Internet or the routers. In this study, the analysis and comparison of instruction cycles occupied by the machine in the process of route lookup in IP forwarding and vector forwarding were carried out which may determine the forwarding performance of a router. The simulation experiments were also made to study the forwarding efficiency of IP forwarding and vector forwarding. The theoretical and experimental results prove that the vector forwarding method is more efficient than IP forwarding which can provide powerful evidence to the application of vector network in the Internet.

  5. Mobile location services over the next generation IP core network

    DEFF Research Database (Denmark)

    Thongthammachart, Saowanee; Olesen, Henning

    2003-01-01

    network is changing from circuit-switched to packet-switched technology and evolving to an IP core network based on IPv6. The IP core network will allow all IP devices to be connected seamlessly. Due to the movement detection mechanism of Mobile IPv6, mobile terminals will periodically update......Mobile communication networks are evolving towards smaller cells, higher throughput, better security and provision of better services. Wireless short-range technologies, such as the WLAN 802.11 standards family and Bluetooth, are expected to play a major role in future networks. The mobile core...... their current point of attachment to the network and hence provide the current location of the mobile user automatically. The convergence of wireless short-range networks, mobile networks and Internet technology will provide the mobile user's location without any add-in equipment for location measurement...

  6. Firewall for Dynamic IP Address in Mobile IPv6

    Science.gov (United States)

    Qiu, Ying; Bao, Feng; Zhou, Jianying

    Mobile communication is becoming the mainstream with the rapid growth of mobile devices penetrating our daily life. More and more mobile devices such as mobile phones, personal digital assistants, notebooks etc, are capable of Internet access. Mobile devices frequently change their communication IP addresses in mobile IPv6 network following its current attached domain. This raises a big challenge for building firewall for mobile devices. The conventional firewalls are primarily based on IPv4 networks where the security criteria are specified only to the fixed IP addresses or subnets, which apparently do not apply to mobile IPv6. In this paper we propose three solutions for mobile IPv6 firewall. Our approaches make the firewall adaptive to dynamic IP addresses in mobile IPv6 network. They have different expense and weight corresponding to different degree of universality. The paper focuses the study more from practical aspect.

  7. Congestion Avoidance in IP Based CDMA Radio Access Network

    Directory of Open Access Journals (Sweden)

    Syed Shakeel Hashmi

    2011-02-01

    Full Text Available CDMA is an important air interface technologies for cellular wireless networks. As CDMAbasedcellular networks mature, the current point-to-point links will evolve to an IP-based Radio AccessNetwork (RAN. mechanisms must be designed to control the IP Radio Access Network congestion.This Paper implements a congestion control mechanism using Router control and channelcontrol method for IP-RAN on CDMA cellular network. The Router control mechanism uses the featuresof CDMA networks using active Queue Management technique to reduce delay and to minimize thecorrelated losses. The Random Early Detection Active Queue Management scheme (REDAQM is to berealized for the router control for data transmission over the radio network using routers as the channel.The channel control mechanism control the congestion by bifurcating the access channel into multiplelayer namely RACH, BCCH and DCH for data accessing. The proposed paper work is realized usingMatlab platform.

  8. Capturing value from Intellectual Property (IP) in a global environment

    DEFF Research Database (Denmark)

    Beukel, Karin; Cassiman, Bruno

    2017-01-01

    Globalization should provide firms with an opportunity to leverage their know-how and reputation across countries to create value. However, it remains challenging for them to actually capture that value using traditional Intellectual Property (IP) tools. In this paper, we document the strong growth...... are causing backlogs and delays in numerous Patent and Trademarks Offices and litigation over IP rights is expensive, with an uncertain outcome. Moreover, local governments can succeed in transferring value to local firms and influencing global market positions by using IP laws and other regulations...... discuss in our concluding section. Global companies will need to organize cross-functional value capture teams focused on appropriating value from their know-how and reputation by combining different institutional, market, and nonmarket tools, depending on the institutional and business environment...

  9. Load characterization and anomaly detection for voice over IP traffic.

    Science.gov (United States)

    Mandjes, Michel; Saniee, Iraj; Stolyar, Alexander L

    2005-09-01

    We consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typically arise when there is focused overload or when a network element fails and it is desired to infer these purely from the measured traffic. We derive new general formulae for the variance of the cumulative traffic over a fixed time interval and show how the derived analytical expression simplifies for the case of voice over IP traffic, the focus of this paper. To detect load anomalies, we show it is sufficient to consider cumulative traffic over relatively long intervals such as 5 min. We also propose simple anomaly detection tests including detection of over/underload. This approach substantially extends the current practice in IP network management where only the first-order statistics and fixed thresholds are used to identify abnormal behavior. We conclude with the application of the scheme to field data from an operational network.

  10. Generation and application of human iPS cells

    Institute of Scientific and Technical Information of China (English)

    CUI Ghun; RAO LingJun; CHENG LinZhao; XIAO Lei

    2009-01-01

    Human embryonic stem (ES) cells are capable of unlimited proliferation and maintenance of pluripo-tency in vitro; these properties may lead to potential applications in regenerative medicine.However,immune rejection hampers the allogenic application of human ES cells.Over-expression of several specific transcription factors has been used to reprogram human adult cells into induced pluripotent stem (iPS) cells,which are similar to hESCs in many aspects.The iPS technique makes it possible to produce patient-specific pluripotent stem cells for transplantation therapy without immune rejection.However,some challenges remain,including viral vector integration into the genome,the existence of exogenous oncogenic factors,and low induction efficiency.Here,we review recent advances in human iPS methodology,as well as remaining challenges and its potential applications.

  11. Integrated Differentiated Survivability in IP over WDM Networks

    Institute of Scientific and Technical Information of China (English)

    Wei Wei; Qing-Ji Zeng

    2004-01-01

    The problem of differentiated Multi-Layer Integrated Survivability (MLIS) in IP over WDM networks is studied, which is decomposed into three sub-problems: survivable strategies design (SSD), spare capacity dimensioning (SCD), and dynamic survivable routing (DSR). A related work of network survivability in IP over WDM networks is firstly provided, and adaptive survivable strategies are also designed. A new Integrated Shared Pool (ISP) approach for SCD is then proposed, which is formulated by using integer-programming theory. Moreover, a novel survivable routing scheme called Differentiated Integrated Survivability Algorithm (DISA) for DSR is developed. Simulation results show that the proposed integrated survivability scheme performs much better than other solutions (e.g., "highest layer recovery" and "lowest layer recovery" schemes) in terms of traffic blocking ratio, spare resource requirement, and average traffic recovery ratio in IP over WDM networks.

  12. Capturing value from IP in a global environment

    DEFF Research Database (Denmark)

    Alcacer, Juan; Beukel, Karin; Cassiman, Bruno

    of patenting globally. For trademarks and industrial designs, globalization has created more potential infringers and an increase in piracy, as evidenced by a significant increase in customs seizures. The problems with IP even go beyond individual firms, as when governments use IP policies to favor local firms...... section. Global companies will need to organize cross-functional value capture teams focused on appropriating value from their know-how and reputation by combining different institutional, market, and non-market tools, depending on the institutional and business environment in a particular region.......This paper documents the strong growth in tools used by firms to protect their intellectual property (IP), develop their know-how, and build and maintain their reputation globally. We focus on three tools that have become increasingly important in the last several decades: patents, trademarks...

  13. Deploying process modeling and attitude control of a satellite with a large deployable antenna

    OpenAIRE

    Zhigang Xing; Gangtie Zheng

    2014-01-01

    Modeling and attitude control methods for a satellite with a large deployable antenna are studied in the present paper. Firstly, for reducing the model dimension, three dynamic models for the deploying process are developed, which are built with the methods of multi-rigid-body dynamics, hybrid coordinate and substructure. Then an attitude control method suitable for the deploying process is proposed, which can keep stability under any dynamical parameter variation. Subsequently, this attitude...

  14. [The genetic safety of induced pluripotent stem (iPS) cells].

    Science.gov (United States)

    Chen, Qian; Shi, Qing-Hua

    2012-03-01

    Since Takahashi and Yamanaka first generated induced pluripotent stem (iPS) cells from mouse fibroblasts successfully in 2006, iPS cells have rapidly become a new hotspot in the field of stem cells research because of their broad potential application prospects. Meanwhile, more and more attentions are paid to the genetic safety of iPS cells. This article summarizes recent findings on genetic safety of iPS cells and reviews the possible causes leading to genetic instability of iPS cells. Hopefully, this review is helpful to improve the induction of iPS cells and obtain genetically safe iPS cells.

  15. The Verb Always Leaves IP in V2 Clauses

    DEFF Research Database (Denmark)

    Schwartz, Bonnie D.; Vikner, Sten

    2007-01-01

    The verb second (V2) phenomenon, as it is found in the Germanic languages, has been the focus of much attention within recent syntactic research. In most of the literature on V2, it is assumed that the verb in all V2 clauses has moved to a head position outside IP, e.g. Cº. In Schwartz & Vikner...... analysis in which the verb moves into an Xº which is the sister of IP may be compatible with what we say here. Various alternatives to this analysis have been explored in the literature, and here we will address two in particular: One alternative is that there is an asymmetry between subject...

  16. IP Lookup as a Critical Functionality of Packet Processors

    Directory of Open Access Journals (Sweden)

    Z. G. Čiča

    2013-06-01

    Full Text Available Packet processing represents the most significant part of a router’s data plane and has a large impact on router’s scalability. Packet processing consists of many functions and some of them can become critical for the future router’s scalability. In this paper, the IP lookup as one of the most critical packet processing functions is analyzed to determine its impact on the Internet router’s scalability. Also, in this paper we propose a new modification of our previously proposed IP lookup algorithm BPFL.

  17. Voice over IP for Sony Ericsson Cellular Phones

    OpenAIRE

    Theander, Petter; Hultgren, Thomas

    2005-01-01

    This report presents an investigation of the possibilities to implement voice over IP (VoIP) in Sony Ericsson cellular phones. The results from this investigation show that it is partially possible to implement such a solution. The best option for doing so is to make use of the support for the Session Initiation Protocol and the Real-time Transport Protocol offered by the architecture. Another goal is to evaluate if Bluetooth is able to handle the requirements needed for the solution. The who...

  18. USB Dual-Mode Function IP Core Development

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper describes the specification and implement of a Universal Serial Bus (USB) dual-mode function IP core used for embedded system. Controlled by micro controller/CPU, the novel IP core can function as a USB host controller or USB peripheral controller. When configured as a USB host controller, it supports all USB 1.1 transaction types; supports automatic preamble insertion, and automatic SOF generation and transmission. Otherwise, when it is configured as a USB device by a microprocessor, it operates as a USB peripheral controller compliant with USB2.0 specification.

  19. Interfacing the Controllogics PLC over Ethernet/IP.

    Energy Technology Data Exchange (ETDEWEB)

    Kasemir, K. U. (Kay-Uwe); Dalesio, L. R. (Leo R.)

    2001-01-01

    The Allen-Bradley ControlLogix [1] line of programmable logic controllers (PLCs) offers several interfaces: Ethernet, ControlNet, DeviceNet, RS-232 and others. The ControlLogix Ethernet interface module 1756-ENET uses EtherNet/IP, the ControlNet protocol [2], encapsulated in Ethernet packages, with specific service codes [3]. A driver for the Experimental Physics and Industrial Control System (EPICS) has been developed that utilizes this EtherNet/IP protocol for controllers running the vxWorks RTOS as well as a Win32 and Unix/Linux test program. Features, performance and limitations of this interface are presented.

  20. 浅析IP-SAN和FC-SAN解决方案

    Institute of Scientific and Technical Information of China (English)

    林文栋

    2010-01-01

    存储技术发展日新月异,SAN可说是DAS网络化发展趋势下的产物.本文简介绍IP SAN和FC SAN,对IP SAN和FC SAN的架构以及构建成本、可扩展性、易用性、兼容性、稳定性和速度等的比较,认为各有千秋,两者之间应取长补短,互相共存.

  1. PeakXus: comprehensive transcription factor binding site discovery from ChIP-Nexus and ChIP-Exo experiments.

    Science.gov (United States)

    Hartonen, Tuomo; Sahu, Biswajyoti; Dave, Kashyap; Kivioja, Teemu; Taipale, Jussi

    2016-09-01

    Transcription factor (TF) binding can be studied accurately in vivo with ChIP-exo and ChIP-Nexus experiments. Only fraction of TF binding mechanisms are yet fully understood and accurate knowledge of binding locations and patterns of TFs is key to understanding binding that is not explained by simple positional weight matrix models. ChIP-exo/Nexus experiments can also offer insight on the effect of single nucleotide polymorphism (SNP) at TF binding sites on expression of the target genes. This is an important mechanism of action for disease-causing SNPs at non-coding genomic regions. We describe a peak caller PeakXus that is specifically designed to leverage the increased resolution of ChIP-exo/Nexus and developed with the aim of making as few assumptions of the data as possible to allow discoveries of novel binding patterns. We apply PeakXus to ChIP-Nexus and ChIP-exo experiments performed both in Homo sapiens and in Drosophila melanogaster cell lines. We show that PeakXus consistently finds more peaks overlapping with a TF-specific recognition sequence than published methods. As an application example we demonstrate how PeakXus can be coupled with unique molecular identifiers (UMIs) to measure the effect of a SNP overlapping with a TF binding site on the in vivo binding of the TF. Source code of PeakXus is available at https://github.com/hartonen/PeakXus tuomo.hartonen@helsinki.fi or jussi.taipale@ki.se. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  2. Internet Connection of a Broadband Wireless IP Network Based on a Fast Mobile IP Algorithm with Link Layer Support

    Institute of Scientific and Technical Information of China (English)

    XIONGYan; MIAOFuyou; HUABei; WANGXingfu

    2003-01-01

    Commercialized wireless LANs (local area networks) are emerging one after another. Because a lot of useful information and resources are residing in the wired network, Internet, the strong requirement to access In-ternet for mobile hosts in wireless LANs is growing more and more. In this paper, we simply describe the topoi-ogy and feature of a broadband wireless Internet protocol network (BWIPN) in which data transmitted on wireless link is encapsulated within Internet protocol (IP) packets.To connect to Internet, there is an Internet connecting server (ICS) which is also a router within every BWIPN.A fast mobile IP hand-offalgorithm with link layer supportto reduce handoff overhead has been proposed to providemobility support for wireless terminals (WTs, i.e. note-book computers) roaming among BWIPNs without chang-ing their IP addresses. An indirect TCP (transfer control protocol) scheme is used to improve the performance ofwireless TCP. To match data transmission rate on the wire-less link with that on the wired link, an adaptive wireless congestion control algorithms are added at IP layers in the WT and the ICS. Both performance analysis and experi-mental result have shown that the fast mobile IP hand-off algorithm reduces the hand-off delay by about 10 times and TCP disconnection times is reduced greatly, compared with the three known mobile IP hand-off algorithms. By our work, users on WTs can explore Internet using Web browser, File Transfer Protocol, Telnet and Ping utilities while moving among different BWIPNs very well.

  3. Lightweight, Self-Deploying Foam Antenna Structures

    Science.gov (United States)

    Sokolowski, Witold; Levin, Steven; Rand, Peter

    2004-01-01

    Lightweight, deployable antennas for a variety of outer-space and terrestrial applications would be designed and fabricated according to the concept of cold hibernated elastic memory (CHEM) structures, according to a proposal. Mechanically deployable antennas now in use are heavy, complex, and unreliable, and they utilize packaging volume inefficiently. The proposed CHEM antenna structures would be simple and would deploy themselves without need for any mechanisms and, therefore, would be more reliable. The proposed CHEM antenna structures would also weigh less, could be packaged in smaller volumes, and would cost less, relative to mechanically deployable antennas. The CHEM concept was described in two prior NASA Tech Briefs articles: "Cold Hibernated Elastic Memory (CHEM) Expandable Structures" (NPO-20394), Vol. 23, No. 2 (February 1999), page 56; and "Solar Heating for Deployment of Foam Structures" (NPO-20961), Vol. 25, No. 10 (October 2001), page 36. To recapitulate from the cited prior articles: The CHEM concept is one of utilizing opencell foams of shape-memory polymers (SMPs) to make lightweight, reliable, simple, and inexpensive structures that can be alternately (1) compressed and stowed compactly or (2) expanded, then rigidified for use. A CHEM structure is fabricated at full size from a block of SMP foam in its glassy state [at a temperature below the glass-transition temperature (Tg) of the SMP]. The structure is heated to the rubbery state of the SMP (that is, to a temperature above Tg) and compacted to a small volume. After compaction, the structure is cooled to the glassy state of the SMP. The compacting force can then be released and the structure remains compact as long as the temperature is kept below Tg. Upon subsequent heating of the structure above Tg, the simultaneous elastic recovery of the foam and its shape-memory effect cause the structure to expand to its original size and shape. Once thus deployed, the structure can be rigidified by

  4. Environmental issues affecting clean coal technology deployment

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M.J. [Electric Power Research Inst., Palo Alto, CA (United States)

    1997-12-31

    The author outlines what he considers to be the key environmental issues affecting Clean Coal Technology (CCT) deployment both in the US and internationally. Since the international issues are difficult to characterize given different environmental drivers in various countries and regions, the primary focus of his remarks is on US deployment. However, he makes some general remarks, particularly regarding the environmental issues in developing vs. developed countries and how these issues may affect CCT deployment. Further, how environment affects deployment depends on which particular type of clean coal technology one is addressing. It is not the author`s intention to mention many specific technologies other than to use them for the purposes of example. He generally categorizes CCTs into four groups since environment is likely to affect deployment for each category somewhat differently. These four categories are: Precombustion technologies such as coal cleaning; Combustion technologies such as low NOx burners; Postcombustion technologies such as FGD systems and postcombustion NOx control; and New generation technologies such as gasification and fluidized bed combustion.

  5. Mesh deployable antenna mechanics testing method

    Science.gov (United States)

    Jiang, Li

    Rapid development in spatial technologies and continuous expansion of astronautics applications require stricter and stricter standards in spatial structure. Deployable space structure as a newly invented structural form is being extensively adopted because of its characteristic (i.e. deployability). Deployable mesh reflector antenna is a kind of common deployable antennas. Its reflector consists in a kind of metal mesh. Its electrical properties are highly dependent on its mechanics parameters (including surface accuracy, angle, and position). Therefore, these mechanics parameters have to be calibrated. This paper presents a mesh antenna mechanics testing method that employs both an electronic theodolite and a laser tracker. The laser tracker is firstly used to measure the shape of radial rib deployable antenna. The measurement data are then fitted to a paraboloid by means of error compensation. Accordingly, the focus and the focal axis of the paraboloid are obtained. The following step is to synchronize the coordinate systems of the electronic theodolite and the measured antenna. Finally, in a microwave anechoic chamber environment, the electromechanical axis is calibrated. Testing results verify the effectiveness of the presented method.

  6. Broadband TCP/IP-connectivity for secondary substations; Breitbandige TCP/IP-Anbindung von Ortsnetzstationen

    Energy Technology Data Exchange (ETDEWEB)

    Braun, U. [Power Plus Communications AG, Mannheim (Germany); Koerner, C. [EnBW Regional AG, Stuttgart (Germany); Kopp, D. [Alcatel-Lucent Deutschland AG, Stuttgart (Germany)

    2012-07-01

    In the distribution area of EnBW Regional AG in the region of Freiamt, currently a Broadband Powerline (BPL) pilot is deployed. EnBW is facing specific issues in this part of the Black Forest. There is a high imbalance of installed renewables against demand and due to the topography, radio-based communications is often difficult to establish. In the area 13,5 MW of installed renewables capacity stand against 1,9 MW of demand. Such a situation is clear inversion of the classical operation of a distribution network. Safe and sustained operation of a distribution grid under such conditions can only be handled with appropriate measurement and control technology. A high performance communication system has to be the base of the system. The goal of the pilot installation in Freiamt is to give proof on sufficient bandwidth and low enough latency being provided by the BPL communication system. For the further extension of the system it is planned to use fault tolerant communications schemes which are able to compensate the loss of one communication line in a ring. For this purpose detailed lab-simulations have been performed in cooperation with Alcatel-Lucent. (orig.)

  7. A New Luminous Outburst from SN 2009ip

    Science.gov (United States)

    Drake, A. J.; Howerton, S.; McNaught, R.; Djorgovski, S. G.; Mahabal, A. A.; Graham, M. J.; Williams, R.; Prieto, J.; Catelan, M.; Christensen, E.; Larson, S.

    2012-08-01

    Further to Drake et al. (2010, Atel#2897), we report the discovery of a new bright outburst from spectroscopically confirmed LBV (Supernova Impostor) SN 2009ip (Maza et al. 2009; CBET#1928, Berger et al. 2009, ATEL#2184; Smith et al. 2010; Foley et al. 2011) in images taken by the Siding Spring Survey (rmn/>SSS).

  8. An Overview of the IP Enforcement System in China

    Institute of Scientific and Technical Information of China (English)

    Wu Yuhe

    2005-01-01

    @@ For more than two decades after the Trademark Law of the People's Republic of China entered into force in 1983,China has formulated a series of IP-related laws and regulations, including among other things, the Patent Law, Trademark Law, Copyright Law and Unfair Competition Law. Besides, it has acceded to many international IP treaties and established an adequate system for IP protection. In particular, China has drawn more on the mature practices of the Western countries with respect to the conditions and requirements for grant of the intellectual property rights, which has made the legal system for the protection of the intellectual property rights in China readily understandable and acceptable to foreign interested parties. By contrast, China has mostly followed the existing civil, administrative and criminal liability system in its construction of the IP-related enforcement system, thus rendering it more "characteristic of China". In fact, this "unique"system provides interested parties with more opportunities and approaches for them to enforce their rights.

  9. IPS Space Weather Research: Korea-Japan-UCSD

    Science.gov (United States)

    2015-04-27

    systems. c) The potential for using heliospheric Faraday rotation for measuring Bz remotely. To make headway on these items in the allotted time...workshop where this information will be presented. To make headway on the analysis of IPS g-level data as a proxy for heliospheric density, we wish

  10. PERCEPTIVE APPROACH FOR ROUTE OPTIMIZATION IN MOBILE IP

    Directory of Open Access Journals (Sweden)

    Vinay Kumar Nigam

    2010-12-01

    Full Text Available The recent advances in wireless communication technology and the unprecedented growth of the Internet have paved the way for wireless networking and IP mobility. Mobile Internet protocol[1,2] has been designed within the IETF to support the mobility[2] of users who wish to connect to the internet and maintain communications as they move from place to place. Mobile IPV6 allows a mobile node to talk directly to its peers while retaining the ability to move around and change the currently used IP addresses. This mode of operation is called Route Optimization[7,10].In this approach, the correspondent node learns a binding between the Mobile nodes permanent home address and its current temporary care-of-address. This introduces several security vulnerabilities to Mobile IP, among them the most important one is the authentication and authorization of binding updates. This paper describes the Route optimization by the introduction of mobility. In this paper , we proposed a new efficient technique for route optimization in mobile IP for smoothly communication while MN moving from one network domain to other without losing the connection. Our technique will also be improve the path in intra-network communication[9].

  11. Crosslayer Survivability in Overlay-IP-WDM Networks

    Science.gov (United States)

    Pacharintanakul, Peera

    2010-01-01

    As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…

  12. IP-Based TV Technologies, Services and Multidisciplinary Applications

    NARCIS (Netherlands)

    Bonastre, O.M.; Montpetit, M.J.; Cesar Garcia, P.S.

    2013-01-01

    The move to Internet Protocol (IP)-based content delivery services has challenged the television industry by allowing high-quality television content to be delivered using the Internet, wired and wireless, private and public. The new convergence paradigm is already playing out its disruptive role as

  13. Credibility and validation of simulation models for tactical IP networks

    NARCIS (Netherlands)

    Boltjes, B.; Thiele, F.; Diaz, I.F.

    2007-01-01

    The task of TNO is to provide predictions of the scalability and performance of the new all-IP tactical networks of the Royal Netherlands Army (RNLA) that are likely to be fielded. The inherent properties of fielded tactical networks, such as low bandwidth and Quality of Service (QoS) policies

  14. Performance Comparison and Analysis of IP and MPLS Networks

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    With the increasing need for Quality of Service(QoS),the traditional IP network is becoming less competitive. In order to give readers quantitative and convictive performance comparisons between IP and MPLS network,we choose Berkeleys NS-2 simulator[1] in our research on network throughput and end-to-end TCP behavior. Using NS-2 simulator,we analyze the performance of a network with MPLS Traffic Engineering(MPLS-TE).Specifically,the throughput and TCP end-to-end delay time under two different queuing algorithms are obtained and compared between the MPLS network and traditional IP network. We find that in the IP network using SFQ queuing algorithm will help traffic balance compared to the simple FIFO scheme,but it still can not utilize the available bandwidth,which in turn leads to the poor performance as in the FIFO case.With MPLS-TE, the throughput will be higher and the end-to-end TCP delay time remains almost the same even in heavy load case.We notice that if flows are isolated partially,using SFQ scheme will have a comparable performance as the fully isolation case using FIFO scheme in a MPLS network,and that if flows are isolated fully for FIFO and SFQ schemes,both will have the same result.Finally,we conclude that a better queuing algorithm will help reduce the label space requirement.

  15. Performance Comparison and Analysis of IP and MPLS Networks

    Institute of Scientific and Technical Information of China (English)

    LIUEr-wu; CAOMing-cui; 等

    2001-01-01

    With the increasing need for Quality of Service(QoS), the traditional IP network is becoming less com-petitive.In order to give readers quantitative and convictive performance comparisons between IP and MPLS net-work, we choose Berkeley's NS-2 simulator[1] in our research on network throughput and end-to-end TCP behavior.Using NS-2 simulator,we analyze the performance of a network with MPLS Traffic Engineering (MPLS-TE).Specifically, the throughput and TCP end-to-end delay time under two different queuing algorithms are obtained and compared between the MPLS network and traditional IP network .We find that in the IP network using SFQ queuing algorithm will help traffic balance compared to the simple FIFO scheme,but it still can ont utilize the available bandwidth,which in turn leads to the poor performance as in the FIFO case.With MPLS-TE,the throughput will be higher and the end-to-end TCP delay time remains almost the same even in heavy load case.We notice that if flows are isolated partially,using SFQ scheme will have a comparable performance as the fully isola-tion case using FIFO scheme in a MPLS network, and that if flows are isolated fully for FIFO and SFQ schemes, both will have the same result.Finally,we conclude that a better queuing algorithm will help reduce the label space requirement.

  16. TCP-IP Model in Data Communication and Networking

    Directory of Open Access Journals (Sweden)

    Pranab Bandhu Nath

    2015-10-01

    Full Text Available The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP/IP, because it’s most important protocols, the Transmission Control Protocol (TCP and the Internet Protocol (IP, were the first networking protocols defined in this standard. Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking model was funded by DARPA, an agency of the United States Department of Defense. TCP/IP provides end-to-end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination. This functionality is organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved. From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link; the internet layer, connecting hosts across independent networks, thus establishing internetworking; the transport layer handling host-to-host communication; and the application layer, which provides process-to-process application data exchange. Our aim is describe operation & models of TCP-IP suite in data communication networking

  17. Capturing value from IP in a global environment

    DEFF Research Database (Denmark)

    Alcacer, Juan; Beukel, Karin; Cassiman, Bruno

    will need to combine different institutional, market and non-market mechanisms. The precise combination of tools will depend on the local and regional institutional and market conditions. Abstract: This paper documents the strong growth in tools used by firms to protect their intellectual property (IP...

  18. VoIP makes voice heard--functionality is up.

    Science.gov (United States)

    Wade, Phil; Wakelam, Mathew

    2008-05-01

    Phil Wade, sales and marketing director, and Mathew Wakelam, VoIP product manager, at alarm and communication specialist Static Systems Group, discuss wireless VoLP's potential in healthcare establishments and examine how, in particular, the technology can be successfully integrated with nurse call systems.

  19. Managing wireless IP-Connectivity Experience as Mobile Social Media

    NARCIS (Netherlands)

    Rigolin Ferreira Lopes, R.; van Beijnum, Bernhard J.F.; dos Santos Moreira, Edson

    2010-01-01

    Social media is the meaningful digital content that results from interaction or collaboration between users through web-based applications, e.g. blogs and virtual communities. While on the move, people can create or consume mobile social media using portable devices with IP-connectivity. Our

  20. IP over optical multicasting for large-scale video delivery

    Science.gov (United States)

    Jin, Yaohui; Hu, Weisheng; Sun, Weiqiang; Guo, Wei

    2007-11-01

    In the IPTV systems, multicasting will play a crucial role in the delivery of high-quality video services, which can significantly improve bandwidth efficiency. However, the scalability and the signal quality of current IPTV can barely compete with the existing broadcast digital TV systems since it is difficult to implement large-scale multicasting with end-to-end guaranteed quality of service (QoS) in packet-switched IP network. China 3TNet project aimed to build a high performance broadband trial network to support large-scale concurrent streaming media and interactive multimedia services. The innovative idea of 3TNet is that an automatic switched optical networks (ASON) with the capability of dynamic point-to-multipoint (P2MP) connections replaces the conventional IP multicasting network in the transport core, while the edge remains an IP multicasting network. In this paper, we will introduce the network architecture and discuss challenges in such IP over Optical multicasting for video delivery.

  1. Load characterization and anomaly detection for voice over IP traffic

    NARCIS (Netherlands)

    M.R.H. Mandjes (Michel); I. Saniee; A. Stolyar

    2005-01-01

    textabstractWe consider the problem of traffic anomaly detection in IP networks. Traffic anomalies typically arise when there is focused overload or when a network element fails and it is desired to infer these purely from the measured traffic. We derive new general formulae for the variance of the

  2. Voice over IP - Eine Einführung

    OpenAIRE

    Fey, Marcus

    2006-01-01

    Eine kurze Einführung zu "Voice over IP" (dem Telefonieren über Datennetze). Es wird ein Überblick über technische Anforderungen und Lösungen geben. Behandelte Gebiete sind Audio-Codecs, das Transportprotokoll RTP sowie die Signalisierungsdienste SIP und H.323.

  3. Pine Engraver, Ips pini, in the Western United States (FIDL)

    Science.gov (United States)

    Sandra J. Kegley; R. Ladd Livingston; Kenneth E. Gibson

    1997-01-01

    The pine engraver, Ips pini (Say), is one of the most common and widely distributed bark beetles in North America. It occurs from southern Appalachia north to Maine and Quebec, westward across the northern United States and Canada, into the interior of Alaska, throughout the Pacific Coast States and the Rocky Mountain region, to northern Mexico. In the western United...

  4. Extending Tactical Fleet Communications Through VoIP

    Science.gov (United States)

    2014-09-01

    configurations and led to the following list of configuration recommendations: change to the least used wireless channel in your operating area; find a space...31 a. ADNS QoS ...............................................................................31 b. ADNS UDP and...VoIP QoS .....................................................31 c. ADNS QoS between LANs ......................................................32 d

  5. Strategies for analyzing highly enriched IP-chip datasets

    Directory of Open Access Journals (Sweden)

    Tavaré Simon

    2009-09-01

    Full Text Available Abstract Background Chromatin immunoprecipitation on tiling arrays (ChIP-chip has been employed to examine features such as protein binding and histone modifications on a genome-wide scale in a variety of cell types. Array data from the latter studies typically have a high proportion of enriched probes whose signals vary considerably (due to heterogeneity in the cell population, and this makes their normalization and downstream analysis difficult. Results Here we present strategies for analyzing such experiments, focusing our discussion on the analysis of Bromodeoxyruridine (BrdU immunoprecipitation on tiling array (BrdU-IP-chip datasets. BrdU-IP-chip experiments map large, recently replicated genomic regions and have similar characteristics to histone modification/location data. To prepare such data for downstream analysis we employ a dynamic programming algorithm that identifies a set of putative unenriched probes, which we use for both within-array and between-array normalization. We also introduce a second dynamic programming algorithm that incorporates a priori knowledge to identify and quantify positive signals in these datasets. Conclusion Highly enriched IP-chip datasets are often difficult to analyze with traditional array normalization and analysis strategies. Here we present and test a set of analytical tools for their normalization and quantification that allows for accurate identification and analysis of enriched regions.

  6. Crosslayer Survivability in Overlay-IP-WDM Networks

    Science.gov (United States)

    Pacharintanakul, Peera

    2010-01-01

    As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…

  7. Construction of a nuclear data server using TCP/IP

    Energy Technology Data Exchange (ETDEWEB)

    Kawano, Toshihiko; Sakai, Osamu [Kyushu Univ., Fukuoka (Japan)

    1997-03-01

    We construct a nuclear data server which provides data in the evaluated nuclear data library through the network by means of TCP/IP. The client is not necessarily a user but a computer program. Two examples with a prototype server program are demonstrated, the first is data transfer from the server to a user, and the second is to a computer program. (author)

  8. Analysis of two competing TCP/IP connections

    NARCIS (Netherlands)

    Altman, E.; Jiménez, T.; Núñez Queija, R.

    2001-01-01

    Many mathematical models exist for describing the behavior of TCP/IP under an exogenous loss process that does not depend on the window size. The goal of this paper is to present a mathematical analysis of two asymmetric competing TCP connections where loss probabilities are directly related to thei

  9. Displaying digital video over ethernet TCP-IP

    Science.gov (United States)

    Foster, John; Jackson, Paul

    1994-04-01

    Transmission and playback of digital audio and video via TCP/IP has been successfully completed with the use of typical low-end UNIX workstations. In addition, attempts have been made to increase the frame rate by sending only sections of a frame that varied the most.

  10. VLBI data transmission system using multiple IP streams

    Science.gov (United States)

    Uose, Hisao

    We have developed an IP-based data transmission system which can directly replace K4 (ID1) VLBI data recorder. It employs multiple TCP data steams and individual buffers to cope with variable usable bandwidth we encouter when we use shared academic networks. This paper describes the outline of the system and preliminary testing results.

  11. Voice over IP phone calls from your smartphone

    CERN Multimedia

    2014-01-01

    All CERN users do have a Lync account (see here) and can use Instant Messaging, presence and other features. In addition, if your number is activated on Lync IP Phone(1) system then you can make standard phone calls from your computer (Windows/Mac).   Recently, we upgraded the infrastructure to Lync 2013. One of the major features is the possibility to make Voice over IP phone calls from a smartphone using your CERN standard phone number (not mobile!). Install Lync 2013 on iPhone/iPad, Android or Windows Phone, connect to WiFi network and make phone calls as if you were in your office. There will be no roaming charges because you will be using WiFi to connect to CERN phone system(2). Register here to the presentation on Tuesday 29 April at 11 a.m. in the Technical Training Center and see the most exciting features of Lync 2013.   Looking forward to seeing you! The Lync team (1) How to register on Lync IP Phone system: http://information-technology.web.cern.ch/book/lync-ip-phone-serv...

  12. Research on lightweight passive deployment mechanism for the secondary mirror in the deployable space telescope

    Science.gov (United States)

    Zhong, Peifeng; Li, Chuang; Jing, Nan; Chong, Yaqin; Ren, Guorui

    2016-10-01

    In this paper, a new type of lightweight passive deployment mechanism based on the tape spring and the shape memory alloy is presented for the secondary mirror of a deployable space telescope. In this passive deployment mechanism for the secondary mirror, the high elastic potential energy of the folded tape springs is used as driving force when the support structure is extended, and the high stiffness characteristics of the circular arc cross section of the tape spring can be used to achieve structure self-locking after deployment. Then a deployable space telescope combined with lightweight passive deployable mechanism for the secondary mirror is designed for applying to nanosatellite imaging. Furthermore, a lock-release device is designed to achieve the function of locking the folded structure and releasing on orbit by taking advantage of the phase transformation characteristics of shape memory alloy with temperature changing. Finally, the correction method for the deployment error of secondary mirror is discussed. The temperature of the tape springs is controlled respectively to make a required length change. This can achieve the purpose of adjusting the position of the secondary mirror and improve the deployment accuracy.

  13. Deployment Instabilities of Lobed-Pumpkin Balloon

    Science.gov (United States)

    Nakashino, Kyoichi

    A lobed-pumpkin balloon, currently being developed in ISAS/JAXA as well as in NASA, is a promising vehicle for long duration scientific observations in the stratosphere. Recent ground and flight experiments, however, have revealed that the balloon has deployment instabilities under certain conditions. In order to overcome the instability problems, a next generation SPB called 'tawara' type balloon has been proposed, in which an additional cylindrical part is appended to the standard lobed-pumpkin balloon. The present study investigates the deployment stability of tawara type SPB in comparison to that of standard lobed-pumpkin SPB through eigenvalue analysis on the basis of finite element methods. Our numerical results show that tawara type SPB enjoys excellent deployment performance over the standard lobed-pumpkin SPBs.

  14. Deploying Embodied AI into Virtual Worlds

    Science.gov (United States)

    Burden, David J. H.

    The last two years have seen the start of commercial activity within virtual worlds. Unlike computer games where Non-Player-Character avatars are common, in most virtual worlds they are the exception — and until recently in Second Life they were non-existent. However there is real commercial scope for Als in these worlds — in roles from virtual sales staff and tutors to personal assistants. Deploying an embodied AI into a virtual world offers a unique opportunity to evaluate embodied Als, and to develop them within an environment where human and computer are on almost equal terms. This paper presents an architecture being used for the deployment of chatbot driven avatars within the Second Life virtual world, looks at the challenges of deploying an AI within such a virtual world, the possible implications for the Turing Test, and identifies research directions for the future.

  15. A VoIP Privacy Mechanism and its Application in VoIP Peering for Voice Service Provider Topology and Identity Hiding

    CERN Document Server

    Shen, Charles

    2008-01-01

    Voice Service Providers (VSPs) participating in VoIP peering frequently want to withhold their identity and related privacy-sensitive information from other parties during the VoIP communication. A number of existing documents on VoIP privacy exist, but most of them focus on end user privacy. By summarizing and extending existing work, we present a unified privacy mechanism for both VoIP users and service providers. We also show a case study on how VSPs can use this mechanism for identity and topology hiding in VoIP peering.

  16. The backup and technology research base on IP-SAN%基于IP-SAN的备份及技术研究

    Institute of Scientific and Technical Information of China (English)

    黄世权

    2009-01-01

    IP-SAN利用IP网络为传输介质,基于TCP/IP协议构建的存储区域网络.IP-SAN远程备份基于iSCSI技术.发挥了IP网络和IP-SAN的优势.实现了数据的异地备份,确保了数据的安全性.文章分析了IP-SAN备份的方法.备份策略,并重点分析IP-SAN备份的主要关键技术.

  17. CtIP Mutations Cause Seckel and Jawad Syndromes.

    Directory of Open Access Journals (Sweden)

    Per Qvist

    2011-10-01

    Full Text Available Seckel syndrome is a recessively inherited dwarfism disorder characterized by microcephaly and a unique head profile. Genetically, it constitutes a heterogeneous condition, with several loci mapped (SCKL1-5 but only three disease genes identified: the ATR, CENPJ, and CEP152 genes that control cellular responses to DNA damage. We previously mapped a Seckel syndrome locus to chromosome 18p11.31-q11.2 (SCKL2. Here, we report two mutations in the CtIP (RBBP8 gene within this locus that result in expression of C-terminally truncated forms of CtIP. We propose that these mutations are the molecular cause of the disease observed in the previously described SCKL2 family and in an additional unrelated family diagnosed with a similar form of congenital microcephaly termed Jawad syndrome. While an exonic frameshift mutation was found in the Jawad family, the SCKL2 family carries a splicing mutation that yields a dominant-negative form of CtIP. Further characterization of cell lines derived from the SCKL2 family revealed defective DNA damage induced formation of single-stranded DNA, a critical co-factor for ATR activation. Accordingly, SCKL2 cells present a lowered apoptopic threshold and hypersensitivity to DNA damage. Notably, over-expression of a comparable truncated CtIP variant in non-Seckel cells recapitulates SCKL2 cellular phenotypes in a dose-dependent manner. This work thus identifies CtIP as a disease gene for Seckel and Jawad syndromes and defines a new type of genetic disease mechanism in which a dominant negative mutation yields a recessively inherited disorder.

  18. CtIP Mutations Cause Seckel and Jawad Syndromes.

    Directory of Open Access Journals (Sweden)

    Per Qvist

    2011-10-01

    Full Text Available Seckel syndrome is a recessively inherited dwarfism disorder characterized by microcephaly and a unique head profile. Genetically, it constitutes a heterogeneous condition, with several loci mapped (SCKL1-5 but only three disease genes identified: the ATR, CENPJ, and CEP152 genes that control cellular responses to DNA damage. We previously mapped a Seckel syndrome locus to chromosome 18p11.31-q11.2 (SCKL2. Here, we report two mutations in the CtIP (RBBP8 gene within this locus that result in expression of C-terminally truncated forms of CtIP. We propose that these mutations are the molecular cause of the disease observed in the previously described SCKL2 family and in an additional unrelated family diagnosed with a similar form of congenital microcephaly termed Jawad syndrome. While an exonic frameshift mutation was found in the Jawad family, the SCKL2 family carries a splicing mutation that yields a dominant-negative form of CtIP. Further characterization of cell lines derived from the SCKL2 family revealed defective DNA damage induced formation of single-stranded DNA, a critical co-factor for ATR activation. Accordingly, SCKL2 cells present a lowered apoptopic threshold and hypersensitivity to DNA damage. Notably, over-expression of a comparable truncated CtIP variant in non-Seckel cells recapitulates SCKL2 cellular phenotypes in a dose-dependent manner. This work thus identifies CtIP as a disease gene for Seckel and Jawad syndromes and defines a new type of genetic disease mechanism in which a dominant negative mutation yields a recessively inherited disorder.

  19. OPORTUNIDADES DE MEJORAMIENTO DE UNA LÍNEA DE ATENCIÓN AL CLIENTE DE TELEFONÍA MÓVIL DESDE LA PERSPECTIVA DEL ASESOR OPPORTUNITIES FOR IMPROVEMENT, FROM STANDPOINT WORKERS, IN A CUSTOMER SERVICE LINE FOR MOBILE TELEPHONY

    Directory of Open Access Journals (Sweden)

    Jorge Iván Pérez Rave

    2010-04-01

    Full Text Available Este artículo resalta la importancia de considerar la voz de los colaboradores nivel operativo para identificar direcciones de mejoramiento empresarial. Para ello se socializa el despliegue de una metodología para identificar, desde la perspectiva del asesor, oportunidades de mejora de la calidad y de la productividad en una línea de atención al cliente para servicios de telefonía móvil. La metodología es de carácter exploratorio e integra elementos de: análisis multivariado, estadística descriptiva e investigación cualitativa. Como resultado se identifican variedad de oportunidades, básicamente en función de: estandarización de procedimientos, divulgación de información, capacitación y entrenamiento, satisfacción de los asesores, estado de las herramientas y aplicativos computacionales.This article shows the importance of consulting the workers opinions for the improvement of the companies. The used methodology is socialized to identify, from standpoint workers, opportunities to improve the quality and the productivity of a customer service line for mobile telephony. The methodology is exploratory and contains elements of: multivariate analysis, descriptive statistics and qualitative research. The project gives opportunities for improvement in: standardization of procedures, information dissemination, training, job satisfaction and computational tools.

  20. Clevis joint for deployable space structures

    Science.gov (United States)

    Rhodes, Marvin D. (Inventor)

    1990-01-01

    This invention relates generally to pin clevis joints, and more particularly, to zero play pin clevis joints for connecting structural members of a deployable space structure. A joint includes a pin, a tang, and a shackle. The pin is tapered at the same angle as the bores extending through the projections of the shackle and the tang. A spring washer biases the tang onto the tapered sidewall of the pin. The invention solves the free play problem associated with deployable space structures by using a tapered pin which is held in tapered holes by the spring washers.

  1. Industrial deployment of system engineering methods

    CERN Document Server

    Romanovsky, Alexander

    2013-01-01

    A formal method is not the main engine of a development process, its contribution is to improve system dependability by motivating formalisation where useful. This book summarizes the results of the DEPLOY research project on engineering methods for dependable systems through the industrial deployment of formal methods in software development. The applications considered were in automotive, aerospace, railway, and enterprise information systems, and microprocessor design.  The project introduced a formal method, Event-B, into several industrial organisations and built on the lessons learned to

  2. Carousel deployment mechanism for coilable lattice truss

    Science.gov (United States)

    Warden, Robert M.; Jones, P. Alan

    1989-01-01

    The development of a mechanism for instrumentation and solar-array deployment is discussed. One part of the technology consists of a smart motor which can operate in either an analog mode to provide high speed and torque, or in the stepper mode to provide accurate positioning. The second technology consists of a coilable lattice mast which is deployed and rotated about its axis with a common drive system. A review of the design and function of the system is presented. Structural and thermal test data are included.

  3. Challenges to Deploy Service Design in Organizations

    DEFF Research Database (Denmark)

    Akasaka, Fumiya; Ohno, Takehiko; Jensen, Mika Yasuoka

    2016-01-01

    More and more companies are applying service design approaches to develop services and products. Not every project, however, has achieved its goals. In many cases, difficulties arise from organizational issues such as organization structure and evaluation system. In this research, we held workshops...... where success and failure factors of service design projects in organization are presented. By analysing the results, we construct a model that explains the “difficulties of deploying the service design approach in organization.” On the basis of the model, this paper discusses the challenges...... to the deployment of the service design approach in organizations....

  4. Development of Norms for the Post-deployment Reintegration Scale

    Science.gov (United States)

    2010-09-01

    perspective. Recognizing the importance of successful post-deployment reintegration to optimal operational readiness, Canadian military researchers...of successful post-deployment reintegration to optimal operational readiness, Canadian military researchers developed the Army Post- Deployment... successful post-deployment reintegration to optimal operational readiness, and attempting to address the gaps and limitations of existing

  5. 中小型IP PBX系统结构的研究%Research on Medium and Small IP PBX Architecture

    Institute of Scientific and Technical Information of China (English)

    章仁龙; 周宇

    2005-01-01

    IP PBX(PBX over IP)是VoIP(Voice over IP)领域内的一个研究热点.IP PBX将企业内部现有的数据网与电话网融合,是企业与公共交换电话网PSTN(Public Switched Telephone Network)、IP网等外部网络通信的桥梁.本文基于现有的多个IP PBX系统抽象出两种最常见的模型,并在此基础上改进后,提出了一种适合中小型IP PBX系统的结构模型.

  6. NOVEL APPROACH TO RESOLVE NETWORK SECURITY ISSUES IN IP-PBX IN CONVERGED ARCHITECTURE

    Directory of Open Access Journals (Sweden)

    MUNIR B. SAYYAD,

    2010-10-01

    Full Text Available This paper aims to examine the security issues in the IP-PBX (IP Private Branch Exchange .The Traces are taken on the live environment using Vendor ‘X’ CDMA MSC. The traces are also taken at SBC (Session Boarder Controller. The PBX services can be provided over IP via a SIP (session initiation protocol trunk provided by network operator. The SIP trunk is connected to a switch i.e. MSC. Thus IP connectivity is available at IP-PBX end. Now calls can be originated from IP-PBX which is terminating on a mobile handset registered with MSC. The problem arises when a dummy/blank/fake CLI (caller line identification is configured at IP-PBX. As MSC isdoing only part of routing depending upon called party number, such calls with fake CLI pass through MSC without any intervention. So called party and even MSC are unaware of real number of calling party. Similar security issue arises when IP-PBX sends dummy IP addresses of IP phones connected to IP-PBX. Thus conflict of IP addresses and or called party numbers creates a major security concern. These are important issues for interfacing IP with traditional wire line or wireless network. Such a security issue can be resolved by registering IP-PBX and its extension numbers with MSC. This paper describes the probable methods to resolve above issues.

  7. KSR-Based Medium Improves the Generation of High-Quality Mouse iPS Cells

    OpenAIRE

    2014-01-01

    Induced pluripotent stem (iPS) cells from somatic cells have great potential for regenerative medicine. The efficiency in generation of iPS cells has been significantly improved in recent years. However, the generation of high-quality iPS cells remains of high interest. Consistently, we demonstrate that knockout serum replacement (KSR)-based medium accelerates iPS cell induction and improves the quality of iPS cells, as confirmed by generation of chimeras and all iPS cell-derived offspring wi...

  8. Los Alamos National Laboratory Tritium Technology Deployments Large Scale Demonstration and Deployment Project

    Energy Technology Data Exchange (ETDEWEB)

    McFee, J.; Blauvelt, D.; Stallings, E.; Willms, S.

    2002-02-26

    This paper describes the organization, planning and initial implementation of a DOE OST program to deploy proven, cost effective technologies into D&D programs throughout the complex. The primary intent is to accelerate closure of the projects thereby saving considerable funds and at the same time being protective of worker health and the environment. Most of the technologies in the ''toolkit'' for this program have been demonstrated at a DOE site as part of a Large Scale Demonstration and Deployment Project (LSDDP). The Mound Tritium D&D LSDDP served as the base program for the technologies being deployed in this project but other LSDDP demonstrated technologies or ready-for-use commercial technologies will also be considered. The project team will evaluate needs provided by site D&D project managers, match technologies against those needs and rank deployments using a criteria listing. After selecting deployments the project will purchase the equipment and provide a deployment engineer to facilitate the technology implementation. Other cost associated with the use of the technology will be borne by the site including operating staff, safety and health reviews etc. A cost and performance report will be prepared following the deployment to document the results.

  9. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  10. Hepatitis B infection following deployment to Angola.

    Science.gov (United States)

    Croft, A M; Ollerton, J E; Fear, N T

    2008-01-01

    We describe the clinical illness and long-term follow up of two British personnel who acquired hepatitis B infection during a 3-month UN mission to Angola. Medical officers need to be familiar with this viral illness, which may present in military personnel after any exercise in or deployment to the tropics or subtropics.

  11. Diogenes, Dogfaced Soldiers, and Deployment Music Videos

    Science.gov (United States)

    Carter, Geoffrey; Williamson, Bill

    2010-01-01

    This webtext explores the cynical/kynical humor of soldier videos, suggesting that amateur videos paradoxically both undercut authority and honor effective leaders, both make light of and also publicly reveal deployment hardships, both distance the performers from military groupthink and celebrate unit camaraderie.

  12. Microsoft System Center Configuration Manager advanced deployment

    CERN Document Server

    Coupland, Martyn

    2014-01-01

    If you are an experienced Configuration Manager administrator looking to advance your career or get more from your current environment, then this book is ideal for you. Prior experience of deploying and managing a Configuration Manager site would be helpful in following the examples throughout this book.

  13. Decreasing Non-Deployables: A Critical Task

    Science.gov (United States)

    2011-02-24

    scheduled for ETS/retirement; 203 were non-deployable for parenthood issues ( parenthood is defined as a military mother of a new born or one parent of a...personnel policies during contingency operations into a single document. Based on the vast number of personnel changes during the Global War on

  14. ELFms deployment in- and outside CERN CC

    CERN Document Server

    Cancio, G

    2004-01-01

    ELFms (http://cern.ch/elfms) stands for Extremely Large Fabric management system, and comprises tools for fabric configuration and installation (Quattor), monitoring (Lemon), and hardware/state management (LEAF). In this talk, I will describe the ELFms modules and overall architecture, as well as the integration/deployment status at CERN-CC and other sites/projects.

  15. [Retinal Cell Therapy Using iPS Cells].

    Science.gov (United States)

    Takahashi, Masayo

    2016-03-01

    Progress in basic research, starting with the work on neural stem cells in the middle 1990's to embryonic stem (ES) cells and induced pluripotent stem (iPS) cells at present, will lead the cell therapy (regenerative medicine) of various organs, including the central nervous system to a big medical field in the future. The author's group transplanted iPS cell-derived retinal pigment epithelial (RPE) cell sheets to the eye of a patient with exudative age-related macular degeneration (AMD) in 2014 as a clinical research. Replacement of the RPE with the patient's own iPS cell-derived young healthy cell sheet will be one new radical treatment of AMD that is caused by cellular senescence of RPE cells. Since it was the first clinical study using iPS cell-derived cells, the primary endpoint was safety judged by the outcome one year after surgery. The safety of the cell sheet has been confirmed by repeated tumorigenisity tests using immunodeficient mice, as well as purity of the cells, karyotype and genetic analysis. It is, however, also necessary to prove the safety by clinical studies. Following this start, a good strategy considering cost and benefit is needed to make regenerative medicine a standard treatment in the future. Scientifically, the best choice is the autologous RPE cell sheet, but autologous cell are expensive and sheet transplantation involves a risky part of surgical procedure. We should consider human leukocyte antigen (HLA) matched allogeneic transplantation using the HLA 6 loci homozyous iPS cell stock that Prof. Yamanaka of Kyoto University is working on. As the required forms of donor cells will be different depending on types and stages of the target diseases, regenerative medicine will be accomplished in a totally different manner from the present small molecule drugs. Proof of concept (POC) of photoreceptor transplantation in mouse is close to being accomplished using iPS cell-derived photoreceptor cells. The shortest possible course for treatment

  16. Planning and deployment of DWDM systems: a reality

    Science.gov (United States)

    Mishra, Data S.

    2001-10-01

    data-rate and data-format the gap between electrical layer and Optical backbone layer has to be filled. By partitioning the Optical Bandwidth of Optical Fibre Cable into the wavelengths (32 to 120) Wavelength Division Multiplexing can transport data rate from 10MB/s to 10GB/s on each wavelength. In this paper we will analyze the difficult strategies of suppliers and obstacles in the way of service providers to make DWDM a reality in the field either as Upgrade or Overlay or New Network. The difficult constraint of protection scheme with respect to compatibility with existing network and network under development has to sorted out along with present standard of Optical Fibre to carry DWDM signal in cost effective way to Access , Edge and Metro part of our network. The future of IP under DWDM is going to be key element for Network Planners in future. Fundamental limitation of bit manipulation in Photonic domain will have implication on the network design, cost and migration to all optical network because Photons are computer un-friendly and not mature enough to give memory and logic devices. In the environment of heterogeneous traffic the DWDM based All Optical Network should behave as per expectation of users whose primary traffic will be multi-media IP type. The quality of service (QoS), Virtual Path Network (VPN) over DWDM, OXC and intelligence at the edge will play a major role in future deployment of DWDM in our network . The development of improved fiber characteristics, EDFAs and Photonic component has led the carriers to go for Dense WDM Network.

  17. Framework for Development of Advanced Telecommunication Services in Current and Future Converged Networks

    DEFF Research Database (Denmark)

    Soler-Lucas, José

    2006-01-01

    This thesis presents different experiences related to architectures and mechanisms for deployment of telephony services, understood as especial features complementing the basic voice service. The context for these experiences is the transition of telecommunication (telephony) networks from circuit...... switched based systems towards packet based ones. Service deployment in a specific hybrid PSTN/IN/VoIP architecture is presented as well as a description of the enabling technologies. Discussion on service implementation examples is provided. The convenience of network neutral service invocation...... is introduced and how this has been achieved, by means of Web Services-based mechanisms. A single-request / single response protocol for invocation of a specific set of services is presented and a decoupling mechanism between signalling network protocols and service logic invocation demonstrated. Services, have...

  18. Very Low Head Turbine Deployment in Canada

    Science.gov (United States)

    Kemp, P.; Williams, C.; Sasseville, Remi; Anderson, N.

    2014-03-01

    The Very Low Head (VLH) turbine is a recent turbine technology developed in Europe for low head sites in the 1.4 - 4.2 m range. The VLH turbine is primarily targeted for installation at existing hydraulic structures to provide a low impact, low cost, yet highly efficient solution. Over 35 VLH turbines have been successfully installed in Europe and the first VLH deployment for North America is underway at Wasdell Falls in Ontario, Canada. Deployment opportunities abound in Canada with an estimated 80,000 existing structures within North America for possible low-head hydro development. There are several new considerations and challenges for the deployment of the VLH turbine technology in Canada in adapting to the hydraulic, environmental, electrical and social requirements. Several studies were completed to determine suitable approaches and design modifications to mitigate risk and confirm turbine performance. Diverse types of existing weirs and spillways pose certain hydraulic design challenges. Physical and numerical modelling of the VLH deployment alternatives provided for performance optimization. For this application, studies characterizing the influence of upstream obstacles using water tunnel model testing as well as full-scale prototype flow dynamics testing were completed. A Cold Climate Adaptation Package (CCA) was developed to allow year-round turbine operation in ice covered rivers. The CCA package facilitates turbine extraction and accommodates ice forces, frazil ice, ad-freezing and cold temperatures that are not present at the European sites. The Permanent Magnet Generator (PMG) presents some unique challenges in meeting Canadian utility interconnection requirements. Specific attention to the frequency driver control and protection requirements resulted in a driver design with greater over-voltage capability for the PMG as well as other key attributes. Environmental studies in Europe included fish friendliness testing comprised of multiple in

  19. Favqchoke: To Allocate Fair Buffer to A Dynamically Varying Traffic In An IP Network

    Directory of Open Access Journals (Sweden)

    K.Chitra

    2011-02-01

    Full Text Available In IP networks, AQM attempts to provide high network utilization with low loss and low delay by regulating queues at bottleneck links. Many AQM algorithms have been proposed, most suffer from instability of queue, bursty packet drop, require careful configuration of control parameters, or slow response to dynamic traffic changes and unfairness. The deployment of active queue management techniques such as RED based is used that results in increased bursty packet loss and unfairness caused by an exponential increase in network traffic. The inherent problem with these queue management algorithms is that they all use queue lengths as the indicator of the severity of congestion. In order to solve this problem, a new active queue management algorithm called FAVQCHOKe is proposed. In this paper, arrival rate at the network link is maintained as a principal measure of congestion to improve the transient performances of the system and ensures the entire utilization of link capacity. In addition thisproposed algorithm uses queue length and flow information that enhances fairness. This characteristic is particularly beneficial to real-time multimedia applications. Further, FAVQCHOKe achieves the above while maintaining high link utilization and low packet loss. This paper discusses about the inherent weaknesses of current techniques and how the proposed algorithm overcomes the weaknesses andensures high degree of effectiveness in the performance of the system.

  20. Preventing IP Source Address Spoofing: A Two-Level,State Machine-Based Method

    Institute of Scientific and Technical Information of China (English)

    BI Jun; LIU Bingyang; WU Jianping; SHEN Yan

    2009-01-01

    A signature-and-verification-based method, automatic peer-to-peer anti-spoofing (APPA), is pro-posed to prevent IP source address spoofing. In this method, signatures are tagged into the packets at the source peer, and verified and removed at the verification peer where packets with incorrect signatures are filtered. A unique state machine, which is used to generate signatures, is associated with each ordered pair of APPA peers. As the state machine automatically transits, the signature changes accordingly. KISS ran-dom number generator is used as the signature generating algorithm, which makes the state machine very small and fast and requires very low management costs. APPA has an intre-AS (autonomous system) level and an inter-AS level. In the intra-AS level, signatures are tagged into each departing packet at the host and verified at the gateway to achieve finer-grained anti-spoofing than ingress filtering. In the inter-AS level, signatures are tagged at the source AS border router and verified at the destination AS border muter to achieve prefix-level anti-spoofing, and the automatic state machine enables the peers to change signatures without negotiation which makes APPA attack-resilient compared with the spoofing prevention method. The results show that the two levels are both incentive for deployment, and they make APPA an integrated anti-spoofing solution.

  1. A Feedback Control Mechanism of QoS Management for IP Telecommunication Network

    Institute of Scientific and Technical Information of China (English)

    CUI Yi-dong; JIAO Li; LIN Yu; WANG Wen-dong

    2005-01-01

    In this paper a feedback control mechanism of Quality of Service (QoS) management is proposed. By measuring and monitoring the operational information of the IP telecommunication network, the feedback control-loops tune the network according to the trends of the traffic characteristics in order to gain a favorable network status. With theoretical analysis, it is concluded that the QoS of an arbitrary k-class flow can be guaranteed when the capacity of the k-class traffic is not fully filled. Thus by distributing the bandwidth of the egress bottleneck link among the ingress links, the congestion can be relieved. Moreover, the capacity of each traffic class that shares the same link affects one another. Therefore, the feedback control also aims at adjusting the capacity proportion among the traffic classes. In order to realize the goals, three feedback control-loops are designed in the QoS management system. A CORBA-based implementation is deployed on the testbed.

  2. Effectiveness of Intrusion Prevention Systems (IPS) in Fast Networks

    CERN Document Server

    Shafi, Muhammad Imran; Hayat, Sikandar; Sohail, Imran

    2010-01-01

    Computer systems are facing biggest threat in the form of malicious data which causing denial of service, information theft, financial and credibility loss etc. No defense technique has been proved successful in handling these threats. Intrusion Detection and Prevention Systems (IDPSs) being best of available solutions. These techniques are getting more and more attention. Although Intrusion Prevention Systems (IPSs) show a good level of success in detecting and preventing intrusion attempts to networks, they show a visible deficiency in their performance when they are employed on fast networks. In this paper we have presented a design including quantitative and qualitative methods to identify improvement areas in IPSs. Focus group is used for qualitative analysis and experiment is used for quantitative analysis. This paper also describes how to reduce the responding time for IPS when an intrusion occurs on network, and how can IPS be made to perform its tasks successfully without effecting network speed nega...

  3. Congested Link Inference Algorithms in Dynamic Routing IP Network

    Directory of Open Access Journals (Sweden)

    Yu Chen

    2017-01-01

    Full Text Available The performance descending of current congested link inference algorithms is obviously in dynamic routing IP network, such as the most classical algorithm CLINK. To overcome this problem, based on the assumptions of Markov property and time homogeneity, we build a kind of Variable Structure Discrete Dynamic Bayesian (VSDDB network simplified model of dynamic routing IP network. Under the simplified VSDDB model, based on the Bayesian Maximum A Posteriori (BMAP and Rest Bayesian Network Model (RBNM, we proposed an Improved CLINK (ICLINK algorithm. Considering the concurrent phenomenon of multiple link congestion usually happens, we also proposed algorithm CLILRS (Congested Link Inference algorithm based on Lagrangian Relaxation Subgradient to infer the set of congested links. We validated our results by the experiments of analogy, simulation, and actual Internet.

  4. Service Model for Multi-Provider IP Service Management

    Institute of Scientific and Technical Information of China (English)

    YU Cheng-zhi; SONG Han-tao; LIU Li

    2005-01-01

    In order to solve the problems associated with Internet IP services management, a generic service model for multi-provider IP service management is proposed, which is based on a generalization of the bandwidth broker idea introduced in the differentiated services (DiffServ) environment. This model consists of a hierarchy of service brokers, which makes it fit into providing end-to-end Internet services with QoS support. A simple and scalable mechanism is used to communicate with other cooperative domains to enable customers to dynamically setup services connections over multiple DiffServ domains. The simulation results show that the proposed model is real-time, which can deal with many flow requests in a short period of time, so that it is fit for the service management in a reasonably large network.

  5. Topology-aware Overlay Multicast over IP Multicast Networks

    Institute of Scientific and Technical Information of China (English)

    CHEN Xiao; SHAO Hua-gang; WANG Wei-nong

    2008-01-01

    Most existing overlay multicast approaches refuse to consider any network layer support no matter whether it is available or not. This design principle greatly increases the complexity of the routing algorithms and makes the overlay topologies incompatible with the underlying network. To address these issues, topology-aware overlay multicast over IP multicast networks (TOMIMN) was proposed as a novel overlay multicast protocol, which exploits the cooperation between end-hosts and IP multicast routers to construct a topology-aware overlay tree. Through a little modification to protocol independent multicast sparse mode (PIM-SM),a multicast router is able to receive registration from nearby group members and redirect passing-by join re-quests to them. Due to the multicast router's support, TOMIMN organizes its group members into an overlay multicast tree efficiently, which matches the physical network topology well.

  6. Chaos Based Secure IP Communications over Satellite DVB

    Science.gov (United States)

    Caragata, Daniel; El Assad, Safwan; Tutanescu, Ion; Sofron, Emil

    2010-06-01

    The Digital Video Broadcasting—Satellite (DVB-S) standard was originally conceived for TV and radio broadcasting. Later, it became possible to send IP packets using encapsulation methods such as Multi Protocol Encapsulation, MPE, or Unidirectional Lightweight Encapsulation, ULE. This paper proposes a chaos based security system for IP communications over DVB-S with ULE encapsulation. The proposed security system satisfies all the security requirements while respecting the characteristics of satellite links, such as the importance of efficient bandwidth utilization and high latency time. It uses chaotic functions to generate the keys and to encrypt the data. The key management is realized using a multi-layer architecture. A theoretical analysis of the system and a simulation of FTP and HTTP traffic are presented and discussed to show the cost of the security enhancement and to provide the necessary tools for security parameters setup.

  7. Ionospheric Disturbances and their Impact on IPS Using MEXART Observations

    CERN Document Server

    Rodríguez-Martínez, Mario; Carrillo-Vargas, Armando; López-Montes, Rebeca; Araujo-Pradere, Eduardo A; Casillas-Pérez, Gilberto A; Cruz-Abeyro, José A L

    2014-01-01

    We study the impact of ionospheric disturbances on the Earth's environment caused by the solar events that occurred from 20 April to 31 May 2010, using observations from the Mexican Array Radio Telescope (MEXART). During this period of time, several astronomical sources presented fluctuations in their radio signals. Wavelet analysis, together with complementary information such as the vertical total electron content (vTEC) and the Dst index, were used to identify and understand when the interplanetary scintillation (IPS) could be contaminated by ionospheric disturbances (IOND). We find that radio signal perturbations were sometimes associated with IOND and/or IPS fluctuations; however, in some cases, it was not possible to clearly identify their origin. Our Fourier and wavelet analyses showed that these fluctuations had frequencies in the range $\\approx$ 0.01 Hz -- $\\approx$ 1.0 Hz (periodicities of 100 s to 1 s).

  8. Fault Tolerant Distributed and Fixed Hierarchical Mobile IP

    Directory of Open Access Journals (Sweden)

    Paramesh C. Upadhyay

    2010-04-01

    Full Text Available To several mobility management protocols proposed for IP-based mobile networks, faulttolerance aspect of mobility agents is a primary requirement to sustain continuous service availability to themobile hosts. For a localized or micro- mobility management solution, the local mobility agent i.e. gateway isa single point of failure because it is responsible for enforcing the signaling and data packets in its domain.Such failures may severely disrupt the communications among the failure-affected users. The problembecomes even more severe for mobility agents in a distributed mobility management scheme with overlappingregistration areas.This paper proposes a fault tolerance scheme for Distributed and Fixed Hierarchical Mobile IP(DFHMIP and evaluates its performance in terms of data transmission cost and blocking probability.

  9. Real-time services in IP network architectures

    Science.gov (United States)

    Gilardi, Antonella

    1996-12-01

    The worldwide internet system seems to be the success key for the provision of real time multimedia services to both residential and business users and someone says that in such a way broadband networks will have a reason to exist. This new class of applications that use multiple media (voice, video and data) impose constraints to the global network nowadays consisting of subnets with various data links. The attention will be focused on the interconnection of IP non ATM and ATM networks. IETF and ATM forum are currently involved in the developing specifications suited to adapt the connectionless IP protocol to the connection oriented ATM protocol. First of all the link between the ATM and the IP service model has to be set in order to match the QoS and traffic requirements defined in the relative environment. A further significant topic is represented by the mapping of IP resource reservation model onto the ATM signalling and in the end it is necessary to define how the routing works when there are QoS parameters associated. This paper, considering only unicast applications, will examine the above issues taking as a starting point the situation where an host launches as call set up request with the relevant QoS and traffic descriptor and at some point a router at the edge of the ATM network has to decide how forwarding and request in order to establish an end to end link with the right capabilities. The aim is to compare the proposals emerging from different standard bodies to point out convergency or incompatibility.

  10. A Multimedia over IP Integrated System for Military Communications

    Science.gov (United States)

    2006-12-01

    Alessandro Cignoni, Carlo Roatta *Istituto per le Telecomunicazioni e l’Elettronica “Giancarlo Vallauri” Telecommunications Department Viale Italia n°72...for a real battlefield scenario. Cignoni, A.; Garroppo, R.G.; Martucci, A.; Roatta , C. (2006) A Multimedia over IP Integrated System for Military...October 2003. Rome, 18-19 April 2005 RTO-IST-054 Paper 14 Alessandro CIGNONI, Rosario G. GARROPPO, Alessandro MARTUCCI, Carlo ROATTA A Multimedia

  11. Implementation of Cloud Computing into VoIP

    Directory of Open Access Journals (Sweden)

    Floriana GEREA

    2012-08-01

    Full Text Available This article defines Cloud Computing and highlights key concepts, the benefits of using virtualization, its weaknesses and ways of combining it with classical VoIP technologies applied to large scale businesses. The analysis takes into consideration management strategies and resources for better customer orientation and risk management all for sustaining the Service Level Agreement (SLA. An important issue in cloud computing can be security and for this reason there are several security solution presented.

  12. At-Speed Logic BIST for IP Cores

    CERN Document Server

    Cheon, B; Wang, L -T; Wen, X; Hsu, P; Cho, J; Park, J; Chao, H; Wu, S

    2011-01-01

    This paper describes a flexible logic BIST scheme that features high fault coverage achieved by fault-simulation guided test point insertion, real at-speed test capability for multi-clock designs without clock frequency manipulation, and easy physical implementation due to the use of a low-speed SE signal. Application results of this scheme to two widely used IP cores are also reported.

  13. Performance analysis of IP QoS provision model

    Institute of Scientific and Technical Information of China (English)

    SUN Danning; Moonsik Kang

    2006-01-01

    The Performance of a heterogeneous IP QoS provision service model was analyzed. This model utilized RSVP technique to set up dynamic resource reservation interface between the user and the network, meanwhile, DiffServ technique was utilized to transmit class-based packets in different per hop behaviors. Furthermore, accordingly queue management and packets scheduling mechanisms were presented for end-to-end QoS guarantees and appropriate cooperation of network elements.

  14. TCP/IP Security%TCP/IP协议安全

    Institute of Scientific and Technical Information of China (English)

    张少中; 唐毅谦; 赵悦; 聂铁铸; 刘丽华

    2000-01-01

    TCP/IP协议是Internet上网络互连的基础,TCP/IP 协议的安全直接关系到网络和系统的安全.本文通过分析TCP/IP的工作机制,讨论了网络入侵的基本途径,并阐述了一些改进和提高TCP/IP协议安全性的方法.

  15. Generic System Verilog Universal Verification Methodology Based Reusable Verification Environment for Efficient Verification of Image Signal Processing IPS/SOCS

    Directory of Open Access Journals (Sweden)

    Abhishek Jain

    2012-12-01

    Full Text Available In this paper, we present Generic System Verilog Universal Verification Methodology based Reusable Verification Environment for efficient verification of Image Signal Processing IP’s/SoC’s. With the tight schedules on all projects it is important to have a strong verification methodology which contributes to First Silicon Success. Deploy methodologies which enforce full functional coverage and verification of corner cases through pseudo random test scenarios is required. Also, standardization of verification flow is needed. Previously, inside imaging group of ST, Specman (e/Verilog based Verification Environment forIP/Subsystem level verification and C/C++/Verilog based Directed Verification Environment for SoC Level Verification was used for Functional Verification. Different Verification Environments were used at IP level and SoC level. Different Verification/Validation Methodologies were used for SoC Verification across multiple sites. Verification teams were also looking for the ways how to catch bugs early in the design cycle? Thus, Generic System Verilog Universal Verification Methodology (UVM based Reusable Verification Environment is required to avoid the problem of having so many methodologies and provides a standard unified solution which compiles on all tools.

  16. TCP/IP Sockets in C# Practical Guide for Programmers

    CERN Document Server

    Makofske, David; Calvert, Kenneth L

    2004-01-01

    "TCP/IP sockets in C# is an excellent book for anyone interested in writing network applications using Microsoft .Net frameworks. It is a unique combination of well written concise text and rich carefully selected set of working examples. For the beginner of network programming, it''s a good starting book; on the other hand professionals could also take advantage of excellent handy sample code snippets and material on topics like message parsing and asynchronous programming."Adarsh Khare, SDT, .Net Frameworks Team, Microsoft CorporationThe popularity of the C# language and the .NET framework is ever rising due to its ease of use, the extensive class libraries available in the .NET Framework, and the ubiquity of the Microsoft Windows operating system, to name a few advantages. TCP/IP Sockets in C# focuses on the Sockets API, the de facto standard for writing network applications in any programming language. Starting with simple client and server programs that use TCP/IP (the Internet protocol suite), students ...

  17. A Framework for an IP-Based DVB Transmission Network

    Directory of Open Access Journals (Sweden)

    Nimbe L. Ewald-Arostegui

    2010-01-01

    Full Text Available One of the most important challenges for next generation all-IP networks is the convergence and interaction of wireless and wired networks in a smooth and efficient manner. This challenge will need to be faced if broadcast transmission networks are to converge with IP infrastructure. The 2nd generation of DVB standards supports the Generic Stream, allowing the direct transmission of IP-based content using the Generic Stream Encapsulation (GSE, in addition to the native Transport Stream (TS. However, the current signalling framework is based on MPEG-2 Tables that rely upon the TS. This paper examines the feasibility of providing a GSE signalling framework, eliminating the need for the TS. The requirements and potential benefits of this new approach are described. It reviews prospective methods that may be suitable for network discovery and selection and analyses different options for the transport and syntax of this signalling metadata. It is anticipated that the design of a GSE-only signalling system will enable DVB networks to function as a part of the Internet.

  18. IP Pegasi in outburst: Echelle spectroscopy & Modulation Doppler Tomography

    CERN Document Server

    Papadaki, C; Steeghs, D

    2008-01-01

    We analyse a unique set of time-resolved echelle spectra of the dwarf nova IP Peg, obtained at ESO's NTT with EMMI. The dataset covers the wavelength range of 4000-7500A and shows Balmer, HeI, HeII and heavier elements in emission. IP Peg was observed one day after the peak of an outburst. The trailed spectra, spectrograms and Doppler maps show characteristics typical of IP Pegasi during the early stages of its outburst. The high-ionisation line of HeII 4686A is the most centrally located line and has the greatest radial extension compared to the HeI lines. The Balmer lines extend from close to the white dwarf up to approximately 0.45 times R_L, with the outer radius gradually increasing when moving from H delta to H alpha. The application, for the first time, of the modulation Doppler tomography technique, maps any harmonically varying components present in the system configuration. We find, as expected, that part of the strong secondary star emission in Balmer and HeI lines is modulated predominantly with t...

  19. Dynamic analysis of the deployment for mesh reflector deployable antennas with the cable-net structure

    Science.gov (United States)

    Zhang, Yiqun; Li, Na; Yang, Guigeng; Ru, Wenrui

    2017-02-01

    This paper presents a dynamic analysis approach for the composite structure of a deployable truss and cable-net system. An Elastic Catenary Element is adopted to model the slack/tensioned cables. Then, from the energy standpoint, the kinetic energy, elasticity-potential energy and geopotential energy of the cable-net structure and deployable truss are derived. Thus, the flexible multi-body dynamic model of the deployable antenna is built based on the Lagrange equation. The effect of the cable-net tension on the antenna truss is discussed and compared with previous publications and a dynamic deployment analysis is performed. Both the simulation and experimental results verify the validity of the method presented.

  20. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  1. Download - ChIP-Atlas | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available switchLanguage; BLAST Search Image Search Home About Archive Update History Data List Contact us ChIP-Atla...tory of This Database Site Policy | Contact Us Download - ChIP-Atlas | LSDB Archive ...

  2. Carotid artery stent continued expansion days after deployment, without post stent deployment angioplasty

    Directory of Open Access Journals (Sweden)

    Umair Qazi

    2015-10-01

    Full Text Available This is a carotid artery stent (CAS case report, which avoids post-stent deployment angioplasty (Post-SDA, with duplex confirmed continued stent expansion at 1, 3 and 30-day post deployment. This report confirms that self-expanding nitinol stents in the carotid artery may not require Post-SDA. We believe CAS can be performed without Post-SDA, which helps reduce the occurrence of intraoperative hemodynamic depression.

  3. PARP1 genomics: chromatin immunoprecipitation approach using anti-PARP1 antibody (ChIP and ChIP-seq).

    Science.gov (United States)

    Lodhi, Niraj; Tulin, Alexei V

    2011-01-01

    Poly(ADP-ribose) polymerase1 (PARP1) is a global regulator of different cellular mechanisms, ranging from DNA damage repair to control of gene expression. Since PARP1 protein and pADPr have been shown to persist in chromatin through cell cycle, they may both act as epigenetic markers. However, it is not known how many loci are occupied by PARP1 protein during mitosis genome-wide. To reveal the genome-wide PARP1 binding sites, we used the ChIP-seq approach, an emerging technique to study genome-wide PARP1 protein interaction with chromatin. Here, we describe how to perform ChIP-seq in the context of PARP1 binding sites identification in chromatin, using human embryonic kidney cell lines.

  4. Genomic imprinting is variably lost during reprogramming of mouse iPS cells

    OpenAIRE

    2013-01-01

    Derivation of induced pluripotent stem (iPS) cells is mainly an epigenetic reprogramming process. It is still quite controversial how genomic imprinting is reprogrammed in iPS cells. Thus, we derived multiple iPS clones from genetically identical mouse somatic cells. We found that parentally inherited imprint was variably lost among these iPS clones. Concurrent with the loss of DNA methylation imprint at the corresponding Snrpn and Peg3 imprinted regions, parental origin-specific expression o...

  5. Internetworking with Internet Protocol (IP) and Transmission Control Protocol (TCP) within the Military

    OpenAIRE

    Eikenberg, Bruce R.

    1990-01-01

    Approved for public release; distribution is unlimited. The backbone of the internetworking technology widely used by the military, as well as many civilian installations, is commonly referred to as TCP/IP. Transmission Control Protocol (TCP) and Internet Protocol (IP) are the two standard communication protocols from which TCP/IP receives its name. By utilizing TCP/IP, the majority of technical issues of interconnecting various computer technologies have become transparent to the user. Th...

  6. On the security of the Mobile IP protocol family

    NARCIS (Netherlands)

    Meyer, Ulrike; Tschofenig, Hannes; Karagiannis, Georgios; Devetsikiotis, M.; Michailidis, G.

    2007-01-01

    The Internet Engineering Task Force (IETF) has worked on network layer mobility for more than 10 years and a number of RFCs are available by now. Although the IETF mobility protocols are not present in the Internet infrastructure as of today, deployment seems to be imminent since a number of organiz

  7. Direct reduction of N-acetoxy-PhIP by tea polyphenols: a possible mechanism for chemoprevention against PhIP-DNA adduct formation.

    Science.gov (United States)

    Lin, Dong-Xin; Thompson, Patricia A; Teitel, Candee; Chen, Jun-Shi; Kadlubar, Fred F

    2003-01-01

    The chemopreventive effect of tea against 2-amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP)-DNA adduct formation and its mechanism were studied. Rats were exposed to freshly prepared aqueous extracts of green tea (3% (w/v)) as the sole source of drinking water for 10 days prior to administration with a single dose of PhIP (10 mg/kg body weight) by oral gavage. PhIP-DNA adducts in the liver, colon, heart, and lung were measured using the 32P-postlabelling technique. Rats pre-treated with tea and given PhIP 20 h before sacrifice had significantly reduced levels of PhIP-DNA adducts as compared with controls given PhIP alone. The possible mechanism of protective effect of tea on PhIP-DNA adduct formation was then examined in vitro. It was found that an aqueous extract of green and black tea, mixtures of green and black tea polyphenols, as well as purified polyphenols could strongly inhibit the DNA binding of N-acetoxy-PhIP, a putative ultimate carcinogen of PhIP formed in vivo via metabolic activation. Among these, epigallocatechin gallate was exceptionally potent. HPLC analyses of these incubation mixtures containing N-acetoxy-PhIP and the tea polyphenols each revealed the production of the parent amine, PhIP, indicating the involvement of a redox mechanism. In view of the presence of relatively high levels of tea polyphenols in rat and human plasma after ingestion of tea, this study suggests that direct reduction of the ultimate carcinogen N-acetoxy-PhIP by tea polyphenols is likely to be involved in the mechanism of chemoprotection of tea against this carcinogen.

  8. Direct reduction of N-acetoxy-PhIP by tea polyphenols: a possible mechanism for chemoprevention against PhIP-DNA adduct formation

    Energy Technology Data Exchange (ETDEWEB)

    Lin Dongxin; Thompson, Patricia A.; Teitel, Candee; Chen Junshi; Kadlubar, Fred F

    2003-03-01

    The chemopreventive effect of tea against 2-amino-1-methyl-6-phenylimidazo[4,5-b]pyridine (PhIP)-DNA adduct formation and its mechanism were studied. Rats were exposed to freshly prepared aqueous extracts of green tea (3% (w/v)) as the sole source of drinking water for 10 days prior to administration with a single dose of PhIP (10 mg/kg body weight) by oral gavage. PhIP-DNA adducts in the liver, colon, heart, and lung were measured using the {sup 32}P-postlabelling technique. Rats pre-treated with tea and given PhIP 20 h before sacrifice had significantly reduced levels of PhIP-DNA adducts as compared with controls given PhIP alone. The possible mechanism of protective effect of tea on PhIP-DNA adduct formation was then examined in vitro. It was found that an aqueous extract of green and black tea, mixtures of green and black tea polyphenols, as well as purified polyphenols could strongly inhibit the DNA binding of N-acetoxy-PhIP, a putative ultimate carcinogen of PhIP formed in vivo via metabolic activation. Among these, epigallocatechin gallate was exceptionally potent. HPLC analyses of these incubation mixtures containing N-acetoxy-PhIP and the tea polyphenols each revealed the production of the parent amine, PhIP, indicating the involvement of a redox mechanism. In view of the presence of relatively high levels of tea polyphenols in rat and human plasma after ingestion of tea, this study suggests that direct reduction of the ultimate carcinogen N-acetoxy-PhIP by tea polyphenols is likely to be involved in the mechanism of chemoprotection of tea against this carcinogen.

  9. Community integration after deployment to Afghanistan

    DEFF Research Database (Denmark)

    Karstoft, Karen-Inge; Armour, Cherie; Andersen, Søren B.

    2015-01-01

    of Danish soldiers deployed to Afghanistan in 2009 (N = 743), we assessed community reintegration difficulties 2.5 years after home coming (study sample: N = 454). Furthermore, symptoms of posttraumatic stress disorder (PTSD) were assessed before, during, and after deployment. Trajectories of PTSD symptoms...... from a previously published latent growth mixture modeling analysis were used to address whether community reintegration difficulties differ as a result of course and level of PTSD symptoms. RESULTS: Between 3.6 and 18.0 % reported to have some, a lot, or extreme difficulties in reintegration domains...... such as interpersonal functioning, productivity, community involvement, and self-care. Mean level of reintegration difficulties differed significantly across six PTSD symptom trajectories (range 6.35-36.00); with more symptomatic trajectories experiencing greater community reintegration difficulties. CONCLUSIONS...

  10. Advanced deployable reflectors for communications satellites

    Science.gov (United States)

    Lowe, Elvin; Josephs, Michael; Hedgepeth, John

    1993-02-01

    This paper discusses a concept for a deployable mesh reflector for large spacecraft antennas and the processes used in design, fabrication and testing. A set of overall reflector requirements such as stowed volume, deployed diameter and RF loss derived from system specifications are presented. The development of design and analysis tools to allow parametric studies such as facet size, number of ribs and number of rib segments is discussed. CATIA (a commercially available three-dimensional design and analysis tool) is used to perform kinematic analyses as well as to establish the database to be used by the several groups participating in the development is examined. Results of trade studies performed to reduce cost with minimum risk to product delivery are included. A thirty foot reflector has been built and tested.

  11. Metals Production Requirements for Rapid Photovoltaics Deployment

    CERN Document Server

    Kavlak, Goksin; Jaffe, Robert L; Trancik, Jessika E

    2015-01-01

    If global photovoltaics (PV) deployment grows rapidly, the required input materials need to be supplied at an increasing rate. In this paper, we quantify the effect of PV deployment levels on the scale of metals production. For example, we find that if cadmium telluride {copper indium gallium diselenide} PV accounts for more than 3% {10%} of electricity generation by 2030, the required growth rates for the production of indium and tellurium would exceed historically-observed production growth rates for a large set of metals. In contrast, even if crystalline silicon PV supplies all electricity in 2030, the required silicon production growth rate would fall within the historical range. More generally, this paper highlights possible constraints to the rate of scaling up metals production for some PV technologies, and outlines an approach to assessing projected metals growth requirements against an ensemble of past growth rates from across the metals production sector. The framework developed in this paper may be...

  12. Deployment Effects of Marin Renewable Energy Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Brian Polagye; Mirko Previsic

    2010-06-17

    Given proper care in siting, design, deployment, operation and maintenance, marine and hydrokinetic technologies could become one of the more environmentally benign sources of electricity generation. In order to accelerate the adoption of these emerging hydrokinetic and marine energy technologies, navigational and environmental concerns must be identified and addressed. All developing hydrokinetic projects involve a wide variety of stakeholders. One of the key issues that site developers face as they engage with this range of stakeholders is that many of the possible conflicts (e.g., shipping and fishing) and environmental issues are not well-understood, due to a lack of technical certainty. In September 2008, re vision consulting, LLC was selected by the Department of Energy (DoE) to apply a scenario-based approach to the emerging wave and tidal technology sectors in order to evaluate the impact of these technologies on the marine environment and potentially conflicting uses. The project’s scope of work includes the establishment of baseline scenarios for wave and tidal power conversion at potential future deployment sites. The scenarios will capture variations in technical approaches and deployment scales to properly identify and characterize environmental impacts and navigational effects. The goal of the project is to provide all stakeholders with an improved understanding of the potential effects of these emerging technologies and focus all stakeholders onto the critical issues that need to be addressed. This groundwork will also help in streamlining siting and associated permitting processes, which are considered key hurdles for the industry’s development in the U.S. today. Re vision is coordinating its efforts with two other project teams funded by DoE which are focused on regulatory and navigational issues. The results of this study are structured into three reports: 1. Wave power scenario description 2. Tidal power scenario description 3. Framework for

  13. Integrated personal health and care services deployment

    DEFF Research Database (Denmark)

    Villalba, E.; Casas, I.; Abadie, F.

    2013-01-01

    Objectives: The deployment and adoption of Integrated Personal Health and Care Services in Europe has been slow and fragmented. There have been many initiatives and projects of this kind in different European regions, many of which have not gone beyond the pilot stage. We investigated the necessary...... conditions for mainstreaming these services into care provision. Methods: We conducted a qualitative analysis of 27 Telehealth, Telecare and Integrated Personal Health System projects, implemented across 20 regions in eight European countries. The analysis was based on Suter’s ten key principles...... for successful health systems integration. Results: Out of the 27 cases, we focused on 11 which continued beyond the pilot stage. The key facilitators that are necessary for successful deployment and adoption in the European regions of our study are reorganisation of services, patient focus, governance...

  14. Investigation of Viral and Host Chromatin by ChIP-PCR or ChIP-Seq Analysis.

    Science.gov (United States)

    Günther, Thomas; Theiss, Juliane M; Fischer, Nicole; Grundhoff, Adam

    2016-02-08

    Complex regulation of viral transcription patterns and DNA replication levels is a feature of many DNA viruses. This is especially true for those viruses which establish latent or persistent infections (e.g., herpesviruses, papillomaviruses, polyomaviruses, or adenovirus), as long-term persistence often requires adaptation of gene expression programs and/or replication levels to the cellular milieu. A key factor in the control of such processes is the establishment of a specific chromatin state on promoters or replication origins, which in turn will determine whether or not the underlying DNA is accessible for other factors that mediate downstream processes. Chromatin immunoprecipitation (ChIP) is a powerful technique to investigate viral chromatin, in particular to study binding patterns of modified histones, transcription factors or other DNA-/chromatin-binding proteins that regulate the viral lifecycle. Here, we provide protocols that are suitable for performing ChIP-PCR and ChIP-Seq studies on chromatin of large and small viral genomes.

  15. Genomic imprinting is variably lost during reprogramming of mouse iPS cells.

    Science.gov (United States)

    Takikawa, Sachiko; Ray, Chelsea; Wang, Xin; Shamis, Yulia; Wu, Tien-Yuan; Li, Xiajun

    2013-09-01

    Derivation of induced pluripotent stem (iPS) cells is mainly an epigenetic reprogramming process. It is still quite controversial how genomic imprinting is reprogrammed in iPS cells. Thus, we derived multiple iPS clones from genetically identical mouse somatic cells. We found that parentally inherited imprint was variably lost among these iPS clones. Concurrent with the loss of DNA methylation imprint at the corresponding Snrpn and Peg3 imprinted regions, parental origin-specific expression of the Snrpn and Zim1 imprinted genes was also lost in these iPS clones. This loss of parental genomic imprinting in iPS cells was likely caused by the reprogramming process during iPS cell derivation because extended culture of iPS cells did not lead to significant increase in the loss of genomic imprinting. Intriguingly, one to several paternal chromosomes appeared to have acquired de novo methylation at the Snrpn and Zac1 imprinted regions in a high percentage of iPS clones. These results might have some implications for future therapeutic applications of iPS cells. Since DNA methylation imprint can be completely erased in some iPS clones at multiple imprinted regions, iPS cell reprogramming may also be employed to dissect the underlying mechanisms of erasure, reacquisition and maintenance of genomic imprinting in mammals.

  16. Antigen list - ChIP-Atlas | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available switchLanguage; BLAST Search Image Search Home About Archive Update History Data List Contact us ChIP-Atla...Description of data contents A list of all antigen names of data provided on ChIP-Atlas. See details here: h...story of This Database Site Policy | Contact Us Antigen list - ChIP-Atlas | LSDB Archive ...

  17. Evaluating the Effectiveness of IP Hopping via an Address Routing Gateway

    Science.gov (United States)

    2013-03-01

    70 6.3 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 6.3.1 IPv6 Support...4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 IPv6 IP version 6...in their header. Appendix A displays the format for both IP version 4 (IPv4) and IP version 6 ( IPv6 ) packets. IPv4 uses 32-bit addresses to uniquely

  18. Single-tube linear DNA amplification (LinDA) for robust ChIP-seq

    NARCIS (Netherlands)

    Shankaranarayanan, P.; Mendoza-Parra, M.A.; Walia, M.; Wang, L.; Li, N.; Trindade, L.M.; Gronemeyer, H.

    2011-01-01

    Genome-wide profiling of transcription factors based on massive parallel sequencing of immunoprecipitated chromatin (ChIP-seq) requires nanogram amounts of DNA. Here we describe a high-fidelity, single-tube linear DNA amplification method (LinDA) for ChIP-seq and reChIP-seq with picogram DNA amounts

  19. ELISA-based assay for IP-10 detection from filter paper samples

    DEFF Research Database (Denmark)

    Drabe, Camilla Heldbjerg; Blauenfeldt, Thomas; Ruhwald, Morten

    2014-01-01

    IP-10 is a small pro-inflammatory chemokine secreted primarily from monocytes and fibroblasts. Alterations in IP-10 levels have been associated with inflammatory conditions including viral and bacterial infections, immune dysfunction, and tumor development. IP-10 is increasingly recognized as a b...

  20. Reintegration Difficulty of Military Couples Following Deployment

    Science.gov (United States)

    2015-07-01

    characteristics, and difficulty with reintegration . Our recruitment procedures were so successful that we are working to double our sample to take...AWARD NUMBER: W81XWH-14-2-0131 TITLE: Reintegration Difficulty of Military Couples Following Deployment PRINCIPAL INVESTIGATOR: Leanne K...TO THE ABOVE ADDRESS. 1. REPORT DATE July 2015 2. REPORT TYPE Annual 3. DATES COVERED 1July2014 - 30June2015 4. TITLE AND SUBTITLE Reintegration